Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multi-Party Functional Encryption., , and . IACR Cryptol. ePrint Arch., (2020)Adaptive Oblivious Transfer with Access Control from Lattice Assumptions., , , , and . ASIACRYPT (1), volume 10624 of Lecture Notes in Computer Science, page 533-563. Springer, (2017)Zero-Knowledge Arguments for Matrix-Vector Relations and Lattice-Based Group Encryption., , , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 101-131. (2016)Privacy-preserving cryptography from pairings and lattices. (Cryptographie protégeant la vie privée à base de couplages et de réseaux).. University of Lyon, France, (2018)Zero-knowledge arguments for matrix-vector relations and lattice-based group encryption., , , , and . Theor. Comput. Sci., (2019)Adaptive oblivious transfer with access control from lattice assumptions., , , , and . Theor. Comput. Sci., (2021)A Lattice-Based Group Signature Scheme with Message-Dependent Opening., , and . ACNS, volume 9696 of Lecture Notes in Computer Science, page 137-155. Springer, (2016)Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions., , , , and . ASIACRYPT (2), volume 10032 of Lecture Notes in Computer Science, page 373-403. (2016)Threshold Raccoon: Practical Threshold Signatures from Standard Lattice Assumptions., , , , , and . EUROCRYPT (2), volume 14652 of Lecture Notes in Computer Science, page 219-248. Springer, (2024)