Follow
Benoit Libert
Benoit Libert
Zama
Verified email at ens-lyon.fr - Homepage
Title
Cited by
Cited by
Year
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
P Barreto, B Libert, N McCullagh, JJ Quisquater
Advances in Cryptology-ASIACRYPT 2005, 515-532, 2005
7462005
Expressive key-policy attribute-based encryption with constant-size ciphertexts
N Attrapadung, B Libert, E De Panafieu
Public Key Cryptography–PKC 2011, 90-108, 2011
5032011
A new identity based signcryption scheme from pairings
B Libert, JJ Quisquater
Information Theory Workshop, 2003. Proceedings. 2003 IEEE, 155-158, 2003
4592003
Unidirectional chosen-ciphertext secure proxy re-encryption
B Libert, D Vergnaud
Public Key Cryptography–PKC 2008, 360-379, 2008
4492008
Fully secure functional encryption for linear functions from standard assumptions
S Agrawal, B Libert, D Stehle
CRYPTO, 333-362, 2016
326*2016
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical Computer Science 422, 15-38, 2012
2482012
Adaptive-ID secure revocable identity-based encryption
B Libert, D Vergnaud
Topics in Cryptology–CT-RSA 2009, 1-15, 2009
2382009
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors
B Libert, S Ling, K Nguyen, H Wang
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
2372016
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
B Libert, K Paterson, E Quaglia
Public Key Cryptography–PKC 2012, 206-224, 2012
2202012
Efficient signcryption with key privacy from gap Diffie-Hellman groups
B Libert, JJ Quisquater
Public Key Cryptography–PKC 2004, 187-200, 2004
2202004
On constructing certificateless cryptosystems from identity based encryption
B Libert, JJ Quisquater
Public Key Cryptography-PKC 2006, 474-490, 2006
2152006
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
N Attrapadung, B Libert
Public Key Cryptography–PKC 2010, 384-402, 2010
1892010
Lattice-based group signatures with logarithmic signature size
F Laguillaumie, A Langlois, B Libert, D Stehlé
Advances in Cryptology-ASIACRYPT 2013, 41-61, 2013
1852013
Efficient revocation and threshold pairing based cryptosystems
B Libert, JJ Quisquater
Proceedings of the twenty-second annual symposium on Principles of …, 2003
1852003
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions
B Libert, FM San Ling, K Nguyen, H Wang
Cryptology ePrint Archive, Report 2016/101, 2016. http://eprint. iacr. org, 2016
1772016
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Ràfols
Topics in Cryptology–CT-RSA 2012, 51-67, 2012
1772012
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data
M Joye, B Libert
Financial Cryptography and Data Security, 111-125, 2013
1672013
Unidirectional chosen-ciphertext secure proxy re-encryption
B Libert, D Vergnaud
Information Theory, IEEE Transactions on 57 (3), 1786-1802, 2011
1622011
Multi-use unidirectional proxy re-signatures
B Libert, D Vergnaud
Proceedings of the 15th ACM conference on Computer and communications …, 2008
1582008
Group Signatures with Almost-for-free Revocation
B Libert, T Peters, M Yung
Advances in Cryptology–CRYPTO 2012, 571-589, 2012
1562012
The system can't perform the operation now. Try again later.
Articles 1–20