In The Second Theory of Cryptography Conference (TCC 2005), Boneh, Goh, and Nissim proposed a new structure of bilinear groups that have a composite order and a new cryptosystem which is intractable on a decisional problem over the subgroup in such structure [BGN05]. Their proposal, which referred to as the BGN cryptosystem by researchers, receive much attention and is quickly followed by two publications in CRYPTO'05 [BI05, OI05].In this thesis, the author performs in-depth study of the BGN public-key cryptosystem and existing literatures on its applications. The author observes two properties of BGN, namely the indistinguishability of the BGN ciphertexts of sum and product of two messages, and the verifiability of elements from composite ...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
Abstract. In CRYPTO 2012, Sahai et al. raised the concern that in a cloud control system revo-cation...
This book is about relations between three different areas of mathematics and theoretical computer s...
We instantiate the cryptosystem proposed by Boneh, Goh, and Nissim in TCC'05 [5] into an entity auth...
We construct a simple public-key encryption scheme that supports polynomially many ad-ditions and on...
An asymmetric pairing over groups of composite order is a bilinear map e: G1 ×G2 → GT for groups G1 ...
Cryptography is an active field of theoretical research. It is also a place where many unproven,but ...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Let ψ be a 2-DNF formula on boolean variables x1,..., xn ∈ {0, 1}. We present a homomorphic public k...
International audienceSince the seminal paper on Fully Homomorphic Encryption (FHE) by Gentry in 200...
Let ψ be a 2-DNF formula on boolean variables x1,..., xn ∈ {0, 1}. We present a homomor-phic public ...
Composite order bilinear groups have some elegant structural characteristics that are useful in cons...
Abstract In this paper we introduce new primitives to authenticate computation on data expressed as ...
Composite order pairing setting has been used to achieve cryptographic functionalities beyond what i...
International audienceWe give a generic methodology to unlinkably anonymize cryptographic schemes in...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
Abstract. In CRYPTO 2012, Sahai et al. raised the concern that in a cloud control system revo-cation...
This book is about relations between three different areas of mathematics and theoretical computer s...
We instantiate the cryptosystem proposed by Boneh, Goh, and Nissim in TCC'05 [5] into an entity auth...
We construct a simple public-key encryption scheme that supports polynomially many ad-ditions and on...
An asymmetric pairing over groups of composite order is a bilinear map e: G1 ×G2 → GT for groups G1 ...
Cryptography is an active field of theoretical research. It is also a place where many unproven,but ...
Nowadays, the design of new cryptographic schemes follows the modern methodology of provable securi...
Let ψ be a 2-DNF formula on boolean variables x1,..., xn ∈ {0, 1}. We present a homomorphic public k...
International audienceSince the seminal paper on Fully Homomorphic Encryption (FHE) by Gentry in 200...
Let ψ be a 2-DNF formula on boolean variables x1,..., xn ∈ {0, 1}. We present a homomor-phic public ...
Composite order bilinear groups have some elegant structural characteristics that are useful in cons...
Abstract In this paper we introduce new primitives to authenticate computation on data expressed as ...
Composite order pairing setting has been used to achieve cryptographic functionalities beyond what i...
International audienceWe give a generic methodology to unlinkably anonymize cryptographic schemes in...
This habilitation thesis deals with cryptographic primitives that preserve the algebraic structure o...
Abstract. In CRYPTO 2012, Sahai et al. raised the concern that in a cloud control system revo-cation...
This book is about relations between three different areas of mathematics and theoretical computer s...