This thesis focuses on polynomial commitment schemes - cryptographic protocols that allow committing to a polynomial and, subsequently, proving the correctness of evaluations of the committed polynomial at requested points. As our main results, we present new schemes that enable committing to multivariate polynomials and efficiently proving the correctness of evaluations at multiple points. As the main technical tools for our constructions, we use theorems from abstract algebra related to ideals of polynomial rings and some group-theoretic properties. Compared to the state-of-the-art that inspired our work, our main contribution is the improved communication complexity achieved by our protocol
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
This electronic version was submitted by the student author. The certified thesis is available in th...
International audienceThe evaluation of a polynomial at several points is called the problem of mult...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
International audienceThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in...
AbstractThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate ...
The object of this paper is the concrete security of recent multivariate signature schemes. A major...
AbstractThe ring signature scheme is an important cryptographic primitive that enables a user to sig...
We present Boomy, a multivariate polynomial commitment scheme enabling the proof of the evaluation o...
International audienceOblivious Polynomial Evaluation (OPE) schemes are interactive protocols betwee...
Recently Landau and Diffie gave in a series of articles in the Notices of the American Mathematical ...
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our crypt...
International audienceIn this paper, we investigate the security of a hash function based on the eva...
International audienceIn this paper, we present an efficient and general algorithm for decomposing m...
This thesis deals with multivariate cryptography. It includes specifically a description of the MQ p...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
This electronic version was submitted by the student author. The certified thesis is available in th...
International audienceThe evaluation of a polynomial at several points is called the problem of mult...
Abstract. We study the design of efficient and private protocols for polynomial operations in the sh...
International audienceThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in...
AbstractThe Isomorphism of Polynomials (IP) is one of the most fundamental problems in multivariate ...
The object of this paper is the concrete security of recent multivariate signature schemes. A major...
AbstractThe ring signature scheme is an important cryptographic primitive that enables a user to sig...
We present Boomy, a multivariate polynomial commitment scheme enabling the proof of the evaluation o...
International audienceOblivious Polynomial Evaluation (OPE) schemes are interactive protocols betwee...
Recently Landau and Diffie gave in a series of articles in the Notices of the American Mathematical ...
In this paper, we propose an efficient multivariate public key cryptosystem. Public key of our crypt...
International audienceIn this paper, we investigate the security of a hash function based on the eva...
International audienceIn this paper, we present an efficient and general algorithm for decomposing m...
This thesis deals with multivariate cryptography. It includes specifically a description of the MQ p...
Polynomial system solving is one of the oldest and most important problems incomputational mathemati...
This electronic version was submitted by the student author. The certified thesis is available in th...
International audienceThe evaluation of a polynomial at several points is called the problem of mult...