The abstraction of cryptographic operations by term algebras, called symbolic models, is essential in almost all tool-supported methods for analyzing security protocols. Significant progress was made in proving that symbolic models offering basic cryptographic operations such as encryption and digital signatures can be sound with respect to actual cryptographic realizations and security definitions. Even abstractions of sophisticated modern cryptographic primitives such as zero-knowledge (ZK) proofs were shown to have a computationally sound cryptographic realization, but only in ad-hoc formalisms and at the cost of placing strong assumptions on the underlying cryptography, which leaves only highly inefficient realizations. In this paper...
In this thesis, we study zero-knowledge proofs, a cryptographic primitive that allows to prove a sta...
Abstract Crypto-computing is a set of well-known techniques for com-puting with encrypted data. The ...
We consider the problem of computational indistinguishability of protocols. We design a symbolic mod...
International audienceWe consider the question of the adequacy of symbolic models versus computation...
The design of automated security proofs is a topic exten-sively studied for over 20 years. One probl...
Computational soundness results show that under certain conditions it is possible to conclude comput...
Recently, we proposed a technique [1] to define a com-putationally complete symbolic attacker for th...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
International audienceComputational soundness results show that under certain conditions it is possi...
We propose a framework for constructing efficient designated-verifier non-interactive zero-knowledge...
International audienceRecently, Bana and Comon-Lundh introduced the notion of computationally comple...
International audienceSince the 1980s, two approaches have been developed for analyzing security pro...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
We show that the recent technique of computationally complete symbolic attackers proposed by Bana a...
Cryptographic protocols can be used to harden the security of IT systems, but only if these protocol...
In this thesis, we study zero-knowledge proofs, a cryptographic primitive that allows to prove a sta...
Abstract Crypto-computing is a set of well-known techniques for com-puting with encrypted data. The ...
We consider the problem of computational indistinguishability of protocols. We design a symbolic mod...
International audienceWe consider the question of the adequacy of symbolic models versus computation...
The design of automated security proofs is a topic exten-sively studied for over 20 years. One probl...
Computational soundness results show that under certain conditions it is possible to conclude comput...
Recently, we proposed a technique [1] to define a com-putationally complete symbolic attacker for th...
The material below covers two lectures on the beautiful and influential concept of zero-knowledge pr...
International audienceComputational soundness results show that under certain conditions it is possi...
We propose a framework for constructing efficient designated-verifier non-interactive zero-knowledge...
International audienceRecently, Bana and Comon-Lundh introduced the notion of computationally comple...
International audienceSince the 1980s, two approaches have been developed for analyzing security pro...
Abstract. Symbolic and computational models are the two families of models for rigorously analysing ...
We show that the recent technique of computationally complete symbolic attackers proposed by Bana a...
Cryptographic protocols can be used to harden the security of IT systems, but only if these protocol...
In this thesis, we study zero-knowledge proofs, a cryptographic primitive that allows to prove a sta...
Abstract Crypto-computing is a set of well-known techniques for com-puting with encrypted data. The ...
We consider the problem of computational indistinguishability of protocols. We design a symbolic mod...