In this thesis, we use building blocks to propose new one or with new interesting properties. First, we propose a attribute-based designated verifier signature thanks to an IBE. Security properties are proven under usual hypothesis. Then, we introduce our round-optimal constant-size blind signature thanks to Fischlin framework and NIZK. As a side result, we propose a constant-size signature on randomizable ciphertexts. Then, we introduce a new IBE which allows a tracer, given a tracing key associated to an identity, to filter all the ciphertexts that are sent to this specific identity (and only those). Two applications of this protocols are proposed. We show that our modification doesn’t alter the security of IBE. Finally, we present a thre...
International audienceDigital signatures are perhaps the most important base for authentication and ...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
In traditional public key cryptography, public keys of users are essentially random strings generate...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
During this Thesis we investigated the possibilities that Identity-based Encryption offers when used...
In this thesis, we create new building blocks and use them to present new efficient protocols via a ...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
La cryptographie doit proposer des protocoles algorithmiquement efficaces et sûrs face à des menaces...
Dans cette thèse nous étudions les possibilités que les chiffrements basés sur l’identité offrent qu...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
In this thesis, we propose efficient constructions of cryptographic primitives with advanced functio...
International audienceDigital signatures are perhaps the most important base for authentication and ...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
In traditional public key cryptography, public keys of users are essentially random strings generate...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
During this Thesis we investigated the possibilities that Identity-based Encryption offers when used...
In this thesis, we create new building blocks and use them to present new efficient protocols via a ...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
Distributed protocols allow a cryptographic scheme to distribute its operation among a group of part...
This thesis presents new results in three fundamental areas of public-key cryptography: integrity, a...
La cryptographie doit proposer des protocoles algorithmiquement efficaces et sûrs face à des menaces...
Dans cette thèse nous étudions les possibilités que les chiffrements basés sur l’identité offrent qu...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
This thesis is developed in the framework of the symbolic analysis of security protocols. The contri...
In this thesis, we propose efficient constructions of cryptographic primitives with advanced functio...
International audienceDigital signatures are perhaps the most important base for authentication and ...
Cette thèse se situe dans le cadre de l'analyse symbolique des protocoles Les contributions sont rep...
In traditional public key cryptography, public keys of users are essentially random strings generate...