With the massive use of dematerialized storage, homomorphism has become one of the most widely used properties in cryptology. In this thesis we will study how to use it in concrete multi-users protocols requiring not only confidentiality but also anonymity, authentication or verifiability. Homomorphic encryption schemes, homomorphic digital signatures and homomorphic zero-knowledge proofs will be used together, but each time restricted to achieve the desired level of security.First, the confidential aspect is studied for computations on large outsourced databases. Being able to apply functions on encrypted data without having to download and decrypt it entirely may be essential and allows to take advantage of the computational power of the ...
International audienceThe development of worldwide communications, along with the dramatic increase ...
The last decade has seen the massive democratization of smart devices such as phones, tablets, even ...
The purpose of this PhD is to design protocols to collaboratively train machine learning models whil...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Le chiffrement homomorphe est une primitive cryptographique permettant de réaliser des opérations ar...
Homomorphic encryption is a cryptographic primitive that allows arithmetic operations to be performe...
The advent of information technology, the dramatic increase of computational and storage capacities ...
New technologies offer greater convenience for end-users but usually at the cost of a loss in terms ...
Advances in information technologies gave a rise to powerful ubiquitous com- puting devices, and dig...
Le chiffrement homomorphe est une branche de la cryptologie, dans laquelle les schémas de chiffremen...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
International audienceThe development of worldwide communications, along with the dramatic increase ...
The last decade has seen the massive democratization of smart devices such as phones, tablets, even ...
The purpose of this PhD is to design protocols to collaboratively train machine learning models whil...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
With the massive use of dematerialized storage, homomorphism has become one of the most widely used ...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
Le chiffrement homomorphe est une primitive cryptographique permettant de réaliser des opérations ar...
Homomorphic encryption is a cryptographic primitive that allows arithmetic operations to be performe...
The advent of information technology, the dramatic increase of computational and storage capacities ...
New technologies offer greater convenience for end-users but usually at the cost of a loss in terms ...
Advances in information technologies gave a rise to powerful ubiquitous com- puting devices, and dig...
Le chiffrement homomorphe est une branche de la cryptologie, dans laquelle les schémas de chiffremen...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
En ayant le respect de la vie privée en tête, nous nous sommes attachés, durant cette thèse, à la co...
With privacy in mind, we explored, in this thesis, the design and improvement of known cryptographic...
International audienceThe development of worldwide communications, along with the dramatic increase ...
The last decade has seen the massive democratization of smart devices such as phones, tablets, even ...
The purpose of this PhD is to design protocols to collaboratively train machine learning models whil...