Kaoutar Elkhiyaoui

Orcid: 0000-0002-1652-6846

According to our database1, Kaoutar Elkhiyaoui authored at least 32 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Arma: Byzantine Fault Tolerant Consensus with Horizontal Scalability.
IACR Cryptol. ePrint Arch., 2024

Secure and Privacy-preserving CBDC Offline Payments using a Secure Element.
IACR Cryptol. ePrint Arch., 2024

2023
Proofs of Data Reliability: Verification of reliable data storage with automatic maintenance†.
Secur. Priv., 2023

DualDory: Logarithmic-Verifier Linkable Ring Signatures through Preprocessing.
IACR Cryptol. ePrint Arch., 2023

A Framework for Resilient, Transparent, High-throughput, Privacy-Enabled Central Bank Digital Currencies.
IACR Cryptol. ePrint Arch., 2023

Short Privacy-Preserving Proofs of Liabilities.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2021
Multi-Issuer Anonymous Credentials Without a Root Authority.
IACR Cryptol. ePrint Arch., 2021

2020
Multi-Shard Private Transactions for Permissioned Blockchains.
CoRR, 2020

Decentralized Privacy-Preserving Netting Protocol on Blockchain for Payment Systems.
Proceedings of the Financial Cryptography and Data Security, 2020

2019
Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric.
IACR Cryptol. ePrint Arch., 2019

Privacy-preserving auditable token payments in a permissioned blockchain system.
IACR Cryptol. ePrint Arch., 2019

2018
POROS: Proof of Data Reliability for Outsourced Storage.
Proceedings of the 6th International Workshop on Security in Cloud Computing, 2018

2016
Message-Locked Proofs of Retrievability with Secure Deduplication.
Proceedings of the 2016 ACM on Cloud Computing Security Workshop, 2016

Efficient Techniques for Publicly Verifiable Delegation of Computation.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
PUDA - Privacy and Unforgeability for Data Aggregation.
IACR Cryptol. ePrint Arch., 2015

Online-Offline Homomorphic Signatures for Polynomial Functions.
IACR Cryptol. ePrint Arch., 2015

Publicly verifiable conjunctive keyword search in outsourced databases.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation.
IACR Cryptol. ePrint Arch., 2014

Privacy preserving delegated word search in the cloud.
IACR Cryptol. ePrint Arch., 2014

A-PPL: An Accountability Policy Language.
Proceedings of the Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance, 2014

StealthGuard: Proofs of Retrievability with Hidden Watchdogs.
Proceedings of the Computer Security - ESORICS 2014, 2014

A Cloud Accountability Policy Representation Framework.
Proceedings of the CLOSER 2014, 2014

From Regulatory Obligations to Enforceable Accountability Policies in the Cloud.
Proceedings of the Cloud Computing and Services Sciences, 2014

2012
Security and privacy in RFID systems. (Sécurité et protection de la vie privée dans les systèmes RFID).
PhD thesis, 2012

T-MATCH: Privacy-Preserving Item Matching for Storage-Only RFID Tags.
IACR Cryptol. ePrint Arch., 2012

2011
A scalable interest-oriented peer-to-peer pub/sub network.
Peer-to-Peer Netw. Appl., 2011

CHECKER: On-site checking in RFID-based supply chains.
IACR Cryptol. ePrint Arch., 2011

Demo: the f<sub>f</sub> hardware prototype for privacy-preserving RFID authentication.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

2010
ROTIV: RFID Ownership Transfer with Issuer Verification.
IACR Cryptol. ePrint Arch., 2010

Tracker: Security and Privacy for RFID-based Supply Chains.
IACR Cryptol. ePrint Arch., 2010

2009
PPS: Privacy Preserving Statistics using RFID Tags.
IACR Cryptol. ePrint Arch., 2009

Two Attacks against the <i>F</i><sub><i>f</i></sub> RFID Protocol.
Proceedings of the Progress in Cryptology, 2009


  Loading...