Cryptography is an active field of theoretical research. It is also a place where many unproven,but time-tested practical ideas exist. This work exposits a few strands that connectthese two sides of the Cryptographic coin.The two main results presented are,1. The first traitor tracing scheme based on prime order bilinear groups. While primeorder bilinear groups are practical, existing schemes for traitor tracing were basedon the more structurally rich, but much less practical composite order bilinear groups.Our work brings the rich structure of composite order bilinear groups and the efficiencyof prime order groups together.2. A formal model for CAPTCHAs which captures the intuition that any automatonmust request human help to solve CAPTCHA...
In this thesis, we consider the traitor tracing problem. We study codes with different traceability ...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...
We formalize the simulation paradigm of cryptography in terms of category theory and show that proto...
In this thesis we present the latest developments in composite-order pairing based cryptography. We ...
International audienceWe present the first identity-based traitor tracing scheme. The scheme is show...
We construct a public key encryption scheme in which there is one public encryption key, but many pr...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts an...
An asymmetric pairing over groups of composite order is a bilinear map e: G1 ×G2 → GT for groups G1 ...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
In The Second Theory of Cryptography Conference (TCC 2005), Boneh, Goh, and Nissim proposed a new st...
We construct the first fully collusion resistant tracing traitors system with sublinear size ciphert...
Composite-order bilinear groups provide many structural features that are useful for both con-struct...
Composite order bilinear groups have some elegant structural characteristics that are useful in cons...
Abstract. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with ...
The notion of traitor tracing was introduced by Chor, Fiat, and Naor [47] in the early 90s with the ...
In this thesis, we consider the traitor tracing problem. We study codes with different traceability ...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...
We formalize the simulation paradigm of cryptography in terms of category theory and show that proto...
In this thesis we present the latest developments in composite-order pairing based cryptography. We ...
International audienceWe present the first identity-based traitor tracing scheme. The scheme is show...
We construct a public key encryption scheme in which there is one public encryption key, but many pr...
We construct a fully collusion resistant tracing traitors system with sublinear size ciphertexts an...
An asymmetric pairing over groups of composite order is a bilinear map e: G1 ×G2 → GT for groups G1 ...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
In The Second Theory of Cryptography Conference (TCC 2005), Boneh, Goh, and Nissim proposed a new st...
We construct the first fully collusion resistant tracing traitors system with sublinear size ciphert...
Composite-order bilinear groups provide many structural features that are useful for both con-struct...
Composite order bilinear groups have some elegant structural characteristics that are useful in cons...
Abstract. In Ciphertext-Policy Attribute-Based Encryption (CP-ABE), access policies associated with ...
The notion of traitor tracing was introduced by Chor, Fiat, and Naor [47] in the early 90s with the ...
In this thesis, we consider the traitor tracing problem. We study codes with different traceability ...
A (public key) Trace and Revoke Scheme combines the functionality of broadcast encryption with the c...
We formalize the simulation paradigm of cryptography in terms of category theory and show that proto...