Papers in cryptography
- Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé and Shota Yamada
Efficient Public Trace and Revoke from Standard Assumptions
Accepted for ACM CCS 2017.
[pdf] - Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan and Jean-Pierre Tillich
Identity-based Encryption from Codes with Rank Metric
In Advances in Cryptology - CRYPTO 2017.
[pdf] - San Ling, Duong Hieu Phan, Damien Stehlé and Ron Steinfeld
Hardness of k-LWE and Applications in Traitor Tracing
Invited paper for Algorithmica, December 2017, Volume 79, Issue 4, pp 1318–1352.
(This is the long version of the proceeding version which appears in Advances in Cryptology - CRYPTO 2014.)
[pdf] - Sébastien Canard, Duong Hieu Phan and Viet Cuong Trinh
An Attribute-based Broadcast Encryption Scheme For Lightweight Devices
To appear in IET Information Security , 2017.
- Jérémy Chotard, Duong Hieu Phan and David Pointcheval
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms
To appear in ISC 2017.
[pdf] - Phan Dương Hiệu and Neal Koblitz
Cryptography During the French and American Wars in Vietnam
To appear in Cryptologia , 2017.
[pdf] - Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh
A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption
To appear in CANS 2016.
- Duong Hieu Phan, David Pointcheval, Siamak F Shahandashti and Mario Strefler
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts
In IJIS - International Journal of Information Security, vol. 12,, no. 4, Pages 251-265, 2013.[pdf]
(an implementation of our scheme and its efficiency analysis are given in this paper) - Hung Q. Ngo, Duong Hieu Phan and David Pointcheval
Black-box Trace&Revoke Codes
In Algorithmica, Springer, vol. 67, no. 3, Pages 418-448, 2013.[pdf]
- Duong Hieu Phan, David Pointcheval and Viet Cuong Trinh
Multi-Channel Broadcast Encryption
In ASIACCS 2013, ACM Symposium on Information, Computer and Communications Security, ACM Press, Pages 277-286, 2013.[pdf]
- Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan and Viet Cuong Trinh
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model.
In AFRICACRYPT 2013, LNCS 7918, pages 140-155, Springer-Verlag, 2013.[pdf]
- Michel Abdalla, Angelo De Caro and Duong Hieu Phan
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption
In IEEE-TIFS, IEEE Transactions on Information Forensics & Security, Volume 7 , Issue: 6, Pages 1695 - 1706[pdf]
- Duong Hieu Phan, David Pointcheval and Mario Strefler
Message Tracing with Optimal Ciphertext Rate.
In LatinCrypt' 2012, LNCS 7533, pages 56-77, Springer-Verlag, 2012.[pdf]
- Duong Hieu Phan, David Pointcheval and Mario Strefler
Decentralized Dynamic Broadcast Encryption
In SCN' 2012, LNCS 7485, Springer-Verlag, 2012.[pdf]
- Duong Hieu Phan, David Pointcheval and Mario Strefler
Security Notions for Broadcast Encryption.
In ACNS' 2011, LNCS 6715, pages 377-394, Springer-Verlag, 2011.(Best Student Paper Award for Mario)
[pdf] - Duong Hieu Phan and Viet-Cuong Trinh.
Identity-Based Trace and Revoke Schemes.
In ProvSec' 2011, LNCS 6980, pages 204-221, Springer-Verlag, 2011.[ pdf]
- Olivier Billet and Duong Hieu Phan.
Traitors Collaborating in Public: Pirates 2.0.
In Advances in Cryptology - Proceedings of EUROCRYPT '09, LNCS 5479, pages 189-205, Springer-Verlag, 2009.[ pdf]
- Olivier Billet and Duong Hieu Phan.
Efficient Traitor Tracing from Collusion Secure Codes.
In Proceeding of ICITS '08 -The 3rd International Conference on Information Theoretic Security, Pages 171-182, LNCS 5155, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Yvo Desmedt and Duong Hieu Phan.
A CCA Secure Hybrid Damgaard's ElGamal Encryption.
In Proceeding of ProvSec '08, Lecture Notes in Computer Science Vol. 5324, pages 68-92, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Yvo Desmedt, Helger Lipmaa and Duong Hieu Phan.
Hybrid Damgård Is CCA1-Secure under the DDH Assumption.
In Proceeding of CANS '08 -The 7th International Conference on Cryptology and Network Security, Pages 18-30, LNCS 5339, Springer-Verlag, 2008.[ pdf] [ ps] [ pdf USletter]
- Nelly Fazio, Antonio Nicolosi and Duong Hieu Phan.
Traitor Tracing with Optimal Transmission Rate.
In Proceeding of ISC '07 - 10th International Conference on Information Security, Pages 71-88, LNCS 4779, Springer-Verlag, 2007.[ pdf] [ ps] [ pdf USletter]
- Michel Abdalla, Alex Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan and Nigel Smart.
Identity-Based Traitor Tracing.
In Proceeding of PKC '07 - The International Conference on Theory and Practice of Public-Key Cryptography 2007, Pages 361-376, LNCS 4450, Springer-Verlag, @IACR, 2007.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan.
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.
In Proceeding of Vietcrypt '06, P. Nguyen Ed. Pages 354-365, LNCS 4341, Springer-Verlag, 2006.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan, Rei Safavi-Naini and Dongvu Tonien.
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability.
In Proceeding of ICALP '06 - 33rd International Colloquium on Automata, Languages and Programming, Pages 264-275, LNCS 4052, Springer-Verlag, 2006.[ pdf] [ ps] [ pdf USletter]
- Hervé Chabanne and Duong Hieu Phan and David Pointcheval.
Public Traceability in Traitor Tracing Schemes.
In Advances in Cryptology-Proceeding of Eurocrypt '05, R.Cramer Ed. Pages 542-558, LNCS 3494, Springer-Verlag, @IACR, 2005.[ pdf] [ ps] [ pdf USletter]
- Benoît Chevallier-Mames and Duong Hieu Phan and David Pointcheval.
Optimal Asymmetric Encryption and Signature Paddings.
In Proceeding of ACNS '05, pages 254-268, LNCS 3531, Springer-Verlag, 2005.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding.
In Advances in Cryptology-Proceeding of Asiacrypt '04, P.J. Lee Ed. Pages 63-77, LNCS 3329, Springer-Verlag, @IACR, 2004.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
On the Security Notions for Public-Key Encryption Schemes.
In Proceeding of SCN'04, C. Blundo Ed. Pages 33--47, LNCS 3352, Springer-Verlag, 2004.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations).
In Proceeding of SAC'04, H. Handschuh and A. Hasan Eds. Pages 185--200, LNCS 3357, Springer-Verlag, 2004.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
Chosen-Ciphertext Security without Redundancy.
In Advances in Cryptology-Proceeding of Asiacrypt '03, C.~L.~Laih Ed. Pages 1-18, LNCS 2894, Springer-Verlag, @IACR, 2005.[ pdf] [ ps] [ pdf USletter]
- Duong Hieu Phan and David Pointcheval.
A Comparison between two Methods of Security Proof.
In Proceeding of RIVF. Pages 105-110, Hanoï -- February 2003 (in french).[ ps] [ pdf USletter]
Papers in other domains
- Thanh Thuy Nguyen, Duong Hieu Phan and Yamanoi Takahiro.
Some Preliminary Results on the Stableness of Extended F-rule Systems.
Journal of Advanced Computational Intelligence. Pages 252-259, Vol.7 No.3, 2003. - Thanh Thuy Nguyen, Duong Hieu Phan.
Interval-valued Probabilistic Reasoning Agents.
In Proceeding of the 3rd International Conference on Artificial Intelligence/ Internet Computing, USA, 2002. - Thanh Thuy Nguyen, Duong Hieu Phan.
Decomposing Knowledge Systems of F-rules.Journal of Science and Technology, NCSR Vietnam, 40(2), 2002 (in vietnamese).
- Thanh Thuy Nguyen, Duong Hieu Phan.
Reasoning in Knowledge Systems of F-rules.Journal of Computer science and Cybernetics, 17(1), 2001 (in vietnamese).
Patents
- Traceable System for Encrypting/Decrypting Broadcast Digital Data.
- Obtaining Derived Values Depending on a Secret Master Value.
Habilitation Thesis
PhD Thesis