Benoît Libert
Affiliations:- ENS Lyon, France
According to our database1,
Benoît Libert
authored at least 124 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
2023
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
J. Cryptol., July, 2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Theor. Comput. Sci., 2021
Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.
IACR Cryptol. ePrint Arch., 2021
Des. Codes Cryptogr., 2021
Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
2020
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.
J. Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption.
Theor. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Theory of Cryptography - 16th International Conference, 2018
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Computer Security, 2018
2017
J. Cryptol., 2017
All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Public-Key Cryptography - PKC 2017, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
2016
ACM Trans. Inf. Syst. Secur., 2016
Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Theor. Comput. Sci., 2016
Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2016
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2015
Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptol. ePrint Arch., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015
, 2015
2014
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
2013
Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Advances in Cryptology, 2013
2012
Theor. Comput. Sci., 2012
Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation.
J. Math. Cryptol., 2012
IACR Cryptol. ePrint Arch., 2012
Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Cryptography and Security: From Theory to Applications, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011
Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys.
IEEE Trans. Inf. Theory, 2011
IEEE Trans. Inf. Theory, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011
Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
2010
Proceedings of the Practical Signcryption, 2010
Proceedings of the Practical Signcryption, 2010
ACM Trans. Inf. Syst. Secur., 2010
Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation.
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010
2009
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Topics in Cryptology, 2009
Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Efficient Accountable Authority Identity-Based Encryption under Static Complexity Assumptions
CoRR, 2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008
2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Public Key Cryptography, 2007
Proceedings of the Pairing-Based Cryptography, 2007
Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007
2006
Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the Public Key Cryptography, 2006
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006
2005
Proceedings of the Encyclopedia of Cryptography and Security, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
Proceedings of the Advances in Cryptology, 2005
Proceedings of the Applied Cryptography and Network Security, 2005
2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Public Key Cryptography, 2004
Proceedings of the Information Security, 7th International Conference, 2004
What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved.
Proceedings of the Public Key Infrastructure, 2004
2003
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003