Fingerprint
- 1 Similar Profiles
Collaborations and top research areas from the last five years
-
Bivariate Proximity Test-Based Asynchronous Verifiable Secret Sharing
Augot, D., Blazy, O., Delavenne, H. & Mallordy, L. B., 1 Jan 2026, Progress in Cryptology - AFRICACRYPT 2025 - 16th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Petkova-Nikova, S., Rijmen, V. & Rijmen, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 319-342 24 p. (Lecture Notes in Computer Science; vol. 15651 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
A Public Key Identity-Based Revocation Scheme:
Blazy, O. & Mukherjee, S., 1 Jan 2024, Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings. Oswald, E. (ed.). Springer Science and Business Media Deutschland GmbH, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs
Barthoulot, A., Blazy, O. & Canard, S., 1 Jan 2024, Progress in Cryptology - AFRICACRYPT 2024 - 15th International Conference on Cryptology in Africa, 2024, Proceedings. Vaudenay, S., Petit, C. & Petit, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 94-119 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14861 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Anonymous attribute-based designated verifier signature
Blazy, O., Brouilhet, L., Conchon, E. & Klingler, M., 1 Oct 2023, In: Journal of Ambient Intelligence and Humanized Computing. 14, 10, p. 1-11 11 p.Research output: Contribution to journal › Article › peer-review
Open Access -
Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption
Barthoulot, A., Blazy, O. & Canard, S., 1 Jan 2023, Cryptology and Network Security - 22nd International Conference, CANS 2023, Proceedings. Deng, J., Kolesnikov, V. & Schwarzmann, A. A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 538-562 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14342 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Efficient Implementation of a Post-Quantum Anonymous Credential Protocol
Blazy, O., Chevalier, C., Renaut, G., Ricosset, T., Sageloli, E. & Senet, H., 29 Aug 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery, 24. (ACM International Conference Proceeding Series).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment
Blazy, O., Boureanu, I., Lafourcade, P., Onete, C. & Robert, L., 1 Jan 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 5917-5934 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 8).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone
Bettaieb, S., Bidoux, L., Blazy, O., Cottier, B. & Pointcheval, D., 1 Jan 2023, Foundations and Practice of Security - 15th International Symposium, FPS 2022, Revised Selected Papers. Jourdan, G.-V., Mounier, L., Adams, C., Sèdes, F. & Garcia-Alfaro, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 54-70 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13877 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
(Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard
Barthoulot, A., Blazy, O. & Canard, S., 1 Jan 2022, Cryptology and Network Security - 21st International Conference, CANS 2022, Proceedings. Beresford, A. R., Patra, A. & Bellini, E. (eds.). Springer Science and Business Media Deutschland GmbH, p. 143-164 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13641 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
A Correction to a Code-Based Blind Signature Scheme
Blazy, O., Gaborit, P. & Mac, D. T., 1 Jan 2022, Code-Based Cryptography - 9th International Workshop, CBCrypto 2021, Revised Selected Papers. Wachter-Zeh, A., Bartz, H. & Liva, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 84-94 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13150 LNCS).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review