Search Results - "Boyen, Xavier"
-
1
Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups
Published in Journal of cryptology (01-04-2008)“…We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our…”
Get full text
Journal Article -
2
Efficient Selective Identity-Based Encryption Without Random Oracles
Published in Journal of cryptology (01-10-2011)“…We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped…”
Get full text
Journal Article -
3
Unconditionally Anonymous Ring and Mesh Signatures
Published in Journal of cryptology (01-10-2016)“…We generalize the ring signature primitive into the more general notion of mesh signature. Ring signatures are anonymous signatures made by someone who wishes…”
Get full text
Journal Article -
4
Authentication strategies in vehicular communications: a taxonomy and framework
Published in EURASIP journal on wireless communications and networking (21-05-2021)“…In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems…”
Get full text
Journal Article -
5
Origami Store: UC-Secure Foldable Datachains for the Quantum Era
Published in IEEE access (2021)“…Traditional blockchains preserve everything, if verification is to avoid trusted third parties. The accumulation of outdated but undeletable data makes…”
Get full text
Journal Article -
6
Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies
Published in IEEE access (2022)“…Confidential Transactions (CT) hide coin amounts even from verifiers without the help of trusted third parties. Aggregable CTs are a scalable category of CTs…”
Get full text
Journal Article -
7
LACT+: Practical Post-Quantum Scalable Confidential Transactions
Published in Cryptography (01-05-2023)“…A “confidential monetary value” carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential…”
Get full text
Journal Article -
8
Forward-Secure Linkable Ring Signatures from Bilinear Maps
Published in Cryptography (01-12-2018)“…We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct…”
Get full text
Journal Article -
9
Associative Blockchain for Decentralized PKI Transparency
Published in Cryptography (2021)“…The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs),…”
Get full text
Journal Article -
10
The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration
Published in Cryptography (01-03-2021)“…The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised…”
Get full text
Journal Article -
11
Signcryption schemes with insider security in an ideal permutation model
Published in Journal of mathematical cryptology (01-06-2019)“…Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The…”
Get full text
Journal Article -
12
Efficient public-key encryption with equality test from lattices
Published in Theoretical computer science (12-11-2021)“…Public-key encryption with equality (PKEET) test enables testing if two ciphertexts, possibly under two different public keys, encrypt the same messages…”
Get full text
Journal Article -
13
An asset-backed decentralised finance instrument for food supply chains – A case study from the livestock export industry
Published in Computers in industry (01-05-2023)“…Decentralised finance (DeFi) has emerged as a blockchain-enabled innovation in supply chains that makes use of supporting infrastructure to transform financial…”
Get full text
Journal Article -
14
CCA-security from adaptive all-but-one lossy trapdoor functions
Published in Theoretical computer science (03-09-2021)“…In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a variant of all-but-one lossy trapdoor functions. An…”
Get full text
Journal Article -
15
Efficient Lattice (H)IBE in the Standard Model
Published in Advances in Cryptology – EUROCRYPT 2010 (2010)“…We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard…”
Get full text
Book Chapter -
16
A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications
Published in IEEE transactions on vehicular technology (01-09-2021)“…In the near future, Vehicle-to-Vehicle (V2V) transmission will enable wireless broadcast communication among nearby vehicles. Benefits for users include…”
Get full text
Journal Article -
17
A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles
Published in IEEE transactions on dependable and secure computing (01-07-2024)“…Wireless broadcast transmission technology enables vehicles to communicate with other nearby vehicles and with nearby fixed equipment. Vehicles and equipment…”
Get full text
Journal Article -
18
ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption
Published in IEEE transactions on dependable and secure computing (01-05-2023)“…Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles. This communication supports…”
Get full text
Journal Article -
19
From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains
Published in Computer networks (Amsterdam, Netherlands : 1999) (09-12-2021)“…●Introduces a novel approach to social consensus in blockchain protocols.●Uses a theoretically grounded design rationale to inform system…”
Get full text
Journal Article -
20
On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side
Published in IEEE transactions on information forensics and security (2021)“…In the near future, intelligent vehicles will be connected via wireless communication links, forming Vehicular Ad-hoc Networks (VANETs). This has potential to…”
Get full text
Journal Article