2023
[11] Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption (Anaïs Barthoulot, Olivier Blazy, Sébastien Canard), In Cryptology and Network Security - 22nd International Conference, CANS 2023, Augusta, GA, USA, October 31 - November 2, 2023, Proceedings (Jing Deng, Vladimir Kolesnikov, Alexander A. Schwarzmann, eds.), Springer, volume 14342, 2023. doi
[10] How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment (Olivier Blazy, Ioana Boureanu, Pascal Lafourcade, Cristina Onete, Léo Robert), In 32nd USENIX Security Symposium, USENIX Security 2023, Anaheim, CA, USA, August 9-11, 2023 (Joseph A. Calandrino, Carmela Troncoso, eds.), USENIX Association, 2023.
2019
[9] Downgradable Identity-Based Encryption and Applications (Olivier Blazy, Paul Germouty, Duong Hieu Phan), In Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings (Mitsuru Matsui, ed.), Springer, volume 11405, 2019. doi
2017
[8] An Efficient Protocol for UAS Security (Olivier Blazy, Emmanuel Conchon, Pierre-François Bonnefoi, Damien Sauveron, Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes, Serge Chaumette), In Integrated Communications, Navigation and Surveillance Conference (ICNS), 2017, IEEE, 2017. doi
2016
[7]Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions (Olivier Blazy, Céline Chevalier, Damien Vergnaud), In Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Kazue Sako, ed.), Springer, 2016. doi
[6]Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability (Olivier Blazy, David Derler, Daniel Slamanig, Raphael Spreitzer), In Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29 - March 4, 2016, Proceedings (Kazue Sako, ed.), Springer, 2016. doi
2015
[5]Generic Construction of UC-Secure Oblivious Transfer (Olivier Blazy, Céline Chevalier), In Applied Cryptography and Network Security - 13th International Conference, ACNS 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers (Tal Malkin, Vladimir Kolesnikov, Allison Bishop Lewko, Michalis Polychronakis, eds.), Springer, volume 9092, 2015. doi
[4]Non-Interactive Zero-Knowledge Proofs of Non-Membership (Olivier Blazy, Céline Chevalier, Damien Vergnaud), In Proceedings of CT-RSA (K. Nyberg, ed.), Springer, volume 9048, 2015. doi
[3]Tightly-Secure Signatures from Chameleon Hash Functions (Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan), In Conference on Practice and Theory in Public-Key Cryptography (PKC '15) (Jonathan Katz, ed.), Springer, volume 9020, 2015. doi
2014
[2] (Hierarchical) Identity-Based Encryption from Affine Message Authentication (Olivier Blazy, Eike Kiltz, Jiaxin Pan), In Advances in Cryptology - Proceedings of CRYPTO '14 (Ran Canetti, Juan Garay, eds.), Springer, volume 8616, 2014. doi
2013
[1] New Techniques for SPHFs and Efficient One-Round PAKE Protocols (Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, Damien Vergnaud), In Advances in Cryptology - Proceedings of CRYPTO '13 (Ran Canetti, Juan Garay, eds.), Springer, volume 8042, 2013. doi