Benoît Libert

Affiliations:
  • ENS Lyon, France


According to our database1, Benoît Libert authored at least 124 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Leveraging Small Message Spaces for CCA1 Security in Additively Homomorphic and BGN-type Encryption.
IACR Cryptol. ePrint Arch., 2024

Simulation-Extractable KZG Polynomial Commitments and Applications to HyperPlonk.
IACR Cryptol. ePrint Arch., 2024

Homomorphic Evaluation of LWR-based PRFs and Application to Transciphering.
IACR Cryptol. ePrint Arch., 2024

Vector Commitments with Proofs of Smallness: Short Range Proofs and More.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

2023
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors.
J. Cryptol., July, 2023

Vector Commitments With Short Proofs of Smallness.
IACR Cryptol. ePrint Arch., 2023

POLKA: Towards Leakage-Resistant Post-quantum CCA-Secure Public Key Encryption.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

2022
New and Improved Constructions for Partially Equivocable Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

Cumulatively All-Lossy-But-One Trapdoor Functions from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2022

Towards Leakage-Resistant Post-Quantum CCA-Secure Public Key Encryption.
IACR Cryptol. ePrint Arch., 2022

Rational Modular Encoding in the DCR Setting: Non-interactive Range Proofs and Paillier-Based Naor-Yung in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2022, 2022

One-Shot Fiat-Shamir-Based NIZK Arguments of Composite Residuosity and Logarithmic-Size Ring Signatures in the Standard Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

Updatable Public Key Encryption from DCR: Efficient Constructions With Stronger Security.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

PointProofs, Revisited.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Adaptive oblivious transfer with access control from lattice assumptions.
Theor. Comput. Sci., 2021

Adaptively Secure Distributed PRFs from sf LWE.
J. Cryptol., 2021

Non-Interactive CCA2-Secure Threshold Cryptosystems: Achieving Adaptive Security in the Standard Model Without Pairings.
IACR Cryptol. ePrint Arch., 2021

SO-CCA secure PKE from pairing based all-but-many lossy trapdoor functions.
Des. Codes Cryptogr., 2021

Bifurcated Signatures: Folding the Accountability vs. Anonymity Dilemma into a Single Private Signing Scheme.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

2020
Adaptively Secure Non-interactive CCA-Secure Threshold Cryptosystems: Generic Framework and Constructions.
J. Cryptol., 2020

New Constructions of Statistical NIZKs: Dual-Mode DV-NIZKs and More.
IACR Cryptol. ePrint Arch., 2020

Compact Simulation-Sound NIZK Arguments of Composite Residuosity and Applications to Logarithmic-Size Ring Signatures.
IACR Cryptol. ePrint Arch., 2020

Lattice-Based E-Cash, Revisited.
IACR Cryptol. ePrint Arch., 2020

Adaptive Simulation Security for Inner Product Functional Encryption.
IACR Cryptol. ePrint Arch., 2020

Simulation-Sound Arguments for LWE and Applications to KDM-CCA2 Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption.
Theor. Comput. Sci., 2019

Simulation-Sound Proofs for LWE and Applications to KDM-CCA2 Security.
IACR Cryptol. ePrint Arch., 2019

Lossy Algebraic Filters with Short Tags.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Zero-Knowledge Elementary Databases with More Expressive Queries.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Multi-Client Functional Encryption for Linear Functions in the Standard Model from LWE.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Adaptively Secure Distributed PRFs from LWE.
IACR Cryptol. ePrint Arch., 2018

Lattice-Based Zero-Knowledge Arguments for Integer Relations.
IACR Cryptol. ePrint Arch., 2018

Adaptively Secure Distributed PRFs from \mathsf LWE.
Proceedings of the Theory of Cryptography - 16th International Conference, 2018

Compact IBBE and Fuzzy IBE from Simple Assumptions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Logarithmic-Size Ring Signatures with Tight Security from the DDH Assumption.
Proceedings of the Computer Security, 2018

2017
Efficient Cryptosystems From 2<sup>k</sup>-th Power Residue Symbols.
J. Cryptol., 2017

All-But-Many Lossy Trapdoor Functions and Selective Opening Chosen-Ciphertext Security from LWE.
IACR Cryptol. ePrint Arch., 2017

Zero-Knowledge Arguments for Lattice-Based PRFs and Applications to E-Cash.
IACR Cryptol. ePrint Arch., 2017

Structure-Preserving Chosen-Ciphertext Security with Shorter Verifiable Ciphertexts.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Encoding-Free ElGamal-Type Encryption Schemes on Elliptic Curves.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

2016
A New Framework for Privacy-Preserving Aggregation of Time-Series Data.
ACM Trans. Inf. Syst. Secur., 2016

Born and raised distributively: Fully distributed non-interactive adaptively-secure threshold signatures with short shares.
Theor. Comput. Sci., 2016

Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2016

Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions.
IACR Cryptol. ePrint Arch., 2016

Non-zero Inner Product Encryption with Short Ciphertexts and Private Keys.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016

Practical "Signatures with Efficient Protocols" from Simple Assumptions.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Lattice-Based Group Signature Scheme with Message-Dependent Opening.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Fully Secure Functional Encryption for Inner Products, from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2015

Short Group Signatures via Structure-Preserving Signatures: Standard Model Security from Simple Assumptions.
IACR Cryptol. ePrint Arch., 2015

Compactly Hiding Linear Spans: Tightly Secure Constant-Size Simulation-Sound QA-NIZK Proofs and Applications.
IACR Cryptol. ePrint Arch., 2015

Linearly homomorphic structure-preserving signatures and their applications.
Des. Codes Cryptogr., 2015

Secure Efficient History-Hiding Append-Only Signatures in the Standard Model.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Applications of Structure-Preserving Cryptography and Pairing-Based NIZK Proofs.
, 2015

2014
Concise Multi-Challenge CCA-Secure Encryption and Signatures with Almost Tight Security.
IACR Cryptol. ePrint Arch., 2014

Traceable Group Encryption.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Identity-Based Lossy Trapdoor Functions: New Definitions, Hierarchical Extensions, and Implications.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Group Signatures with Message-Dependent Opening in the Standard Model.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

2013
Adaptively secure non-interactive threshold cryptosystems.
Theor. Comput. Sci., 2013

Non-Malleability from Malleability: Simulation-Sound Quasi-Adaptive NIZK Proofs and CCA2-Secure Encryption from Homomorphic Signatures.
IACR Cryptol. ePrint Arch., 2013

Lattice-Based Group Signatures with Logarithmic Signature Size.
IACR Cryptol. ePrint Arch., 2013

Efficient Cryptosystems From 2<sup>k</sup>-th Power Residue Symbols.
IACR Cryptol. ePrint Arch., 2013

Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data.
Proceedings of the Financial Cryptography and Data Security, 2013

Efficient Cryptosystems from 2<sup> <i>k</i> </sup>-th Power Residue Symbols.
Proceedings of the Advances in Cryptology, 2013

2012
Attribute-based encryption schemes with constant-size ciphertexts.
Theor. Comput. Sci., 2012

Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation.
J. Math. Cryptol., 2012

Group Signatures with Almost-for-free Revocation.
IACR Cryptol. ePrint Arch., 2012

Scalable Group Signatures with Revocation.
IACR Cryptol. ePrint Arch., 2012

Robust Encryption, Revisited.
IACR Cryptol. ePrint Arch., 2012

Hierarchical Identity-Based (Lossy) Trapdoor Functions.
IACR Cryptol. ePrint Arch., 2012

Non-interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions.
Proceedings of the Theory of Cryptography - 9th Theory of Cryptography Conference, 2012

Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Divisible E-Cash in the Standard Model.
Proceedings of the Pairing-Based Cryptography - Pairing 2012, 2012

Short Attribute-Based Signatures for Threshold Predicates.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Fully Forward-Secure Group Signatures.
Proceedings of the Cryptography and Security: From Theory to Applications, 2012

Computing on Authenticated Data: New Privacy Definitions and Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Identity-Based Cryptosystems.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability With Short Ciphertexts and Private Keys.
IEEE Trans. Inf. Theory, 2011

Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption.
IEEE Trans. Inf. Theory, 2011

Efficient traceable signatures in the standard model.
Theor. Comput. Sci., 2011

Anonymous Broadcast Encryption.
IACR Cryptol. ePrint Arch., 2011

Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Homomorphic Network Coding Signatures in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems.
Proceedings of the Information Security and Cryptology - 7th International Conference, 2011

Non-interactive and Re-usable Universally Composable String Commitments with Adaptive Security.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
Signcryption Schemes Based on Bilinear Maps.
Proceedings of the Practical Signcryption, 2010

Signcryption Schemes Based on the Diffie-Hellman Problem.
Proceedings of the Practical Signcryption, 2010

Key Evolution Systems in Untrusted Update Environments.
ACM Trans. Inf. Syst. Secur., 2010

Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation.
Proceedings of the Public Key Cryptography, 2010

Efficient Completely Non-malleable Public Key Encryption.
Proceedings of the Automata, Languages and Programming, 37th International Colloquium, 2010

Dynamic fully forward-secure group signatures.
Proceedings of the 5th ACM Symposium on Information, 2010

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010

2009
Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security.
IACR Cryptol. ePrint Arch., 2009

Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys.
Proceedings of the Public Key Cryptography, 2009

Adaptive-ID Secure Revocable Identity-Based Encryption.
Proceedings of the Topics in Cryptology, 2009

Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model.
Proceedings of the Cryptology and Network Security, 8th International Conference, 2009

Group Encryption: Non-interactive Realization in the Standard Model.
Proceedings of the Advances in Cryptology, 2009

2008
Efficient Accountable Authority Identity-Based Encryption under Static Complexity Assumptions
CoRR, 2008

Tracing Malicious Proxies in Proxy Re-encryption.
Proceedings of the Pairing-Based Cryptography, 2008

Multi-use unidirectional proxy re-signatures.
Proceedings of the 2008 ACM Conference on Computer and Communications Security, 2008

2007
Certificateless Encryption Schemes Strongly Secure in the Standard Model.
IACR Cryptol. ePrint Arch., 2007

Parallel Key-Insulated Public Key Encryption Without Random Oracles.
Proceedings of the Public Key Cryptography, 2007

Practical Time Capsule Signatures in the Standard Model from Bilinear Maps.
Proceedings of the Pairing-Based Cryptography, 2007

Forward-secure signatures in untrusted update environments: efficient and generic constructions.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
New secure applications of bilinear maps in cryptography.
PhD thesis, 2006

Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions.
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006

On Constructing Certificateless Cryptosystems from Identity Based Encryption.
Proceedings of the Public Key Cryptography, 2006

Efficient Intrusion-Resilient Signatures Without Random Oracles.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
Identity-Based Cryptosystems.
Proceedings of the Encyclopedia of Cryptography and Security, 2005

Efficient and Non-interactive Timed-Release Encryption.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps.
Proceedings of the Advances in Cryptology, 2005

Identity Based Encryption Without Redundancy.
Proceedings of the Applied Cryptography and Network Security, 2005

2004
The Exact Security of an Identity Based Signature and its Applications.
IACR Cryptol. ePrint Arch., 2004

Improved Signcryption from q-Diffie-Hellman Problems.
Proceedings of the Security in Communication Networks, 4th International Conference, 2004

Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups.
Proceedings of the Public Key Cryptography, 2004

Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA.
Proceedings of the Information Security, 7th International Conference, 2004

What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved.
Proceedings of the Public Key Infrastructure, 2004

2003
Identity Based Undeniable Signatures.
IACR Cryptol. ePrint Arch., 2003

New identity based signcryption schemes from pairings.
IACR Cryptol. ePrint Arch., 2003

Efficient revocation and threshold pairing based cryptosystems.
Proceedings of the Twenty-Second ACM Symposium on Principles of Distributed Computing, 2003

A new identity based signcryption scheme from pairings.
Proceedings of the Proceedings 2003 IEEE Information Theory Workshop, 2003


  Loading...