20102026

Research activity per year

Fingerprint

Dive into the research topics where Olivier Blazy is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
  • 1 Similar Profiles

Collaborations and top research areas from the last five years

Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
  • Bivariate Proximity Test-Based Asynchronous Verifiable Secret Sharing

    Augot, D., Blazy, O., Delavenne, H. & Mallordy, L. B., 1 Jan 2026, Progress in Cryptology - AFRICACRYPT 2025 - 16th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Petkova-Nikova, S., Rijmen, V. & Rijmen, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 319-342 24 p. (Lecture Notes in Computer Science; vol. 15651 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • A Public Key Identity-Based Revocation Scheme:

    Blazy, O. & Mukherjee, S., 1 Jan 2024, Topics in Cryptology – CT-RSA 2024 - Cryptographers’ Track at the RSA Conference 2024, Proceedings. Oswald, E. (ed.). Springer Science and Business Media Deutschland GmbH, p. 3-24 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14643 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Cryptographic Accumulators: New Definitions, Enhanced Security, and Delegatable Proofs

    Barthoulot, A., Blazy, O. & Canard, S., 1 Jan 2024, Progress in Cryptology - AFRICACRYPT 2024 - 15th International Conference on Cryptology in Africa, 2024, Proceedings. Vaudenay, S., Petit, C. & Petit, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 94-119 26 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14861 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Anonymous attribute-based designated verifier signature

    Blazy, O., Brouilhet, L., Conchon, E. & Klingler, M., 1 Oct 2023, In: Journal of Ambient Intelligence and Humanized Computing. 14, 10, p. 1-11 11 p.

    Research output: Contribution to journalArticlepeer-review

    Open Access
  • Dually Computable Cryptographic Accumulators and Their Application to Attribute Based Encryption

    Barthoulot, A., Blazy, O. & Canard, S., 1 Jan 2023, Cryptology and Network Security - 22nd International Conference, CANS 2023, Proceedings. Deng, J., Kolesnikov, V. & Schwarzmann, A. A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 538-562 25 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14342 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • Efficient Implementation of a Post-Quantum Anonymous Credential Protocol

    Blazy, O., Chevalier, C., Renaut, G., Ricosset, T., Sageloli, E. & Senet, H., 29 Aug 2023, ARES 2023 - 18th International Conference on Availability, Reliability and Security, Proceedings. Association for Computing Machinery, 24. (ACM International Conference Proceeding Series).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • How fast do you heal? A taxonomy for post-compromise security in secure-channel establishment

    Blazy, O., Boureanu, I., Lafourcade, P., Onete, C. & Robert, L., 1 Jan 2023, 32nd USENIX Security Symposium, USENIX Security 2023. USENIX Association, p. 5917-5934 18 p. (32nd USENIX Security Symposium, USENIX Security 2023; vol. 8).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

  • Post-quantum and UC-Secure Oblivious Transfer from SPHF with Grey Zone

    Bettaieb, S., Bidoux, L., Blazy, O., Cottier, B. & Pointcheval, D., 1 Jan 2023, Foundations and Practice of Security - 15th International Symposium, FPS 2022, Revised Selected Papers. Jourdan, G.-V., Mounier, L., Adams, C., Sèdes, F. & Garcia-Alfaro, J. (eds.). Springer Science and Business Media Deutschland GmbH, p. 54-70 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13877 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • (Augmented) Broadcast Encryption from Identity Based Encryption with Wildcard

    Barthoulot, A., Blazy, O. & Canard, S., 1 Jan 2022, Cryptology and Network Security - 21st International Conference, CANS 2022, Proceedings. Beresford, A. R., Patra, A. & Bellini, E. (eds.). Springer Science and Business Media Deutschland GmbH, p. 143-164 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13641 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

    Open Access
  • A Correction to a Code-Based Blind Signature Scheme

    Blazy, O., Gaborit, P. & Mac, D. T., 1 Jan 2022, Code-Based Cryptography - 9th International Workshop, CBCrypto 2021, Revised Selected Papers. Wachter-Zeh, A., Bartz, H. & Liva, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 84-94 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13150 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review