Team, Visitors, External Collaborators
Overall Objectives
Research Program
Application Domains
Highlights of the Year
New Results
Partnerships and Cooperations
Dissemination
Bibliography
XML PDF e-pub
PDF e-Pub


Bibliography

Major publications by the team in recent years
[1]
M. Abdalla, D. Catalano, D. Fiore.
Verifiable Random Functions: Relations to Identity-Based Key Encapsulation and New Constructions, in: Journal of Cryptology, 2014, vol. 27, no 3, pp. 544-593.
[2]
M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo.
Structure-Preserving Signatures and Commitments to Group Elements, in: Journal of Cryptology, 2016, vol. 29, no 2, pp. 363–421.
[3]
F. Benhamouda, O. Blazy, C. Chevalier, D. Pointcheval, D. Vergnaud.
New Techniques for SPHFs and Efficient One-Round PAKE Protocols, in: Advances in Cryptology – Proceedings of CRYPTO '13 (1), R. Canetti, J. A. Garay (editors), Lecture Notes in Computer Science, Springer, 2013, vol. 8042, pp. 449-475.
[4]
P. Chaidos, V. Cortier, G. Fuchsbauer, D. Galindo.
BeleniosRF: A Non-interactive Receipt-Free Electronic Voting Scheme, in: Proceedings of the 23rd ACM Conference on Computer and Communications Security (CCS '16), E. R. Weippl, S. Katzenbeisser, C. Kruegel, A. C. Myers, S. Halevi (editors), ACM Press, 2016, pp. 1614–1625.
[5]
Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud, D. Wichs.
Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust, in: Proceedings of the 20th ACM Conference on Computer and Communications Security (CCS '13), Berlin, Germany, V. D. Gligor, M. Yung (editors), ACM Press, 2013, pp. 647–658.
[6]
R. Gay, D. Hofheinz, E. Kiltz, H. Wee.
Tightly CCA-Secure Encryption Without Pairings, in: Advances in Cryptology – Proceedings of Eurocrypt '16 (2), M. Fischlin, J.-S. Coron (editors), Lecture Notes in Computer Science, Springer, 2016, vol. 9665, pp. 1–27.
[7]
S. Gorbunov, V. Vaikuntanathan, H. Wee.
Predicate Encryption for Circuits from LWE, in: Advances in Cryptology – Proceedings of CRYPTO '15 (2), R. Gennaro, M. Robshaw (editors), Lecture Notes in Computer Science, Springer, 2015, vol. 9216, pp. 503-523.
[8]
V. Lyubashevsky, C. Peikert, O. Regev.
On Ideal Lattices and Learning with Errors over Rings, in: Journal of the ACM, 2013, vol. 60, no 6, pp. 43:1–43:35.
[9]
W. Quach, H. Wee, D. Wichs.
Laconic Function Evaluation and Applications, in: 59th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2018), M. Thorup (editor), IEEE, 2018.
Publications of the year

Doctoral Dissertations and Habilitation Theses

[10]
J. Chotard.
Delegation in functional encryption, Université de Limoges, France, December 2019.
https://hal.archives-ouvertes.fr/tel-02394349
[11]
R. Gay.
Public-Key Encryption, Revisited: Tight Security and Richer Functionalities, PSL Research University, March 2019.
https://tel.archives-ouvertes.fr/tel-02137987
[12]
L. Khati.
Full Disk Encryption and Beyond, Université PSL ; ENS Paris - Ecole Normale Supérieure de Paris, July 2019, Equipe cascade, ENS, Inria.
https://tel.archives-ouvertes.fr/tel-02318449
[13]
A. Nitulescu.
A tale of SNARKs: quantum resilience, knowledge extractability and data privacy, École Normale Supérieure (Paris), April 2019.
https://hal.archives-ouvertes.fr/tel-02129544
[14]
R. Roşie.
On the achievability of white-box cryptography, PSL Research University, May 2019.
https://tel.archives-ouvertes.fr/tel-02332996

Articles in International Peer-Reviewed Journals

[15]
M. Abdalla, F. Benhamouda, D. Pointcheval.
On the Tightness of Forward-Secure Signature Reductions, in: Journal of Cryptology, January 2019, vol. 32, no 1, pp. 84-150. [ DOI : 10.1007/s00145-018-9283-2 ]
https://hal.inria.fr/hal-01722996
[16]
A. Connolly, P. Farshim, G. Fuchsbauer.
Security of Symmetric Primitives against Key-Correlated Attacks, in: IACR Transactions on Symmetric Cryptology, September 2019.
https://hal.inria.fr/hal-02396311
[17]
M. Seo, M. Abdalla, D. H. Lee, J. H. Park.
New technique for chosen-ciphertext security based on non-interactive zero-knowledge, in: Information Sciences, July 2019, vol. 490, pp. 18-35. [ DOI : 10.1016/j.ins.2019.03.063 ]
https://hal.inria.fr/hal-02135837

International Conferences with Proceedings

[18]
M. Abdalla, F. Benhamouda, R. Gay.
From Single-Input to Multi-client Inner-Product Functional Encryption, in: Advances in Cryptology – ASIACRYPT 2019, Kobe, Japan, S. D. Galbraith, S. Moriai (editors), Lecture Notes in Computer Science, November 2019, vol. 11923, pp. 552-582. [ DOI : 10.1007/978-3-030-34618-8_19 ]
https://hal.inria.fr/hal-02375577
[19]
M. Abdalla, F. Benhamouda, M. Kohlweiss, H. Waldner.
Decentralizing Inner-Product Functional Encryption, in: Public-Key Cryptography – PKC 2019, Beijing, China, D. Lin, K. Sako (editors), Lecture Notes in Computer Science, April 2019, vol. 11443, pp. 128-157. [ DOI : 10.1007/978-3-030-17259-6_5 ]
https://hal.inria.fr/hal-02135871
[20]
M. Abdalla, F. Benhamouda, A. Passelègue.
Algebraic XOR-RKA-Secure Pseudorandom Functions from Post-Zeroizing Multilinear Maps, in: Advances in Cryptology – ASIACRYPT 2019, Kobe, Japan, S. D. Galbraith, S. Moriai (editors), Lecture Notes in Computer Science, November 2019, vol. 11922, pp. 386-412. [ DOI : 10.1007/978-3-030-34621-8_14 ]
https://hal.inria.fr/hal-02375594
[21]
M. Barbosa, D. Catalano, A. Soleimanian, B. Warinschi.
Efficient Function-Hiding Functional Encryption: From Inner-Products to Orthogonality, in: Topics in Cryptology – CT-RSA 2019, San Francisco, United States, M. Matsui (editor), Lecture Notes in Computer Science, February 2019, vol. 11405, pp. 127-148. [ DOI : 10.1007/978-3-030-12612-4_7 ]
https://hal.inria.fr/hal-02363215
[22]
A. Bauer, H. Gilbert, G. Renault, M. Rossi.
Assessment of the Key-Reuse Resilience of NewHope, in: CT-RSA 2019 - The Cryptographers' Track at the RSA Conference, San Francisco, United States, M. Matsui (editor), Lecture Notes in Computer Science, Springer, February 2019, vol. 11405, pp. 272-292. [ DOI : 10.1007/978-3-030-12612-4_14 ]
https://hal.archives-ouvertes.fr/hal-02139910
[23]
W. Beullens, H. Wee.
Obfuscating Simple Functionalities from Knowledge Assumptions, in: PKC 2019 - International Conference on Practice and Theory of Public Key Cryptography, Beijing, China, April 2019, pp. 254-283. [ DOI : 10.1007/978-3-030-17259-6_9 ]
https://hal.inria.fr/hal-02358436
[24]
F. Bourse, D. Pointcheval, O. Sanders.
Divisible E-Cash from Constrained Pseudo-Random Functions, in: ASIACRYPT 2019 - 25th Annual International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, Advances in Cryptology, December 2019, vol. LNCS, no 11922.
https://hal.inria.fr/hal-02357173
[25]
E. Dufour-Sans, D. Pointcheval.
Unbounded Inner-Product Functional Encryption with Succinct Keys, in: ACNS 2019 - 17th International Conference on Applied Cryptography and Network Security, Bogota, Colombia, Springer, May 2019, vol. LNCS, no 11464, pp. 426-441. [ DOI : 10.1007/978-3-030-21568-2_21 ]
https://hal.inria.fr/hal-02357165
[26]
G. Fuchsbauer.
WI Is Not Enough: Zero-Knowledge Contingent (Service) Payments Revisited, in: ACM CCS 2019 - 26th ACM Conference on Computer and Communications Security, London, United Kingdom, ACM Press, November 2019, pp. 49-62. [ DOI : 10.1145/3319535.3354234 ]
https://hal.inria.fr/hal-02396308
[27]
G. Fuchsbauer, C. Kamath, K. Klein, K. Pietrzak.
Adaptively Secure Proxy Re-encryption, in: Public-Key Cryptography – PKC 2019, Beijing, China, D. Lin, K. Sako (editors), LNCS - Lecture Notes in Computer Science, Springer, April 2019, vol. 11443. [ DOI : 10.1007/978-3-030-17259-6_11 ]
https://hal.inria.fr/hal-02396301
[28]
G. Fuchsbauer, M. Orrù, Y. Seurin.
Aggregate Cash Systems: A Cryptographic Investigation of Mimblewimble, in: Advances in Cryptology - EUROCRYPT 2019, Darmstadt, Germany, Y. Ishai, V. Rijmen (editors), LNCS - Lecture Notes in Computer Science, Springer, May 2019, vol. 11476. [ DOI : 10.1007/978-3-030-17653-2_22 ]
https://hal.inria.fr/hal-02396305
[29]
J. Gong, B. Waters, H. Wee.
ABE for DFA from k-Lin, in: CRYPTO 2019 - 39th Annual International Cryptology Conference, Santa Barbara, United States, August 2019, pp. 732-764. [ DOI : 10.1007/978-3-030-26951-7_25 ]
https://hal.inria.fr/hal-02358440
[30]
P. Grubbs, M.-S. Lacharité, B. Minaud, K. G. Paterson.
Learning to Reconstruct: Statistical Learning Theory and Encrypted Database Attacks, in: IEEE Symposium on Security and Privacy (S&P) 2019, San Francisco, United States, May 2019.
https://hal.inria.fr/hal-01974962
[31]
C. Hébant, D. H. Phan, D. Pointcheval.
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data, in: ISC 2019 - International Conference on Information Security, New York, United States, Z. Lin, C. Papamanthou, M. Polychronakis (editors), ISC 2019 - International Conference on Information Security, Springer, September 2019, vol. LNCS, no 11723, pp. 87-106. [ DOI : 10.1007/978-3-030-30215-3_5 ]
https://hal.archives-ouvertes.fr/hal-02345627
[32]
L. Khati, D. Vergnaud.
Analysis and Improvement of an Authentication Scheme in Incremental Cryptography, in: Selected Areas in Cryptography - SAC 2018, Calgary, Canada, C. Cid, M. J. Jacobson Jr. (editors), Lecture Notes in Computer Science, Springer, January 2019, vol. 11349, pp. 50-70. [ DOI : 10.1007/978-3-030-10970-7_3 ]
https://hal.inria.fr/hal-01893905
[33]
L. Kowalczyk, H. Wee.
Compact Adaptively Secure ABE for 𝖭𝖢1 from k-Lin, in: EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, April 2019, pp. 3-33. [ DOI : 10.1007/978-3-030-17653-2_1 ]
https://hal.inria.fr/hal-02358429
[34]
T. Ryffel, E. Dufour-Sans, R. Gay, F. Bach, D. Pointcheval.
Partially Encrypted Machine Learning using Functional Encryption, in: NeurIPS 2019 - Thirty-third Conference on Neural Information Processing Systems, Vancouver, Canada, Advances in Neural Information Processing Systems, December 2019, https://arxiv.org/abs/1905.10214.
https://hal.inria.fr/hal-02357181

Internal Reports

[35]
M. Abdalla, M. Barbosa.
Perfect Forward Security of SPAKE2, IACR Cryptology ePrint Archive, October 2019, no Report 2019/1194.
https://hal.inria.fr/hal-02317002
[36]
M. Abdalla, F. Benhamouda, R. Gay.
From Single-Input to Multi-Client Inner-Product Functional Encryption, IACR Cryptology ePrint Archive, May 2019, no Report 2019/487.
https://hal.inria.fr/hal-02135963
[37]
M. Abdalla, F. Benhamouda, M. Kohlweiss, H. Waldner.
Decentralizing Inner-Product Functional Encryption, IACR Cryptology ePrint Archive, January 2019, no Report 2019/020.
https://hal.inria.fr/hal-02317011