Folgen
Benoit Libert
Benoit Libert
Zama
Bestätigte E-Mail-Adresse bei ens-lyon.fr - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
P Barreto, B Libert, N McCullagh, JJ Quisquater
Advances in Cryptology-ASIACRYPT 2005, 515-532, 2005
7502005
Expressive key-policy attribute-based encryption with constant-size ciphertexts
N Attrapadung, B Libert, E De Panafieu
Public Key Cryptography–PKC 2011, 90-108, 2011
5142011
A new identity based signcryption scheme from pairings
B Libert, JJ Quisquater
Information Theory Workshop, 2003. Proceedings. 2003 IEEE, 155-158, 2003
4602003
Unidirectional chosen-ciphertext secure proxy re-encryption
B Libert, D Vergnaud
Public Key Cryptography–PKC 2008, 360-379, 2008
4532008
Fully secure functional encryption for linear functions from standard assumptions
S Agrawal, B Libert, D Stehle
CRYPTO, 333-362, 2016
343*2016
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical Computer Science 422, 15-38, 2012
2512012
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
B Libert, S Ling, K Nguyen, H Wang
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
2422016
Adaptive-ID secure revocable identity-based encryption
B Libert, D Vergnaud
Topics in Cryptology–CT-RSA 2009, 1-15, 2009
2392009
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
B Libert, K Paterson, E Quaglia
Public Key Cryptography–PKC 2012, 206-224, 2012
2222012
Efficient signcryption with key privacy from gap Diffie-Hellman groups
B Libert, JJ Quisquater
Public Key Cryptography–PKC 2004, 187-200, 2004
2222004
On constructing certificateless cryptosystems from identity based encryption
B Libert, JJ Quisquater
Public Key Cryptography-PKC 2006, 474-490, 2006
2152006
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
N Attrapadung, B Libert
Public Key Cryptography–PKC 2010, 384-402, 2010
1902010
Lattice-based group signatures with logarithmic signature size
F Laguillaumie, A Langlois, B Libert, D Stehlé
Advances in Cryptology-ASIACRYPT 2013, 41-61, 2013
1892013
Efficient revocation and threshold pairing based cryptosystems
B Libert, JJ Quisquater
Proceedings of the twenty-second annual symposium on Principles of …, 2003
1852003
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
B Libert, FM San Ling, K Nguyen, H Wang
Cryptology ePrint Archive, Report 2016/101, 2016. http://eprint. iacr. org, 2016
1842016
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Ràfols
Topics in Cryptology–CT-RSA 2012, 51-67, 2012
1782012
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
M Joye, B Libert
Financial Cryptography and Data Security, 111-125, 2013
1712013
Unidirectional chosen-ciphertext secure proxy re-encryption
B Libert, D Vergnaud
Information Theory, IEEE Transactions on 57 (3), 1786-1802, 2011
1632011
Concise mercurial vector commitments and independent zero-knowledge sets with short proofs
B Libert, M Yung
Theory of Cryptography, 499-517, 2010
1612010
Multi-use unidirectional proxy re-signatures
B Libert, D Vergnaud
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1592008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20