The past few years have seen the rising of the quantum computers, that are a serious threat to nearly all the actual cryptographic schemes used in practice. In this thesis we propose some new constructions to prevent this obsolescence by building our schemes on the mathematical tool of lattices that is assumed post-quantum resistant. We firstly develop a group signature scheme, allowing each member composing the group to anonymously sign on the behalf of the group. We add a supplementary property, which is the froward secrecy. This property cut the time in periods, such that each secret key is updated when entering a new period. We also propose a blind signature scheme, which is an interactive protocol between an user, who wants to sign a m...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
Ces dernières années la cryptographie a été chamboulée par l'arrivée des ordinateurs quantiques. En ...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
The past few years have seen the rising of the quantum computers, that are a serious threat to nearl...
Ces dernières années la cryptographie a été chamboulée par l'arrivée des ordinateurs quantiques. En ...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
In the likely event where a quantum computer sees the light, number theoretic based cryptographic pr...
Avec la possibilité de l’existence d’un ordinateur quantique, les primitives cryptographiques basées...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...