Benoit Libert
Benoit Libert
CNRS & ENS de Lyon (France)
Verified email at - Homepage
Cited by
Cited by
Efficient and provably-secure identity-based signatures and signcryption from bilinear maps
P Barreto, B Libert, N McCullagh, JJ Quisquater
Advances in Cryptology-ASIACRYPT 2005, 515-532, 2005
A new identity based signcryption scheme from pairings
B Libert, JJ Quisquater
Information Theory Workshop, 2003. Proceedings. 2003 IEEE, 155-158, 2003
Expressive key-policy attribute-based encryption with constant-size ciphertexts
N Attrapadung, B Libert, E De Panafieu
Public Key Cryptography–PKC 2011, 90-108, 2011
Unidirectional chosen-ciphertext secure proxy re-encryption
B Libert, D Vergnaud
Public Key Cryptography–PKC 2008, 360-379, 2008
Attribute-based encryption schemes with constant-size ciphertexts
N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ...
Theoretical Computer Science 422, 15-38, 2012
Efficient signcryption with key privacy from gap Diffie-Hellman groups
B Libert, JJ Quisquater
Public Key Cryptography–PKC 2004, 187-200, 2004
Adaptive-ID secure revocable identity-based encryption
B Libert, D Vergnaud
Topics in Cryptology–CT-RSA 2009, 1-15, 2009
On constructing certificateless cryptosystems from identity based encryption
B Libert, JJ Quisquater
Public Key Cryptography-PKC 2006, 474-490, 2006
Fully secure functional encryption for linear functions from standard assumptions
S Agrawal, B Libert, D Stehle
CRYPTO, 333-362, 2016
Efficient revocation and threshold pairing based cryptosystems
B Libert, JJ Quisquater
Proceedings of the twenty-second annual symposium on Principles of …, 2003
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model
B Libert, K Paterson, E Quaglia
Public Key Cryptography–PKC 2012, 206-224, 2012
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation
N Attrapadung, B Libert
Public Key Cryptography–PKC 2010, 384-402, 2010
Zero-Knowledge Arguments for Lattice-Based Accumulators: Logarithmic-Size Ring Signatures and Group Signatures Without Trapdoors
B Libert, S Ling, K Nguyen, H Wang
Annual International Conference on the Theory and Applications of …, 2016
Lattice-based group signatures with logarithmic signature size
F Laguillaumie, A Langlois, B Libert, D Stehlé
Advances in Cryptology-ASIACRYPT 2013, 41-61, 2013
Short attribute-based signatures for threshold predicates
J Herranz, F Laguillaumie, B Libert, C Ràfols
Topics in Cryptology–CT-RSA 2012, 51-67, 2012
Unidirectional chosen-ciphertext secure proxy re-encryption
B Libert, D Vergnaud
Information Theory, IEEE Transactions on 57 (3), 1786-1802, 2011
Multi-use unidirectional proxy re-signatures
B Libert, D Vergnaud
Proceedings of the 15th ACM conference on Computer and communications …, 2008
Group Signatures with Almost-for-free Revocation
B Libert, T Peters, M Yung
Advances in Cryptology–CRYPTO 2012, 571-589, 2012
Certificateless encryption schemes strongly secure in the standard model
AW Dent, B Libert, KG Paterson
Public Key Cryptography–PKC 2008, 344-359, 2008
Scalable group signatures with revocation
B Libert, T Peters, M Yung
Advances in Cryptology–EUROCRYPT 2012, 609-627, 2012
The system can't perform the operation now. Try again later.
Articles 1–20