Search Results - "Boyen, Xavier"

Refine Results
  1. 1

    Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups by Boneh, Dan, Boyen, Xavier

    Published in Journal of cryptology (01-04-2008)
    “…We describe a short signature scheme that is strongly existentially unforgeable under an adaptive chosen message attack in the standard security model. Our…”
    Get full text
    Journal Article
  2. 2

    Efficient Selective Identity-Based Encryption Without Random Oracles by Boneh, Dan, Boyen, Xavier

    Published in Journal of cryptology (01-10-2011)
    “…We construct two efficient Identity-Based Encryption (IBE) systems that admit selective-identity security reductions without random oracles in groups equipped…”
    Get full text
    Journal Article
  3. 3

    Unconditionally Anonymous Ring and Mesh Signatures by Boyen, Xavier

    Published in Journal of cryptology (01-10-2016)
    “…We generalize the ring signature primitive into the more general notion of mesh signature. Ring signatures are anonymous signatures made by someone who wishes…”
    Get full text
    Journal Article
  4. 4

    Authentication strategies in vehicular communications: a taxonomy and framework by Rezazadeh Baee, Mir Ali, Simpson, Leonie, Boyen, Xavier, Foo, Ernest, Pieprzyk, Josef

    “…In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems…”
    Get full text
    Journal Article
  5. 5

    Origami Store: UC-Secure Foldable Datachains for the Quantum Era by Alupotha, Jayamine, Boyen, Xavier

    Published in IEEE access (2021)
    “…Traditional blockchains preserve everything, if verification is to avoid trusted third parties. The accumulation of outdated but undeletable data makes…”
    Get full text
    Journal Article
  6. 6

    Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies by Alupotha, Jayamine, Boyen, Xavier, Mckague, Matthew

    Published in IEEE access (2022)
    “…Confidential Transactions (CT) hide coin amounts even from verifiers without the help of trusted third parties. Aggregable CTs are a scalable category of CTs…”
    Get full text
    Journal Article
  7. 7

    LACT+: Practical Post-Quantum Scalable Confidential Transactions by Alupotha, Jayamine, Boyen, Xavier, McKague, Matthew

    Published in Cryptography (01-05-2023)
    “…A “confidential monetary value” carries information about the real monetary value but does not disclose it. Post-quantum private blockchains with confidential…”
    Get full text
    Journal Article
  8. 8

    Forward-Secure Linkable Ring Signatures from Bilinear Maps by Boyen, Xavier, Haines, Thomas

    Published in Cryptography (01-12-2018)
    “…We present the first linkable ring signature scheme with both unconditional anonymity and forward-secure key update: a powerful tool which has direct…”
    Get full text
    Journal Article
  9. 9

    Associative Blockchain for Decentralized PKI Transparency by Boyen, Xavier, Herath, Udyani, McKague, Matthew, Stebila, Douglas

    Published in Cryptography (2021)
    “…The conventional public key infrastructure (PKI) model, which powers most of the Internet, suffers from an excess of trust into certificate authorities (CAs),…”
    Get full text
    Journal Article
  10. 10

    The Cryptographic Complexity of Anonymous Coins: A Systematic Exploration by Amarasinghe, Niluka, Boyen, Xavier, McKague, Matthew

    Published in Cryptography (01-03-2021)
    “…The modern financial world has seen a significant rise in the use of cryptocurrencies in recent years, partly due to the convincing lure of anonymity promised…”
    Get full text
    Journal Article
  11. 11

    Signcryption schemes with insider security in an ideal permutation model by Bansal Tarun Kumar, Boyen Xavier, Pieprzyk Josef

    Published in Journal of mathematical cryptology (01-06-2019)
    “…Signcryption aims to provide both confidentiality and authentication of messages more efficiently than performing encryption and signing independently. The…”
    Get full text
    Journal Article
  12. 12

    Efficient public-key encryption with equality test from lattices by Li, Qinyi, Boyen, Xavier

    Published in Theoretical computer science (12-11-2021)
    “…Public-key encryption with equality (PKEET) test enables testing if two ciphertexts, possibly under two different public keys, encrypt the same messages…”
    Get full text
    Journal Article
  13. 13

    An asset-backed decentralised finance instrument for food supply chains – A case study from the livestock export industry by Miller, Thomas, Cao, Shoufeng, Foth, Marcus, Boyen, Xavier, Powell, Warwick

    Published in Computers in industry (01-05-2023)
    “…Decentralised finance (DeFi) has emerged as a blockchain-enabled innovation in supply chains that makes use of supporting infrastructure to transform financial…”
    Get full text
    Journal Article
  14. 14

    CCA-security from adaptive all-but-one lossy trapdoor functions by Li, Qinyi, Boyen, Xavier, Foo, Ernest

    Published in Theoretical computer science (03-09-2021)
    “…In this paper, we propose the notion of adaptive all-but-one lossy trapdoor functions (aABO-LTFs), a variant of all-but-one lossy trapdoor functions. An…”
    Get full text
    Journal Article
  15. 15

    Efficient Lattice (H)IBE in the Standard Model by Agrawal, Shweta, Boneh, Dan, Boyen, Xavier

    “…We construct an efficient identity based encryption system based on the standard learning with errors (LWE) problem. Our security proof holds in the standard…”
    Get full text
    Book Chapter
  16. 16

    A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications by RezazadehBaee, Mir Ali, Simpson, Leonie, Boyen, Xavier, Foo, Ernest, Pieprzyk, Josef

    Published in IEEE transactions on vehicular technology (01-09-2021)
    “…In the near future, Vehicle-to-Vehicle (V2V) transmission will enable wireless broadcast communication among nearby vehicles. Benefits for users include…”
    Get full text
    Journal Article
  17. 17

    A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles by Baee, Mir Ali Rezazadeh, Simpson, Leonie, Boyen, Xavier, Foo, Ernest, Pieprzyk, Josef

    “…Wireless broadcast transmission technology enables vehicles to communicate with other nearby vehicles and with nearby fixed equipment. Vehicles and equipment…”
    Get full text
    Journal Article
  18. 18

    ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption by Baee, Mir Ali Rezazadeh, Simpson, Leonie, Boyen, Xavier, Foo, Ernest, Pieprzyk, Josef

    “…Wireless broadcast transmission enables Inter-vehicle or Vehicle-to-Vehicle (V2V) communication among nearby vehicles. This communication supports…”
    Get full text
    Journal Article
  19. 19

    From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains by Powell, Warwick, Cao, Shoufeng, Miller, Thomas, Foth, Marcus, Boyen, Xavier, Earsman, Barry, del Valle, Santiago, Turner-Morris, Charles

    “…●Introduces a novel approach to social consensus in blockchain protocols.●Uses a theoretically grounded design rationale to inform system…”
    Get full text
    Journal Article
  20. 20

    On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side by Baee, Mir Ali Rezazadeh, Simpson, Leonie, Boyen, Xavier, Foo, Ernest, Pieprzyk, Josef

    “…In the near future, intelligent vehicles will be connected via wireless communication links, forming Vehicular Ad-hoc Networks (VANETs). This has potential to…”
    Get full text
    Journal Article