International audienceDigital signatures are perhaps the most important base for authentication and trust relationships in large scale systems. More specifically, various applications of signatures provide privacy and anonymity preserving mechanisms and protocols, and these, in turn, are becoming critical (due to the recently recognized need to protect individuals according to national rules and regulations). A specific type of signatures called " signatures with efficient protocols " , as introduced by Camenisch and Lysyanskaya (CL), efficiently accommodates various basic protocols and extensions like zero-knowledge proofs, signing committed messages, or re-randomizability. These are, in fact, typical operations associated with signatures ...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
We provide a construction for a group signature scheme that is provably secure in a universally comp...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
International audienceDigital signatures are perhaps the most important base for authentication and ...
International audienceDigital signatures are perhaps the most important base for authentication and ...
International audienceRandomizable encryption lets anyone randomize a ciphertext so it is distribute...
International audienceGroup signatures are a central cryptographic primitive which allows users to s...
International audienceWe give a generic methodology to unlinkably anonymize cryptographic schemes in...
AbstractTraceable signatures (TS), suggested by Kiayias, Tsiounis and Yung (Eurocrypt’04), extend gr...
International audienceGroup signatures are a central cryptographic primitive which allows users to s...
International audienceOver the development of modern cryptography, often, alternative cryptographic ...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
We provide a construction for a group signature scheme that is provably secure in a universally comp...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...
International audienceDigital signatures are perhaps the most important base for authentication and ...
International audienceDigital signatures are perhaps the most important base for authentication and ...
International audienceRandomizable encryption lets anyone randomize a ciphertext so it is distribute...
International audienceGroup signatures are a central cryptographic primitive which allows users to s...
International audienceWe give a generic methodology to unlinkably anonymize cryptographic schemes in...
AbstractTraceable signatures (TS), suggested by Kiayias, Tsiounis and Yung (Eurocrypt’04), extend gr...
International audienceGroup signatures are a central cryptographic primitive which allows users to s...
International audienceOver the development of modern cryptography, often, alternative cryptographic ...
International audienceA recent line of works – initiated by Gordon, Katz and Vaikuntanathan (Asiacry...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This manuscript proposes new cryptographic protocols that are respectful of users’ privacy and which...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
This thesis addresses the question what cryptography can do for one personally, i.e., it looks at se...
We provide a construction for a group signature scheme that is provably secure in a universally comp...
In this thesis, we study provably secure privacy-preserving cryptographic constructions.We focus on ...