Papers in cryptography
- Duong Hieu Phan, David Pointcheval, Siamak F Shahandashti and Mario Strefler
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
To appear in IJIS - International Journal of Information Security(A short version of this paper is published in ACISP' 2012, LNCS 7372, pages 308-321, Springer-Verlag, 2012.) [pdf]
- Duong Hieu Phan, David Pointcheval and Viet Cuong Trinh
Multi-Channel Broadcast Encryption
Accepted for ASIACCS 2013, ACM Symposium on Information, Computer and Communications Security.[pdf]
- Hung Q. Ngo, Duong Hieu Phan and David Pointcheval
Black-box Trace&Revoke Codes
To appear in Algorithmica[pdf]
- Michel Abdalla, Angelo De Caro and Duong Hieu Phan
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
In IEEE-TIFS, IEEE Transactions on Information Forensics & Security, Volume 7 , Issue: 6, Pages 1695 - 1706[pdf]
- Duong Hieu Phan, David Pointcheval and Mario Strefler
Message Tracing with Optimal Ciphertext Rate.
In LatinCrypt' 2012, LNCS 7533, pages 56-77, Springer-Verlag, 2012.[pdf]
- Duong Hieu Phan, David Pointcheval and Mario Strefler
Decentralized Dynamic Broadcast Encryption
In SCN' 2012, LNCS 7485, Springer-Verlag, 2012.[pdf]
- Duong Hieu Phan, David Pointcheval and Mario Strefler
Security Notions for Broadcast Encryption.
In ACNS' 2011, LNCS 6715, pages 377-394, Springer-Verlag, 2011.(Best Student Paper Award for Mario)
[pdf] - Duong Hieu Phan and Viet-Cuong Trinh.
Identity-Based Trace and Revoke Schemes.
In ProvSec' 2011, LNCS 6980, pages 204-221, Springer-Verlag, 2011.[ pdf]
- Olivier Billet and Duong Hieu Phan.
Traitors Collaborating in Public: Pirates 2.0.
In Advances in Cryptology - Proceedings of EUROCRYPT '09, LNCS 5479, pages 189-205, Springer-Verlag, 2009.[ pdf]
- Olivier Billet and Duong Hieu Phan.
Efficient Traitor Tracing from Collusion Secure Codes.
In Proceeding of ICITS '08 -The 3rd International Conference on Information Theoretic Security, Pages 171-182, LNCS 5155, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Yvo Desmedt and Duong Hieu Phan.
A CCA Secure Hybrid Damgaard's ElGamal Encryption.
In Proceeding of ProvSec '08, Lecture Notes in Computer Science Vol. 5324, pages 68-92, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Yvo Desmedt, Helger Lipmaa and Duong Hieu Phan.
Hybrid Damgård Is CCA1-Secure under the DDH Assumption.
In Proceeding of CANS '08 -The 7th International Conference on Cryptology and Network Security, Pages 18-30, LNCS 5339, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Nelly Fazio, Antonio Nicolosi and Duong Hieu Phan.
Traitor Tracing with Optimal Transmission Rate.
In Proceeding of ISC '07 - 10th International Conference on Information Security, Pages 71-88, LNCS 4779, Springer-Verlag, 2007.[ pdf] [ ps] [ pdf USletter]
- Michel Abdalla, Alex Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan and Nigel Smart.
Identity-Based Traitor Tracing.
In Proceeding of PKC '07 - The International Conference on Theory and Practice of Public-Key Cryptography 2007, Pages 361-376, LNCS 4450, Springer-Verlag, @IACR, 2007.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan.
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.
In Proceeding of Vietcrypt '06, P. Nguyen Ed. Pages 354-365, LNCS 4341, Springer-Verlag, 2006.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan, Rei Safavi-Naini and Dongvu Tonien.
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
In Proceeding of ICALP '06 - 33rd International Colloquium on Automata, Languages and Programming, Pages 264-275, LNCS 4052, Springer-Verlag, 2006.[ pdf] [ ps] [ pdf USletter]
- Hervé Chabanne and Duong Hieu Phan and David Pointcheval.
Public Traceability in Traitor Tracing Schemes.
In Advances in Cryptology-Proceeding of Eurocrypt '05, R.Cramer Ed. Pages 542-558, LNCS 3494, Springer-Verlag, @IACR, 2005.[ pdf] [ ps] [ pdf USletter]
- Benoît Chevallier-Mames and Duong Hieu Phan and David Pointcheval.
Optimal Asymmetric Encryption and Signature Paddings.
In Proceeding of ACNS '05, pages 254-268, LNCS 3531, Springer-Verlag, 2005.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding.
In Advances in Cryptology-Proceeding of Asiacrypt '04, P.J. Lee Ed. Pages 63-77, LNCS 3329, Springer-Verlag, @IACR, 2004.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
On the Security Notions for Public-Key Encryption Schemes.
In Proceeding of SCN'04, C. Blundo Ed. Pages 33--47, LNCS 3352, Springer-Verlag, 2004.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations).
In Proceeding of SAC'04, H. Handschuh and A. Hasan Eds. Pages 185--200, LNCS 3357, Springer-Verlag, 2004.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
Chosen-Ciphertext Security without Redundancy.
In Advances in Cryptology-Proceeding of Asiacrypt '03, C.~L.~Laih Ed. Pages 1-18, LNCS 2894, Springer-Verlag, @IACR, 2005.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
A Comparison between two Methods of Security Proof.
In Proceeding of RIVF. Pages 105-110, Hanoï -- February 2003 (in french).[ ps] [ pdf USletter]
Papers in other domains
- Thanh Thuy Nguyen, Duong Hieu Phan and Yamanoi Takahiro.
Some Preliminary Results on the Stableness of Extended F-rule Systems.
Journal of Advanced Computational Intelligence. Pages 252-259, Vol.7 No.3, 2003. - Thanh Thuy Nguyen, Duong Hieu Phan.
Interval-valued Probabilistic Reasoning Agents.
In Proceeding of the 3rd International Conference on Artificial Intelligence/ Internet Computing, USA, 2002. - Thanh Thuy Nguyen, Duong Hieu Phan.
Decomposing Knowledge Systems of F-rules.Journal of Science and Technology, NCSR Vietnam, 40(2), 2002 (in vietnamese).
- Thanh Thuy Nguyen, Duong Hieu Phan.
Reasoning in Knowledge Systems of F-rules.Journal of Computer science and Cybernetics, 17(1), 2001 (in vietnamese).
Patents
- Traceable System for Encrypting/Decrypting Broadcast Digital Data.
- Obtaining Derived Values Depending on a Secret Master Value.
PhD Thesis