Current & Past PhD Students
- Nathan Papon (Telecom Paris, Institut Polytechnique de Paris, co-supervision with Sébastien Canard)
- Duy Nguyen (Telecom Paris, Institut Polytechnique de Paris, co-supervision with David Pointcheval)
- Orel Cosseron (ENS Lyon, co-supervision with Damien Stehlé)
- Ferran Alborch Escobar (Orange + Telecom Paris, co-supervision with Sébastien Canard and Fabien Laguillaumie)
- Ky Nguyen (ENS, co-supervision with David Pointcheval)
- Antoine Urban (Telecom Paris, Institut Polytechnique de Paris, co-supervision with Matthieu Rambaud)
- Chloé Hebant (ENS, co-supervision with David Pointcheval, defended 05/2021)
- Xuan Thanh Do (XLIM-Limoges and Vietnam National University, co-supervision with Le Minh Ha, defended 03/2021)
- Laura Brouilhet (XLIM-Limoges, co-supervision with Olivier Blazy, defended 12/2020)
- Jérémy Chotard (XLIM-Limoges and ENS, co-supervision with David Pointcheval, defended 12/2019)
- Paul Germouty (XLIM-Limoges, co-supervision with Olivier Blazy, defended 09/2018)
- Trinh Viet Cuong (LAGA-Paris 8, co-supervision with Claude Carlet, defended 12/2013)
Papers in cryptography
- Fully Dynamic Attribute-Based Signatures for Circuits from Codes
with San Ling (NTU), Khoa Nguyen (Univ. of Wollongong), Khai Hanh Tang (NTU), Huaxiong Wang (NTU) and Yanhong Xu (Shanghai Jiao Tong Univ.)
Accepted for IACR PKC 2024, Sydney, 2024.
- Verifiable Decentralized Multi-Client Functional Encryption for Inner Product
with Dinh Duy Nguyen (Telecom Paris, IPP) and David Pointcheval (ENS)
In Advances in Cryptology - IACR ASIACRYPT 2023.
[pdf] - Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication!
with Mirek Kutylowski (Wroclaw University of Science and Technology), Giuseppe Persiano (Università di Salerno and Google), Moti Yung (Google and Columbia University) and Marcin Zawada (Wroclaw University of Science and Technology)
In Advances in Cryptology - IACR CRYPTO 2023.
[pdf] - The Self-Anti-Censorship Nature of Encryption:
On the Prevalence of Anamorphic Cryptography
with Mirek Kutylowski (Wroclaw University of Science and Technology), Giuseppe Persiano (Università di Salerno and Google), Moti Yung (Google and Columbia University) and Marcin Zawada (Wroclaw University of Science and Technology)
In Proceedings on Privacy Enhancing Technologies - PoPETs 2023.
[pdf] - Optimal Security Notion for Decentralized Multi-Client Functional Encryption
with Ky Nguyen (ENS) and David Pointcheval (ENS)
In Applied Cryptography and Network Security - ACNS 2023.
[pdf] - Privacy-Preserving Digital Vaccine Passport
with Thai Duong (Google), Jiahui Gao (Arizona State University) and Ni Trieu (Arizona State University)
In International Conference on Cryptology and Network Security - CANS 2023.
[pdf] - Multi-Client Functional Encryption with Fine-Grained Access
Control
with Ky Nguyen (ENS) and David Pointcheval (ENS)
In Advances in Cryptology - IACR ASIACRYPT 2022.
[pdf] - Anamorphic Encryption: Private Communication against a Dictator
with Giuseppe Persiano (Univ. of Salerno) and Moti Yung (Google and Columbia Univ.)
In Advances in Cryptology - IACR EUROCRYPT 2022.
[pdf] - Privacy in Advanced Cryptographic Protocols: Prototypical Examples
with Moti Yung (Google and Columbia Univ.)
In Journal of Computer Science and Cybernetics, Vietnamese Academy of Science and Technology, Vietnam,, 2021, 37 (4), pp.429-451.
(Invited paper, dedicated to the memory of Professor Phan Dinh Dieu)
[pdf] - Zero-Knowledge Proofs for Committed Symmetric Boolean Functions
with San Ling(NTU), Khoa Nguyen (NTU), Hanh Tang (NTU) and Huaxiong Wang (NTU)
In Post-Quantum Cryptography 2021
- An Anonymous Trace-and-Revoke Broadcast Encryption Scheme
with Olivier Blazy (Ecole Polytechnique), Sayantan Mukherjee (Limoges Univ.), Huyen Nguyen (ENS Lyon) and Damien Stehlé (ENS Lyon)
In ACISP 2021.
- Catalic: Delegated PSI Cardinality with Applications to Contact Tracing
with Thai Duong (Google) and Ni Trieu (Arizona State University)
In Advances in Cryptology - IACR ASIACRYPT 2020.
[pdf] - Dynamic Decentralized Functional Encryption
with Jérémy Chotard (Limoges Univ.), Edouard Dufour-Sans (CMU), Romain Gay (Cornell Tech), and David Pointcheval (ENS)
In Advances in Cryptology - IACR CRYPTO 2020.
[pdf] - A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes
with Xuan Thanh Do (VNU, Vietnam and Limoges Univ.) and Moti Yung (Google and Columbia Univ.)
In ACNS 2020, Roma, 2020.
[pdf] - Linearly-Homomorphic Signatures and Scalable Mix-Nets
with Chloé Hebant (ENS) and David Pointcheval (ENS)
In IACR PKC 2020, Edinburgh, 2020.
[pdf] - Traceable Inner Product Functional Encryption
with Xuan Thanh Do (VNU, Vietnam and Limoges Univ.) and David Pointcheval (ENS)
In CT-RSA 2020, San Francisco, 2020.
[pdf] - Advances in security research in the Asiacrypt region
Article edited with the members of the Asiacrypt Steering Committee
In Communications of the ACM , 2020
[pdf] - Downgradable Identity-based Encryption and Applications
with Olivier Blazy (Limoges Univ.), Paul Germouty (Limoges Univ.)
In CT-RSA '19, San Francisco, 2019.
[pdf] - Anonymous IBE with Traceable Identities
with Olivier Blazy(Limoges Univ.), and Laura Brouilhet (Limoges Univ.)
In 14th International Conference on Availability, Reliability and Security (ARES 2019) , Canterbury, United Kingdom, 2019.
- Decentralized Evaluation of Quadratic Polynomials on Encrypted Data
with Chloé Hebant (ENS) and David Pointcheval (ENS)
In 22th Information Security Conference , New York, United States, 2019.
[pdf] - Decentralized Multi-Client Functional Encryption for Inner Product
with Jérémy Chotard (Limoges Univ.), Edouard Dufour Sans (ENS) , Romain Gay (ENS) and David Pointcheval (ENS)
In Advances in Cryptology - IACR ASIACRYPT '18 , Springer, 2018.
[pdf] - A New Technique for Compacting Ciphertext in Multi-Channel Broadcast Encryption and Attribute-Based Encryption
with Sébastien Canard (Oranges Lab) David Pointcheval (ENS) and Viet Cuong Trinh (Hong Duc Univ., Vietnam)
In Theoretical Computer Science, Vol 723, pages 51-72, 2018.
- An Attribute-based Broadcast Encryption Scheme For Lightweight Devices
with Sébastien Canard (Oranges Lab) and Viet Cuong Trinh (Hong Duc Univ., Vietnam)
In IET Information Security , Vol. 12, Issue 1, 2018.
- Efficient Public Trace and Revoke from Standard Assumptions
with Shweta Agrawal (IIT Madras, India), Sanjay Bhattacherjee (Turing Lab, ISI Kolkata, India), and Damien Stehlé (ENS Lyon) and Shota Yamada AIST, Japan)
In ACM CCS 2017.
[pdf] - Identity-based Encryption from Codes with Rank Metric
with Philippe Gaborit (Limoges Univ.), Adrien Hauteville (Limoges Univ.) and Jean-Pierre Tillich (INRIA)
In Advances in Cryptology - IACR CRYPTO 2017.
[pdf] - Hardness of k-LWE and Applications in Traitor Tracing
with San Ling (NTU), Damien Stehlé (ENS Lyon) and Ron Steinfeld (Monash University)
Invited paper for Algorithmica, December 2017, Volume 79, Issue 4, pp 1318–1352.
(This is the long version of the proceeding version which appears in Advances in Cryptology - IACR CRYPTO 2014.)
[pdf] - Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
with Jérémy Chotard (Limoges Univ.) and David Pointcheval (ENS)
In ISC 2017.
[pdf] - Cryptography During the French and American Wars in Vietnam
with Neal Koblitz (Univ. of Washington)
In Cryptologia, 2017.
[pdf] - A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption
with Sébastien Canard (Oranges Lab) and Viet Cuong Trinh (Hong Duc Univ., Vietnam)
In CANS 2016.
- Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
with David Pointcheval (ENS), Siamak F Shahandashti (ENS) and Mario Strefler (ENS)
In IJIS - International Journal of Information Security, vol. 12,, no. 4, Pages 251-265, 2013.[pdf]
(an implementation of our scheme and its efficiency analysis are given in this paper) - Black-box Trace&Revoke Codes
with Hung Q. Ngo (State Univ. of New York at Buffalo) and David Pointcheval (ENS)
In Algorithmica, Springer, vol. 67, no. 3, Pages 418-448, 2013.
[pdf] - Multi-Channel Broadcast Encryption
with David Pointcheval (ENS) and Viet Cuong Trinh (Paris 8 Univ.)
In ASIACCS 2013, ACM Symposium on Information, Computer and Communications Security, ACM Press, Pages 277-286, 2013.[pdf]
- Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model.
with Philippe Guillot (Paris 8 Univ.), Abdelkrim Nimour (NAGRA) and Viet Cuong Trinh (Paris 8 Univ.)
In AFRICACRYPT 2013, LNCS 7918, pages 140-155, Springer-Verlag, 2013.[pdf]
- Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model
with Viet Cuong Trinh (Paris 8 Univ.)
In AFRICACRYPT 2013, LNCS 7918, pages 342-358, Springer-Verlag, 2013.[pdf]
- Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
with Michel Abdalla (ENS), Angelo De Caro (ENS)
In IEEE-TIFS, IEEE Transactions on Information Forensics & Security, Volume 7 , Issue: 6, Pages 1695 - 1706[pdf]
- Message Tracing with Optimal Ciphertext Rate.
with David Pointcheval (ENS) and Mario Strefler (ENS)
In LatinCrypt' 2012, LNCS 7533, pages 56-77, Springer-Verlag, 2012.[pdf]
- Decentralized Dynamic Broadcast Encryption
with David Pointcheval (ENS) and Mario Strefler (ENS)
In SCN' 2012, LNCS 7485, Springer-Verlag, 2012.[pdf]
- Security Notions for Broadcast Encryption.
with David Pointcheval (ENS) and Mario Strefler (ENS)
In ACNS' 2011, LNCS 6715, pages 377-394, Springer-Verlag, 2011.(Best Student Paper Award for Mario)
[pdf] - Identity-Based Trace and Revoke Schemes.
with Viet-Cuong Trinh (Paris 8 Univ.)
In ProvSec' 2011, LNCS 6980, pages 204-221, Springer-Verlag, 2011.[ pdf]
- Traitors Collaborating in Public: Pirates 2.0
with Olivier Billet (Oranges Lab)
In Advances in Cryptology - IACR EUROCRYPT '09, LNCS 5479, pages 189-205, Springer-Verlag, 2009.[ pdf]
- Efficient Traitor Tracing from Collusion Secure Codes
with Olivier Billet (Oranges Lab)
In Proceeding of ICITS '08 -The 3rd International Conference on Information Theoretic Security, Pages 171-182, LNCS 5155, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- A CCA Secure Hybrid Damgaard's ElGamal Encryption
with Yvo Desmedt (University College London)
In Proceeding of ProvSec '08, Lecture Notes in Computer Science Vol. 5324, pages 68-92, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Hybrid Damgård Is CCA1-Secure under the DDH Assumption
with Yvo Desmedt (University College London), Helger Lipmaa (University College London)
In Proceeding of CANS '08 -The 7th International Conference on Cryptology and Network Security, Pages 18-30, LNCS 5339, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Traitor Tracing with Optimal Transmission Rate
with Nelly Fazio (IBM Research), Antonio Nicolosi (New York University and Stanford University)
In Proceeding of ISC '07 - 10th International Conference on Information Security, Pages 71-88, LNCS 4779, Springer-Verlag, 2007.[ pdf] [ ps] [ pdf USletter]
- Identity-Based Traitor Tracing
with Michel Abdalla (ENS), Alex Dent (Royal Holloway), John Malone-Lee (Univ. of Bristol), Gregory Neven (Katholieke Universiteit Leuven) and Nigel Smart (Univ. of Bristol)
In IACR PKC '07 , Pages 361-376, LNCS 4450, Springer-Verlag, @IACR, 2007.[ pdf] [ ps] [ pdf USletter]
- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
In Proceeding of Vietcrypt '06, P. Nguyen Ed. Pages 354-365, LNCS 4341, Springer-Verlag, 2006.[ pdf] [ ps] [ pdf USletter]
- Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability
with Rei Safavi-Naini (Wollongong Univ.) and Dongvu Tonien (Wollongong Univ.)
In Proceeding of ICALP '06 - 33rd International Colloquium on Automata, Languages and Programming, Pages 264-275, LNCS 4052, Springer-Verlag, 2006.[ pdf] [ ps] [ pdf USletter]
- Public Traceability in Traitor Tracing Schemes
with Hervé Chabanne (SAGEM) and David Pointcheval (ENS)
In Advances in Cryptology-IACR EUROCRYPT '05, R.Cramer Ed. Pages 542-558, LNCS 3494, Springer-Verlag, @IACR, 2005.[ pdf] [ ps] [ pdf USletter]
- Optimal Asymmetric Encryption and Signature Paddings
with Benoît Chevallier-Mames (Gemplus) and David Pointcheval (ENS)
In Proceeding of ACNS '05, pages 254-268, LNCS 3531, Springer-Verlag, 2005.[ pdf] [ ps] [ pdf USletter]
- OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding
with David Pointcheval (ENS)
In Advances in Cryptology- IACR ASIACRYPT '04, P.J. Lee Ed. Pages 63-77, LNCS 3329, Springer-Verlag, @IACR, 2004.[ pdf] [ ps] [ pdf USletter]
- On the Security Notions for Public-Key Encryption Schemes
with David Pointcheval (ENS)
In Proceeding of SCN'04, C. Blundo Ed. Pages 33--47, LNCS 3352, Springer-Verlag, 2004.[ pdf] [ ps] [ pdf USletter]
- About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
with David Pointcheval (ENS)
In Proceeding of SAC'04, H. Handschuh and A. Hasan Eds. Pages 185--200, LNCS 3357, Springer-Verlag, 2004.[ pdf] [ ps] [ pdf USletter]
- Chosen-Ciphertext Security without Redundancy
with David Pointcheval (ENS)
In Advances in Cryptology-IACR ASIACRYPT '03, C.~L.~Laih Ed. Pages 1-18, LNCS 2894, Springer-Verlag, @IACR, 2005.[ pdf] [ ps] [ pdf USletter]
- A Comparison between two Methods of Security Proof
with David Pointcheval (ENS)
In Proceeding of RIVF. Pages 105-110, Hanoï -- February 2003 (in french).[ ps] [ pdf USletter]
Papers in other domains
- Some Preliminary Results on the Stableness of Extended F-rule Systems
with Thanh Thuy Nguyen (Hanoi Univ. of Science and Technology) and Yamanoi Takahiro (Hokkaido University, Japan)
Journal of Advanced Computational Intelligence. Pages 252-259, Vol.7 No.3, 2003. - Interval-valued Probabilistic Reasoning Agents
with Thanh Thuy Nguyen (Hanoi Univ. of Science and Technology)
In Proceeding of the 3rd International Conference on Artificial Intelligence/ Internet Computing, USA, 2002. - Decomposing Knowledge Systems of F-rules
with Thanh Thuy Nguyen (Hanoi Univ. of Science and Technology)
Journal of Science and Technology, NCSR Vietnam, 40(2), 2002 (in vietnamese). - Reasoning in Knowledge Systems of F-rules
with Thanh Thuy Nguyen (Hanoi Univ. of Science and Technology)
Journal of Computer science and Cybernetics, 17(1), 2001 (in vietnamese).
Patents
- Traceable System for Encrypting/Decrypting Broadcast Digital Data.
- Obtaining Derived Values Depending on a Secret Master Value.
Habilitation Thesis
PhD Thesis
Master Report
- Une comparaison des preuves de sécurité (méthode formelle vs. méthode calculatoire)
[ pdf ]