Olivier Blazy

Orcid: 0000-0001-6205-8249

According to our database1, Olivier Blazy authored at least 71 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs.
IACR Cryptol. ePrint Arch., 2024

A Public Key Identity-Based Revocation Scheme: - Fully Attribute-Hiding and Function Private.
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024

2023
Anonymous attribute-based designated verifier signature.
J. Ambient Intell. Humaniz. Comput., October, 2023

Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption.
IACR Cryptol. ePrint Arch., 2023

Efficient Implementation of a Post-Quantum Anonymous Credential Protocol.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Ouroboros: An Efficient and Provably Secure KEM Family.
IEEE Trans. Inf. Theory, 2022

An Anonymous Trace-and-Revoke Broadcast Encryption Scheme.
IACR Cryptol. ePrint Arch., 2022

MARSHAL: Messaging with Asynchronous Ratchets and Signatures for faster HeALing.
IACR Cryptol. ePrint Arch., 2022

How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment.
IACR Cryptol. ePrint Arch., 2022

(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard.
IACR Cryptol. ePrint Arch., 2022

A gapless code-based hash proof system based on RQC and its applications.
Des. Codes Cryptogr., 2022

Post-Quantum Oblivious Transfer from Smooth Projective Hash Functions with Grey Zone.
CoRR, 2022

Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone.
Proceedings of the Foundations and Practice of Security - 15th International Symposium, 2022

Identity-Based Encryption in DDH Hard Groups.
Proceedings of the Progress in Cryptology, 2022

2021
Hardware security without secure hardware: How to decrypt with a password and a server.
Theor. Comput. Sci., 2021

Generic Plaintext Equality and Inequality Proofs (Extended Version).
IACR Cryptol. ePrint Arch., 2021

An IoT Attribute-Based Security Framework for Topic-Based Publish/Subscribe Systems.
IEEE Access, 2021

Zero-Knowledge Reparation of the Véron and AGS Code-based Identification Schemes.
Proceedings of the IEEE International Symposium on Information Theory, 2021

Generic Plaintext Equality and Inequality Proofs.
Proceedings of the Financial Cryptography and Data Security, 2021

How to (Legally) Keep Secrets from Mobile Operators.
Proceedings of the Computer Security - ESORICS 2021, 2021

A Correction to a Code-Based Blind Signature Scheme.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

A Rank Metric Code-Based Group Signature Scheme.
Proceedings of the Code-Based Cryptography - 9th International Workshop, 2021

Secure Decision Forest Evaluation.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
New efficient M2C and M2M mutual authentication protocols for IoT-based healthcare applications.
Peer-to-Peer Netw. Appl., 2020

Public-Key Generation with Verifiable Randomness.
IACR Cryptol. ePrint Arch., 2020

Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).
IACR Cryptol. ePrint Arch., 2020

Cryptanalysis of a rank-based signature with short public keys.
Des. Codes Cryptogr., 2020

CCA-Secure ABE Using Tag and Pair Encoding.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Skipping the q in Group Signatures.
Proceedings of the Progress in Cryptology - INDOCRYPT 2020, 2020

Round-optimal Constant-size Blind Signatures.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

CROOT: Code-based Round-Optimal Oblivious Transfer.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

2019
Post-Quantum UC-Secure Oblivious Transfer in the Standard Model with Adaptive Corruptions.
IACR Cryptol. ePrint Arch., 2019

SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting.
IACR Cryptol. ePrint Arch., 2019

Anonymous Identity Based Encryption with Traceable Identities.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Efficient Encryption From Random Quasi-Cyclic Codes.
IEEE Trans. Inf. Theory, 2018

Downgradable Identity-based Encryption and Applications.
IACR Cryptol. ePrint Arch., 2018

Durandal: a rank metric based signature scheme.
IACR Cryptol. ePrint Arch., 2018

Spreading Alerts Quietly: New Insights from Theory and Practice.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

Non-Interactive Key Exchange from Identity-Based Encryption.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Almost Optimal Oblivious Transfer from QA-NIZK.
IACR Cryptol. ePrint Arch., 2017

Hash Proof Systems over Lattices Revisited.
IACR Cryptol. ePrint Arch., 2017

A code-based group signature scheme.
Des. Codes Cryptogr., 2017

A code-based blind signature.
Proceedings of the 2017 IEEE International Symposium on Information Theory, 2017

Efficient ID-based Designated Verifier Signature.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
IACR Cryptol. ePrint Arch., 2016

Adaptive Oblivious Transfer and Generalizations.
IACR Cryptol. ePrint Arch., 2016

Structure-Preserving Smooth Projective Hashing.
IACR Cryptol. ePrint Arch., 2016

A Practical Group Signature Scheme Based on Rank Metric.
Proceedings of the Arithmetic of Finite Fields - 6th International Workshop, 2016

Two Secure Anonymous Proxy-based Data Storages.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Anonymizable Ring Signature Without Pairing.
Proceedings of the Foundations and Practice of Security - 9th International Symposium, 2016

Adaptive Oblivious Transfer and Generalization.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Group Signatures Without q-Assumptions.
IACR Cryptol. ePrint Arch., 2015

Mitigating Server Breaches in Password-Based Authentication: Secure and Efficient Solutions.
IACR Cryptol. ePrint Arch., 2015

Non-Interactive Zero-Knowledge Proofs of Non-Membership.
IACR Cryptol. ePrint Arch., 2015

Generic Construction of UC-Secure Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015

New Techniques for SPHFs and Efficient One-Round PAKE Protocols.
IACR Cryptol. ePrint Arch., 2015

2014
(Hierarchical) Identity-Based Encryption from Affine Message Authentication.
IACR Cryptol. ePrint Arch., 2014

Tightly-Secure Signatures from Chameleon Hash Functions.
IACR Cryptol. ePrint Arch., 2014

2013
Short blind signatures.
J. Comput. Secur., 2013

New Smooth Projective Hash Functions and One-Round Authenticated Key Exchange.
IACR Cryptol. ePrint Arch., 2013

Analysis and Improvement of Lindell's UC-Secure Commitment Schemes.
IACR Cryptol. ePrint Arch., 2013

SPHF-Friendly Non-Interactive Commitments.
IACR Cryptol. ePrint Arch., 2013

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

2012
Preuves de connaissances interactives et non-interactives. ((Non-)Interactive Proofs of Knowledge).
PhD thesis, 2012

Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.
IACR Cryptol. ePrint Arch., 2012

Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Compact Round-Optimal Partially-Blind Signatures.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Traceable Signature with Stepping Capabilities.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

2011
Signatures on Randomizable Ciphertexts.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Achieving Optimal Anonymity in Transferable E-Cash with a Judge.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Batch Groth-Sahai.
IACR Cryptol. ePrint Arch., 2010


  Loading...