The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Benoît Libert: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Benoît Libert, Jean-Jacques Quisquater
    Identity Based Encryption Without Redundancy. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:285-300 [Conf]
  2. Paulo S. L. M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater
    Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2005, pp:515-532 [Conf]
  3. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
    Efficient Intrusion-Resilient Signatures Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Inscrypt, 2006, pp:27-41 [Conf]
  4. Benoît Libert, Jean-Jacques Quisquater
    Identity Based Undeniable Signatures. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2004, pp:112-125 [Conf]
  5. Benoît Libert, Jean-Jacques Quisquater
    What Is Possible with Identity Based Cryptography for PKIs and What Still Must Be Improved. [Citation Graph (0, 0)][DBLP]
    EuroPKI, 2004, pp:57-70 [Conf]
  6. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
    Efficient and Non-interactive Timed-Release Encryption. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:291-303 [Conf]
  7. Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater
    Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:52-60 [Conf]
  8. Benoît Libert, Jean-Jacques Quisquater
    Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:187-200 [Conf]
  9. Benoît Libert, Jean-Jacques Quisquater
    On Constructing Certificateless Cryptosystems from Identity Based Encryption. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2006, pp:474-490 [Conf]
  10. Benoît Libert, Jean-Jacques Quisquater
    Efficient revocation and threshold pairing based cryptosystems. [Citation Graph (0, 0)][DBLP]
    PODC, 2003, pp:163-171 [Conf]
  11. Benoît Libert, Jean-Jacques Quisquater
    Improved Signcryption from q-Diffie-Hellman Problems. [Citation Graph (0, 0)][DBLP]
    SCN, 2004, pp:220-234 [Conf]
  12. Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater
    Universal Designated Verifier Signatures Without Random Oracles or Non-black Box Assumptions. [Citation Graph (0, 0)][DBLP]
    SCN, 2006, pp:63-77 [Conf]
  13. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
    Parallel Key-Insulated Public Key Encryption Without Random Oracles. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:298-314 [Conf]
  14. Benoît Libert, Jean-Jacques Quisquater
    Practical Time Capsule Signatures in the Standard Model from Bilinear Maps. [Citation Graph (0, 0)][DBLP]
    Pairing, 2007, pp:23-38 [Conf]

  15. Group Encryption: Non-interactive Realization in the Standard Model. [Citation Graph (, )][DBLP]


  16. Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model. [Citation Graph (, )][DBLP]


  17. Forward-secure signatures in untrusted update environments: efficient and generic constructions. [Citation Graph (, )][DBLP]


  18. Multi-use unidirectional proxy re-signatures. [Citation Graph (, )][DBLP]


  19. Dynamic fully forward-secure group signatures. [Citation Graph (, )][DBLP]


  20. Key Evolution Systems in Untrusted Update Environments. [Citation Graph (, )][DBLP]


  21. Adaptive-ID Secure Revocable Identity-Based Encryption. [Citation Graph (, )][DBLP]


  22. Efficient Completely Non-malleable Public Key Encryption. [Citation Graph (, )][DBLP]


  23. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption. [Citation Graph (, )][DBLP]


  24. Certificateless Encryption Schemes Strongly Secure in the Standard Model. [Citation Graph (, )][DBLP]


  25. Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys. [Citation Graph (, )][DBLP]


  26. Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation. [Citation Graph (, )][DBLP]


  27. Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs. [Citation Graph (, )][DBLP]


  28. Tracing Malicious Proxies in Proxy Re-encryption. [Citation Graph (, )][DBLP]


  29. Efficient Traceable Signatures in the Standard Model. [Citation Graph (, )][DBLP]


  30. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. [Citation Graph (, )][DBLP]


  31. Multi-Use Unidirectional Proxy Re-Signatures [Citation Graph (, )][DBLP]


  32. Efficient Accountable Authority Identity-Based Encryption under Static Complexity Assumptions [Citation Graph (, )][DBLP]


Search in 0.132secs, Finished in 0.135secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002