


default search action
BibTeX records: Xavier Boyen
@article{DBLP:journals/cic/LiB24, author = {Qinyi Li and Xavier Boyen}, title = {Public-Key Authenticated Encryption with Keyword Search Made Easy}, journal = {{IACR} Commun. Cryptol.}, volume = {1}, number = {2}, pages = {16}, year = {2024}, url = {https://doi.org/10.62056/a63z11zn4}, doi = {10.62056/A63Z11ZN4}, timestamp = {Wed, 25 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cic/LiB24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BaeeSBFP24, author = {Mir Ali Rezazadeh Baee and Leonie Simpson and Xavier Boyen and Ernest Foo and Josef Pieprzyk}, title = {A Provably Secure and Efficient Cryptographic-Key Update Protocol for Connected Vehicles}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {4}, pages = {4066--4083}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3345406}, doi = {10.1109/TDSC.2023.3345406}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BaeeSBFP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cii/MillerCFBP23, author = {Thomas Miller and Shoufeng Cao and Marcus Foth and Xavier Boyen and Warwick Powell}, title = {An asset-backed decentralised finance instrument for food supply chains - {A} case study from the livestock export industry}, journal = {Comput. Ind.}, volume = {147}, pages = {103863}, year = {2023}, url = {https://doi.org/10.1016/j.compind.2023.103863}, doi = {10.1016/J.COMPIND.2023.103863}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cii/MillerCFBP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AlupothaBM23, author = {Jayamine Alupotha and Xavier Boyen and Matthew McKague}, title = {{LACT+:} Practical Post-Quantum Scalable Confidential Transactions}, journal = {Cryptogr.}, volume = {7}, number = {2}, pages = {24}, year = {2023}, url = {https://doi.org/10.3390/cryptography7020024}, doi = {10.3390/CRYPTOGRAPHY7020024}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AlupothaBM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/BaeeSBFP23, author = {Mir Ali Rezazadeh Baee and Leonie Simpson and Xavier Boyen and Ernest Foo and Josef Pieprzyk}, title = {{ALI:} Anonymous Lightweight Inter-Vehicle Broadcast Authentication With Encryption}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {1799--1817}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3164436}, doi = {10.1109/TDSC.2022.3164436}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/BaeeSBFP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BoyenL23, author = {Xavier Boyen and Qinyi Li}, editor = {Gene Tsudik and Mauro Conti and Kaitai Liang and Georgios Smaragdakis}, title = {Identity-Based Matchmaking Encryption with Enhanced Privacy - {A} Generic Construction with Practical Instantiations}, booktitle = {Computer Security - {ESORICS} 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14345}, pages = {425--445}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-51476-0\_21}, doi = {10.1007/978-3-031-51476-0\_21}, timestamp = {Thu, 18 Jan 2024 08:27:15 +0100}, biburl = {https://dblp.org/rec/conf/esorics/BoyenL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlupothaBM22, author = {Jayamine Alupotha and Xavier Boyen and Matthew McKague}, title = {Aggregable Confidential Transactions for Efficient Quantum-Safe Cryptocurrencies}, journal = {{IEEE} Access}, volume = {10}, pages = {17722--17747}, year = {2022}, url = {https://doi.org/10.1109/ACCESS.2022.3149605}, doi = {10.1109/ACCESS.2022.3149605}, timestamp = {Tue, 15 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/AlupothaBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/AlupothaBM22, author = {Jayamine Alupotha and Xavier Boyen and Matthew McKague}, editor = {Vijayalakshmi Atluri and Roberto Di Pietro and Christian Damsgaard Jensen and Weizhi Meng}, title = {Zero-History Confidential Chains with Zero-Knowledge Contracts: {A} New Normal for Decentralized Ledgers?}, booktitle = {Computer Security - {ESORICS} 2022 - 27th European Symposium on Research in Computer Security, Copenhagen, Denmark, September 26-30, 2022, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13554}, pages = {67--88}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17140-6\_4}, doi = {10.1007/978-3-031-17140-6\_4}, timestamp = {Tue, 27 Sep 2022 21:06:59 +0200}, biburl = {https://dblp.org/rec/conf/esorics/AlupothaBM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AlupothaB22, author = {Jayamine Alupotha and Xavier Boyen}, title = {Practical UC-Secure Zero-Knowledge Smart Contracts}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {670}, year = {2022}, url = {https://eprint.iacr.org/2022/670}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AlupothaB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/AlupothaB21, author = {Jayamine Alupotha and Xavier Boyen}, title = {Origami Store: UC-Secure Foldable Datachains for the Quantum Era}, journal = {{IEEE} Access}, volume = {9}, pages = {81454--81484}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3085413}, doi = {10.1109/ACCESS.2021.3085413}, timestamp = {Tue, 13 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/AlupothaB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/PowellCMFBEVT21, author = {Warwick Powell and Shoufeng Cao and Thomas Miller and Marcus Foth and Xavier Boyen and Barry Earsman and Santiago del Valle and Charles Turner{-}Morris}, title = {From premise to practice of social consensus: How to agree on common knowledge in blockchain-enabled supply chains}, journal = {Comput. Networks}, volume = {200}, pages = {108536}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108536}, doi = {10.1016/J.COMNET.2021.108536}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/PowellCMFBEVT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/AmarasingheBM21, author = {Niluka Amarasinghe and Xavier Boyen and Matthew McKague}, title = {The Cryptographic Complexity of Anonymous Coins: {A} Systematic Exploration}, journal = {Cryptogr.}, volume = {5}, number = {1}, pages = {10}, year = {2021}, url = {https://doi.org/10.3390/cryptography5010010}, doi = {10.3390/CRYPTOGRAPHY5010010}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/AmarasingheBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BoyenHMS21, author = {Xavier Boyen and Udyani Herath and Matthew McKague and Douglas Stebila}, title = {Associative Blockchain for Decentralized {PKI} Transparency}, journal = {Cryptogr.}, volume = {5}, number = {2}, pages = {14}, year = {2021}, url = {https://doi.org/10.3390/cryptography5020014}, doi = {10.3390/CRYPTOGRAPHY5020014}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cryptography/BoyenHMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/BaeeSBFP21, author = {Mir Ali Rezazadeh Baee and Leonie Simpson and Xavier Boyen and Ernest Foo and Josef Pieprzyk}, title = {Authentication strategies in vehicular communications: a taxonomy and framework}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2021}, number = {1}, pages = {129}, year = {2021}, url = {https://doi.org/10.1186/s13638-021-01968-6}, doi = {10.1186/S13638-021-01968-6}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejwcn/BaeeSBFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LiBF21, author = {Qinyi Li and Xavier Boyen and Ernest Foo}, title = {CCA-security from adaptive all-but-one lossy trapdoor functions}, journal = {Theor. Comput. Sci.}, volume = {883}, pages = {99--121}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.06.014}, doi = {10.1016/J.TCS.2021.06.014}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LiBF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/LiB21, author = {Qinyi Li and Xavier Boyen}, title = {Efficient public-key encryption with equality test from lattices}, journal = {Theor. Comput. Sci.}, volume = {892}, pages = {85--107}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.09.010}, doi = {10.1016/J.TCS.2021.09.010}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/LiB21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/BaeeSBFP21, author = {Mir Ali Rezazadeh Baee and Leonie Simpson and Xavier Boyen and Ernest Foo and Josef Pieprzyk}, title = {On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time is Not on Our Side!}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {16}, pages = {3678--3693}, year = {2021}, url = {https://doi.org/10.1109/TIFS.2021.3087359}, doi = {10.1109/TIFS.2021.3087359}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tifs/BaeeSBFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/BaeeSBFP21, author = {Mir Ali Rezazadeh Baee and Leonie Simpson and Xavier Boyen and Ernest Foo and Josef Pieprzyk}, title = {A Model to Evaluate Reliability of Authentication Protocols in {C-ITS} Safety-Critical Applications}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {70}, number = {9}, pages = {9306--9319}, year = {2021}, url = {https://doi.org/10.1109/TVT.2021.3097088}, doi = {10.1109/TVT.2021.3097088}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/BaeeSBFP21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoyenFL21, author = {Xavier Boyen and Ernest Foo and Qinyi Li}, editor = {Joonsang Baek and Sushmita Ruj}, title = {Anonymous Lattice Identity-Based Encryption with Traceable Identities}, booktitle = {Information Security and Privacy - 26th Australasian Conference, {ACISP} 2021, Virtual Event, December 1-3, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13083}, pages = {630--649}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-90567-5\_32}, doi = {10.1007/978-3-030-90567-5\_32}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoyenFL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurosp/BoyenHM21, author = {Xavier Boyen and Thomas Haines and Johannes M{\"{u}}ller}, title = {Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting}, booktitle = {{IEEE} European Symposium on Security and Privacy, EuroS{\&}P 2021, Vienna, Austria, September 6-10, 2021}, pages = {272--291}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/EuroSP51992.2021.00027}, doi = {10.1109/EUROSP51992.2021.00027}, timestamp = {Thu, 11 Nov 2021 09:11:58 +0100}, biburl = {https://dblp.org/rec/conf/eurosp/BoyenHM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/AmarasingheBM21, author = {Niluka Amarasinghe and Xavier Boyen and Matthew McKague}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {The Complex Shape of Anonymity in Cryptocurrencies: Case Studies from a Systematic Approach}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, pages = {205--225}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8\_10}, doi = {10.1007/978-3-662-64322-8\_10}, timestamp = {Wed, 27 Oct 2021 09:25:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/AmarasingheBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BoyenIL21, author = {Xavier Boyen and Malika Izabach{\`{e}}ne and Qinyi Li}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Secure Hybrid Encryption in the Standard Model from Hard Learning Problems}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {399--418}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_21}, doi = {10.1007/978-3-030-81293-5\_21}, timestamp = {Wed, 21 Jul 2021 15:51:05 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BoyenIL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-04210, author = {Eleanor McMurtry and Xavier Boyen and Chris Culnane and Kristian Gj{\o}steen and Thomas Haines and Vanessa Teague}, title = {Towards Verifiable Remote Voting with Paper Assurance}, journal = {CoRR}, volume = {abs/2111.04210}, year = {2021}, url = {https://arxiv.org/abs/2111.04210}, eprinttype = {arXiv}, eprint = {2111.04210}, timestamp = {Wed, 10 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-04210.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08455, author = {Shoufeng Cao and Thomas Miller and Marcus Foth and Warwick Powell and Xavier Boyen and Charles Turner{-}Morris}, title = {Integrating On-chain and Off-chain Governance for Supply Chain Transparency and Integrity}, journal = {CoRR}, volume = {abs/2111.08455}, year = {2021}, url = {https://arxiv.org/abs/2111.08455}, eprinttype = {arXiv}, eprint = {2111.08455}, timestamp = {Mon, 22 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08455.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AmarasingheBM21, author = {Niluka Amarasinghe and Xavier Boyen and Matthew McKague}, title = {The Cryptographic Complexity of Anonymous Coins: {A} Systematic Exploration}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {36}, year = {2021}, url = {https://eprint.iacr.org/2021/036}, timestamp = {Tue, 02 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/AmarasingheBM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenH021, author = {Xavier Boyen and Thomas Haines and Johannes M{\"{u}}ller}, title = {Epoque: Practical End-to-End Verifiable Post-Quantum-Secure E-Voting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {304}, year = {2021}, url = {https://eprint.iacr.org/2021/304}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenH021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/AlupothaBF20, author = {Jayamine Alupotha and Xavier Boyen and Ernest Foo}, editor = {Stephan Krenn and Haya Schulmann and Serge Vaudenay}, title = {Compact Multi-Party Confidential Transactions}, booktitle = {Cryptology and Network Security - 19th International Conference, {CANS} 2020, Vienna, Austria, December 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12579}, pages = {430--452}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65411-5\_21}, doi = {10.1007/978-3-030-65411-5\_21}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/cans/AlupothaBF20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BoyenHM20, author = {Xavier Boyen and Thomas Haines and Johannes M{\"{u}}ller}, editor = {Liqun Chen and Ninghui Li and Kaitai Liang and Steve A. Schneider}, title = {A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing}, booktitle = {Computer Security - {ESORICS} 2020 - 25th European Symposium on Research in Computer Security, {ESORICS} 2020, Guildford, UK, September 14-18, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12309}, pages = {336--356}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59013-0\_17}, doi = {10.1007/978-3-030-59013-0\_17}, timestamp = {Fri, 02 Jul 2021 20:12:27 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BoyenHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BoyenIL20, author = {Xavier Boyen and Malika Izabach{\`{e}}ne and Qinyi Li}, editor = {Clemente Galdi and Vladimir Kolesnikov}, title = {A Simple and Efficient CCA-Secure Lattice {KEM} in the Standard Model}, booktitle = {Security and Cryptography for Networks - 12th International Conference, {SCN} 2020, Amalfi, Italy, September 14-16, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12238}, pages = {321--337}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57990-6\_16}, doi = {10.1007/978-3-030-57990-6\_16}, timestamp = {Tue, 08 Sep 2020 19:15:32 +0200}, biburl = {https://dblp.org/rec/conf/scn/BoyenIL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenHM20, author = {Xavier Boyen and Thomas Haines and Johannes M{\"{u}}ller}, title = {A Verifiable and Practical Lattice-Based Decryption Mix Net with External Auditing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {115}, year = {2020}, url = {https://eprint.iacr.org/2020/115}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BoyenHM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/BansalBP19, author = {Tarun Kumar Bansal and Xavier Boyen and Josef Pieprzyk}, title = {Signcryption schemes with insider security in an ideal permutation model}, journal = {J. Math. Cryptol.}, volume = {13}, number = {2}, pages = {117--150}, year = {2019}, url = {https://doi.org/10.1515/jmc-2018-0006}, doi = {10.1515/JMC-2018-0006}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/BansalBP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/AmarasingheBM19, author = {Niluka Amarasinghe and Xavier Boyen and Matthew McKague}, title = {A Survey of Anonymity of Cryptocurrencies}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, {ACSW} 2019, Sydney, NSW, Australia, January 29-31, 2019}, pages = {2:1--2:10}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3290688.3290693}, doi = {10.1145/3290688.3290693}, timestamp = {Mon, 14 Jan 2019 08:35:38 +0100}, biburl = {https://dblp.org/rec/conf/acsw/AmarasingheBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/BoyenL19, author = {Xavier Boyen and Qinyi Li}, editor = {Jintai Ding and Rainer Steinwandt}, title = {Direct CCA-Secure {KEM} and Deterministic {PKE} from Plain {LWE}}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {116--130}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_7}, doi = {10.1007/978-3-030-25510-7\_7}, timestamp = {Mon, 15 Jul 2019 14:30:19 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/BoyenL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cryptography/BoyenH18, author = {Xavier Boyen and Thomas Haines}, title = {Forward-Secure Linkable Ring Signatures from Bilinear Maps}, journal = {Cryptogr.}, volume = {2}, number = {4}, pages = {35}, year = {2018}, url = {https://doi.org/10.3390/cryptography2040035}, doi = {10.3390/CRYPTOGRAPHY2040035}, timestamp = {Sun, 19 Jan 2025 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cryptography/BoyenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BoyenH18, author = {Xavier Boyen and Thomas Haines}, editor = {Willy Susilo and Guomin Yang}, title = {Forward-Secure Linkable Ring Signatures}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {245--264}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_15}, doi = {10.1007/978-3-319-93638-3\_15}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BoyenH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoyenL18, author = {Xavier Boyen and Qinyi Li}, editor = {Bart Preneel and Frederik Vercauteren}, title = {Almost Tight Multi-Instance Multi-Ciphertext Identity-Based Encryption on Lattices}, booktitle = {Applied Cryptography and Network Security - 16th International Conference, {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10892}, pages = {535--553}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93387-0\_28}, doi = {10.1007/978-3-319-93387-0\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoyenL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyenCH18, author = {Xavier Boyen and Christopher Carr and Thomas Haines}, editor = {Satya V. Lokam and Sushmita Ruj and Kouichi Sakurai}, title = {Graphchain: a Blockchain-Free Scalable Decentralised Ledger}, booktitle = {Proceedings of the 2nd {ACM} Workshop on Blockchains, Cryptocurrencies, and Contracts, BCC@AsiaCCS 2018, Incheon, Republic of Korea, June 4, 2018}, pages = {21--33}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3205230.3205235}, doi = {10.1145/3205230.3205235}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyenCH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyenL17, author = {Xavier Boyen and Qinyi Li}, editor = {Jonathan Katz and Hovav Shacham}, title = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {298--331}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_11}, doi = {10.1007/978-3-319-63697-9\_11}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ercim/CarrBBH17, author = {Christopher Carr and Colin Boyd and Xavier Boyen and Thomas Haines}, title = {Bitcoin Unchained}, journal = {{ERCIM} News}, volume = {2017}, number = {110}, year = {2017}, url = {https://ercim-news.ercim.eu/en110/special/bitcoin-unchained}, timestamp = {Wed, 22 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ercim/CarrBBH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoydBCH17, author = {Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Key Recovery: Inert and Public}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2017}, url = {http://eprint.iacr.org/2017/243}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoydBCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenL17, author = {Xavier Boyen and Qinyi Li}, title = {All-But-Many Lossy Trapdoor Functions from Lattices and Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {532}, year = {2017}, url = {http://eprint.iacr.org/2017/532}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/Boyen16, author = {Xavier Boyen}, title = {Unconditionally Anonymous Ring and Mesh Signatures}, journal = {J. Cryptol.}, volume = {29}, number = {4}, pages = {729--774}, year = {2016}, url = {https://doi.org/10.1007/s00145-015-9208-2}, doi = {10.1007/S00145-015-9208-2}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/Boyen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoyenL16, author = {Xavier Boyen and Qinyi Li}, editor = {Mark Manulis and Ahmad{-}Reza Sadeghi and Steve A. Schneider}, title = {Turing Machines with Shortcuts: Efficient Attribute-Based Encryption for Bounded Functions}, booktitle = {Applied Cryptography and Network Security - 14th International Conference, {ACNS} 2016, Guildford, UK, June 19-22, 2016. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9696}, pages = {267--284}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39555-5\_15}, doi = {10.1007/978-3-319-39555-5\_15}, timestamp = {Fri, 07 Aug 2020 17:57:32 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoyenL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsc/HainesB16, author = {Thomas Haines and Xavier Boyen}, title = {{VOTOR:} conceptually simple remote voting against tiny tyrants}, booktitle = {Proceedings of the Australasian Computer Science Week Multiconference, Canberra, Australia, February 2-5, 2016}, pages = {32}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2843043.2843362}, doi = {10.1145/2843043.2843362}, timestamp = {Mon, 26 Nov 2018 12:14:45 +0100}, biburl = {https://dblp.org/rec/conf/acsc/HainesB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/BoyenL16, author = {Xavier Boyen and Qinyi Li}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Towards Tightly Secure Lattice Short Signature and Id-Based Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, pages = {404--434}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6\_14}, doi = {10.1007/978-3-662-53890-6\_14}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/BoyenL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Boyen16, author = {Xavier Boyen}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {The Case For Human Primacy in Cryptography - (Summary from the Keynote Lecture)}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {3--10}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_1}, doi = {10.1007/978-3-319-61273-7\_1}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Boyen16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/BoydBCH16, author = {Colin Boyd and Xavier Boyen and Christopher Carr and Thomas Haines}, editor = {Raphael C.{-}W. Phan and Moti Yung}, title = {Key Recovery: Inert and Public}, booktitle = {Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology - Second International Conference, Mycrypt 2016, Kuala Lumpur, Malaysia, December 1-2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10311}, pages = {111--126}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-61273-7\_6}, doi = {10.1007/978-3-319-61273-7\_6}, timestamp = {Fri, 14 Jul 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/BoydBCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/voteid/HainesB16, author = {Thomas Haines and Xavier Boyen}, editor = {Robert Krimmer and Melanie Volkamer and Jordi Barrat and Josh Benaloh and Nicole J. Goodman and Peter Y. A. Ryan and Vanessa Teague}, title = {Truly Multi-authority 'Pr{\^{e}}t-{\`{a}}-Voter'}, booktitle = {Electronic Voting - First International Joint Conference, E-Vote-ID 2016, Bregenz, Austria, October 18-21, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10141}, pages = {56--72}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-52240-1\_4}, doi = {10.1007/978-3-319-52240-1\_4}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/voteid/HainesB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/PhongWANB16, author = {Le Trieu Phong and Lihua Wang and Yoshinori Aono and Manh Ha Nguyen and Xavier Boyen}, title = {Proxy Re-Encryption Schemes with Key Privacy from {LWE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2016}, url = {http://eprint.iacr.org/2016/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/PhongWANB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenL16, author = {Xavier Boyen and Qinyi Li}, title = {Towards Tightly Secure Short Signature and {IBE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {498}, year = {2016}, url = {http://eprint.iacr.org/2016/498}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenCH16, author = {Xavier Boyen and Christopher Carr and Thomas Haines}, title = {Blockchain-Free Cryptocurrencies. {A} Rational Framework for Truly Decentralised Fast Transactions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {871}, year = {2016}, url = {http://eprint.iacr.org/2016/871}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenCH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cscw/VyasSBDB15, author = {Dhaval Vyas and Stephen Snow and Margot Brereton and Uwe Dulleck and Xavier Boyen}, editor = {Dan Cosley and Andrea Forte and Luigina Ciolfi and David McDonald}, title = {Being Thrifty on a {\textdollar}100K Wage: Austerity in Family Finances}, booktitle = {18th {ACM} Conference on Computer Supported Cooperative Work {\&} Social Computing, {CSCW} 2015, Vancouver, BC, Canada, March 14-18, 2015, Companion Volume}, pages = {167--170}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2685553.2698998}, doi = {10.1145/2685553.2698998}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cscw/VyasSBDB15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/BoyenL15, author = {Xavier Boyen and Qinyi Li}, editor = {Man Ho Au and Atsuko Miyaji}, title = {Attribute-Based Encryption for Finite Automata from {LWE}}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {247--267}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_14}, doi = {10.1007/978-3-319-26059-4\_14}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/BoyenL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/MelchorBDG14, author = {Carlos Aguilar Melchor and Xavier Boyen and Jean{-}Christophe Deneuville and Philippe Gaborit}, editor = {Michele Mosca}, title = {Sealing the Leak on Classical {NTRU} Signatures}, booktitle = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8772}, pages = {1--21}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11659-4\_1}, doi = {10.1007/978-3-319-11659-4\_1}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/MelchorBDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelchorBDG14, author = {Carlos Aguilar Melchor and Xavier Boyen and Jean{-}Christophe Deneuville and Philippe Gaborit}, title = {Sealing the Leak on Classical {NTRU} signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {484}, year = {2014}, url = {http://eprint.iacr.org/2014/484}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelchorBDG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenFS14, author = {Xavier Boyen and Xiong Fan and Elaine Shi}, title = {Adaptively Secure Fully Homomorphic Signatures Based on Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {916}, year = {2014}, url = {http://eprint.iacr.org/2014/916}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenFS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Boyen13, author = {Xavier Boyen}, editor = {Colin Boyd and Leonie Simpson}, title = {Expressive Cryptography: Lattice Perspectives}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {267}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_18}, doi = {10.1007/978-3-642-39059-3\_18}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Boyen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/MelchorBBFG13, author = {Carlos Aguilar Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit}, editor = {Amr M. Youssef and Abderrahmane Nitaj and Aboul Ella Hassanien}, title = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2013, 6th International Conference on Cryptology in Africa, Cairo, Egypt, June 22-24, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7918}, pages = {1--25}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38553-7\_1}, doi = {10.1007/978-3-642-38553-7\_1}, timestamp = {Fri, 31 Jan 2020 16:14:16 +0100}, biburl = {https://dblp.org/rec/conf/africacrypt/MelchorBBFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/AonoBPW13, author = {Yoshinori Aono and Xavier Boyen and Le Trieu Phong and Lihua Wang}, editor = {Goutam Paul and Serge Vaudenay}, title = {Key-Private Proxy Re-encryption under {LWE}}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2013 - 14th International Conference on Cryptology in India, Mumbai, India, December 7-10, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8250}, pages = {1--18}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03515-4\_1}, doi = {10.1007/978-3-319-03515-4\_1}, timestamp = {Fri, 04 Jul 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/AonoBPW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tcc/Boyen13, author = {Xavier Boyen}, editor = {Amit Sahai}, title = {Attribute-Based Functional Encryption on Lattices}, booktitle = {Theory of Cryptography - 10th Theory of Cryptography Conference, {TCC} 2013, Tokyo, Japan, March 3-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7785}, pages = {122--142}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36594-2\_8}, doi = {10.1007/978-3-642-36594-2\_8}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/tcc/Boyen13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-6683, author = {Xavier Boyen and Nir Friedman and Daphne Koller}, title = {Discovering the Hidden Structure of Complex Dynamic Systems}, journal = {CoRR}, volume = {abs/1301.6683}, year = {2013}, url = {http://arxiv.org/abs/1301.6683}, eprinttype = {arXiv}, eprint = {1301.6683}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-6683.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1301-7362, author = {Xavier Boyen and Daphne Koller}, title = {Tractable Inference for Complex Stochastic Processes}, journal = {CoRR}, volume = {abs/1301.7362}, year = {2013}, url = {http://arxiv.org/abs/1301.7362}, eprinttype = {arXiv}, eprint = {1301.7362}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1301-7362.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MelchorBBFG13, author = {Carlos Aguilar Melchor and Slim Bettaieb and Xavier Boyen and Laurent Fousse and Philippe Gaborit}, title = {Adapting Lyubashevsky's Signature Schemes to the Ring Signature Setting}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {281}, year = {2013}, url = {http://eprint.iacr.org/2013/281}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MelchorBBFG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/BarberBSU12, author = {Simon Barber and Xavier Boyen and Elaine Shi and Ersin Uzun}, editor = {Angelos D. Keromytis}, title = {Bitter to Better - How to Make Bitcoin a Better Currency}, booktitle = {Financial Cryptography and Data Security - 16th International Conference, {FC} 2012, Kralendijk, Bonaire, February 27 - March 2, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7397}, pages = {399--414}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32946-3\_29}, doi = {10.1007/978-3-642-32946-3\_29}, timestamp = {Tue, 30 Jul 2024 10:38:00 +0200}, biburl = {https://dblp.org/rec/conf/fc/BarberBSU12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBVVW12, author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Functional Encryption for Threshold Functions (or Fuzzy {IBE)} from Lattices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {280--297}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_17}, doi = {10.1007/978-3-642-30057-8\_17}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBVVW12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boyen12, author = {Xavier Boyen}, title = {Attribute-Based Functional Encryption on Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {716}, year = {2012}, url = {http://eprint.iacr.org/2012/716}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boyen12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BonehB11, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective Identity-Based Encryption Without Random Oracles}, journal = {J. Cryptol.}, volume = {24}, number = {4}, pages = {659--693}, year = {2011}, url = {https://doi.org/10.1007/s00145-010-9078-6}, doi = {10.1007/S00145-010-9078-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BonehB11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Boyen11, author = {Xavier Boyen}, editor = {Dongdai Lin and Gene Tsudik and Xiaoyun Wang}, title = {Expressive Encryption Systems from Lattices - (Abstract from the Invited Lecture)}, booktitle = {Cryptology and Network Security - 10th International Conference, {CANS} 2011, Sanya, China, December 10-12, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7092}, pages = {1--12}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25513-7\_1}, doi = {10.1007/978-3-642-25513-7\_1}, timestamp = {Mon, 25 Nov 2019 15:32:12 +0100}, biburl = {https://dblp.org/rec/conf/cans/Boyen11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2011, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5}, doi = {10.1007/978-3-642-24316-5}, isbn = {978-3-642-24315-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBVVW11, author = {Shweta Agrawal and Xavier Boyen and Vinod Vaikuntanathan and Panagiotis Voulgaris and Hoeteck Wee}, title = {Fuzzy Identity Based Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {414}, year = {2011}, url = {http://eprint.iacr.org/2011/414}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBVVW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/BoyenW10, author = {Xavier Boyen and Brent Waters}, editor = {Jianying Zhou and Moti Yung}, title = {Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {35--52}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_3}, doi = {10.1007/978-3-642-13708-2\_3}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/BoyenW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/BoyenCFP10, author = {Xavier Boyen and C{\'{e}}line Chevalier and Georg Fuchsbauer and David Pointcheval}, editor = {Daniel J. Bernstein and Tanja Lange}, title = {Strong Cryptography from Weak Secrets}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2010, Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6055}, pages = {297--315}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-12678-9\_18}, doi = {10.1007/978-3-642-12678-9\_18}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/BoyenCFP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, editor = {Tal Rabin}, title = {Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical {IBE}}, booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6223}, pages = {98--115}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14623-7\_6}, doi = {10.1007/978-3-642-14623-7\_6}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/AgrawalBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/BojinovBBB10, author = {Hristo Bojinov and Elie Bursztein and Xavier Boyen and Dan Boneh}, editor = {Dimitris Gritzalis and Bart Preneel and Marianthi Theoharidou}, title = {Kamouflage: Loss-Resistant Password Management}, booktitle = {Computer Security - {ESORICS} 2010, 15th European Symposium on Research in Computer Security, Athens, Greece, September 20-22, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6345}, pages = {286--302}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-15497-3\_18}, doi = {10.1007/978-3-642-15497-3\_18}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/BojinovBBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AgrawalBB10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen}, editor = {Henri Gilbert}, title = {Efficient Lattice {(H)IBE} in the Standard Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30 - June 3, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6110}, pages = {553--572}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13190-5\_28}, doi = {10.1007/978-3-642-13190-5\_28}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AgrawalBB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Preventing Pollution Attacks in Multi-source Network Coding}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {161--176}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_10}, doi = {10.1007/978-3-642-13013-7\_10}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AgrawalBBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Boyen10, author = {Xavier Boyen}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Lattice Mixing and Vanishing Trapdoors: {A} Framework for Fully Secure Short Signatures and More}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {499--517}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_29}, doi = {10.1007/978-3-642-13013-7\_29}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Boyen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/isc/Boyen10, author = {Xavier Boyen}, editor = {Alexander W. Dent and Yuliang Zheng}, title = {Identity-Based Signcryption}, booktitle = {Practical Signcryption}, series = {Information Security and Cryptography}, pages = {195--216}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-540-89411-7\_10}, doi = {10.1007/978-3-540-89411-7\_10}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/series/isc/Boyen10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBBF10, author = {Shweta Agrawal and Dan Boneh and Xavier Boyen and David Mandell Freeman}, title = {Preventing Pollution Attacks in Multi-Source Network Coding}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {183}, year = {2010}, url = {http://eprint.iacr.org/2010/183}, timestamp = {Thu, 01 May 2025 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBBF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/Boyen09, author = {Xavier Boyen}, editor = {Juan A. Garay and Atsuko Miyaji and Akira Otsuka}, title = {{HPAKE} : Password Authentication Secure against Cross-Site User Impersonation}, booktitle = {Cryptology and Network Security, 8th International Conference, {CANS} 2009, Kanazawa, Japan, December 12-14, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5888}, pages = {279--298}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10433-6\_19}, doi = {10.1007/978-3-642-10433-6\_19}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/Boyen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Boyen09, author = {Xavier Boyen}, editor = {Wanqing Li and Willy Susilo and Udaya Kiran Tupakula and Reihaneh Safavi{-}Naini and Vijay Varadharajan}, title = {Hidden credential retrieval from a reusable password}, booktitle = {Proceedings of the 2009 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2009, Sydney, Australia, March 10-12, 2009}, pages = {228--238}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1533057.1533089}, doi = {10.1145/1533057.1533089}, timestamp = {Fri, 18 Mar 2022 11:47:58 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Boyen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AbdallaBCP09, author = {Michel Abdalla and Xavier Boyen and C{\'{e}}line Chevalier and David Pointcheval}, editor = {Stanislaw Jarecki and Gene Tsudik}, title = {Distributed Public-Key Cryptography from Weak Secrets}, booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference on Practice and Theory in Public Key Cryptography, Irvine, CA, USA, March 18-20, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5443}, pages = {139--159}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00468-1\_9}, doi = {10.1007/978-3-642-00468-1\_9}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AbdallaBCP09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/Boyen09, author = {Xavier Boyen}, editor = {Marc Joye and Gregory Neven}, title = {Flexible {IBE} and Beyond in the Commutative-Blinding Framework}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {65--82}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-65}, doi = {10.3233/978-1-58603-947-9-65}, timestamp = {Thu, 11 Apr 2019 14:31:06 +0200}, biburl = {https://dblp.org/rec/series/ciss/Boyen09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:series/ciss/Boyen09a, author = {Xavier Boyen}, editor = {Marc Joye and Gregory Neven}, title = {Generalized {IBE} in the Exponent-Inversion Framework}, booktitle = {Identity-Based Cryptography}, series = {Cryptology and Information Security Series}, volume = {2}, pages = {83--99}, publisher = {{IOS} Press}, year = {2009}, url = {https://doi.org/10.3233/978-1-58603-947-9-83}, doi = {10.3233/978-1-58603-947-9-83}, timestamp = {Thu, 11 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/series/ciss/Boyen09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijact/Boyen08, author = {Xavier Boyen}, title = {A tapestry of identity-based encryption: practical frameworks compared}, journal = {Int. J. Appl. Cryptogr.}, volume = {1}, number = {1}, pages = {3--21}, year = {2008}, url = {https://doi.org/10.1504/IJACT.2008.017047}, doi = {10.1504/IJACT.2008.017047}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijact/Boyen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/BonehB08, author = {Dan Boneh and Xavier Boyen}, title = {Short Signatures Without Random Oracles and the {SDH} Assumption in Bilinear Groups}, journal = {J. Cryptol.}, volume = {21}, number = {2}, pages = {149--177}, year = {2008}, url = {https://doi.org/10.1007/s00145-007-9005-7}, doi = {10.1007/S00145-007-9005-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/BonehB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Boyen08, author = {Xavier Boyen}, editor = {Yi Mu and Willy Susilo and Jennifer Seberry}, title = {New Paradigms for Password Security}, booktitle = {Information Security and Privacy, 13th Australasian Conference, {ACISP} 2008, Wollongong, Australia, July 7-9, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5107}, pages = {1--5}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-70500-0\_1}, doi = {10.1007/978-3-540-70500-0\_1}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Boyen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/Boyen08, author = {Xavier Boyen}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {The Uber-Assumption Family}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {39--56}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_3}, doi = {10.1007/978-3-540-85538-5\_3}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/Boyen08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/BoyenD08, author = {Xavier Boyen and C{\'{e}}cile Delerabl{\'{e}}e}, editor = {Rafail Ostrovsky and Roberto De Prisco and Ivan Visconti}, title = {Expressive Subgroup Signatures}, booktitle = {Security and Cryptography for Networks, 6th International Conference, {SCN} 2008, Amalfi, Italy, September 10-12, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5229}, pages = {185--200}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85855-3\_13}, doi = {10.1007/978-3-540-85855-3\_13}, timestamp = {Tue, 25 Feb 2020 11:33:46 +0100}, biburl = {https://dblp.org/rec/conf/scn/BoyenD08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Boyen07, author = {Xavier Boyen}, editor = {Kaoru Kurosawa}, title = {Miniature {CCA2} {PK} Encryption: Tight Security Without Redundancy}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {485--501}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_30}, doi = {10.1007/978-3-540-76900-2\_30}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Boyen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boyen07, author = {Xavier Boyen}, editor = {Moni Naor}, title = {Mesh Signatures}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {210--227}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_12}, doi = {10.1007/978-3-540-72540-4\_12}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boyen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Boyen07a, author = {Xavier Boyen}, editor = {Moni Naor}, title = {General \emph{Ad Hoc} Encryption from Exponent Inversion {IBE}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4515}, pages = {394--411}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72540-4\_23}, doi = {10.1007/978-3-540-72540-4\_23}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Boyen07a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/BoyenW07, author = {Xavier Boyen and Brent Waters}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Full-Domain Subgroup Hiding and Constant-Size Group Signatures}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_1}, doi = {10.1007/978-3-540-71677-8\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/BoyenW07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/Boyen07, author = {Xavier Boyen}, editor = {Niels Provos}, title = {Halting Password Puzzles: Hard-to-break Encryption from Human-memorable Keys}, booktitle = {Proceedings of the 16th {USENIX} Security Symposium, Boston, MA, USA, August 6-10, 2007}, publisher = {{USENIX} Association}, year = {2007}, url = {https://www.usenix.org/conference/16th-usenix-security-symposium/halting-password-puzzles-hard-break-encryption-human}, timestamp = {Mon, 01 Feb 2021 08:43:02 +0100}, biburl = {https://dblp.org/rec/conf/uss/Boyen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boyen07, author = {Xavier Boyen}, title = {Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {94}, year = {2007}, url = {http://eprint.iacr.org/2007/094}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boyen07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/rfc/rfc5091, author = {Xavier Boyen and Luther Martin}, title = {Identity-Based Cryptography Standard {(IBCS)} {\#}1: Supersingular Curve Implementations of the {BF} and {BB1} Cryptosystems}, journal = {{RFC}}, volume = {5091}, pages = {1--63}, year = {2007}, url = {https://doi.org/10.17487/RFC5091}, doi = {10.17487/RFC5091}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/rfc/rfc5091.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyenSSW06, author = {Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters}, editor = {Ari Juels and Rebecca N. Wright and Sabrina De Capitani di Vimercati}, title = {Forward-secure signatures with untrusted update}, booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications Security, {CCS} 2006, Alexandria, VA, USA, October 30 - November 3, 2006}, pages = {191--200}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1180405.1180430}, doi = {10.1145/1180405.1180430}, timestamp = {Wed, 24 Feb 2021 17:28:35 +0100}, biburl = {https://dblp.org/rec/conf/ccs/BoyenSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BoyenW06, author = {Xavier Boyen and Brent Waters}, editor = {Cynthia Dwork}, title = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {290--307}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_17}, doi = {10.1007/11818175\_17}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BoyenW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehB06, author = {Dan Boneh and Xavier Boyen}, editor = {Cynthia Dwork}, title = {On the Impossibility of Efficiently Combining Collision Resistant Hash Functions}, booktitle = {Advances in Cryptology - {CRYPTO} 2006, 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4117}, pages = {570--583}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11818175\_34}, doi = {10.1007/11818175\_34}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BonehBH06, author = {Dan Boneh and Xavier Boyen and Shai Halevi}, editor = {David Pointcheval}, title = {Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles}, booktitle = {Topics in Cryptology - {CT-RSA} 2006, The Cryptographers' Track at the {RSA} Conference 2006, San Jose, CA, USA, February 13-17, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3860}, pages = {226--243}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11605805\_15}, doi = {10.1007/11605805\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BonehBH06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyenW06, author = {Xavier Boyen and Brent Waters}, editor = {Serge Vaudenay}, title = {Compact Group Signatures Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2006, 25th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4004}, pages = {427--444}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11761679\_26}, doi = {10.1007/11761679\_26}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyenW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/Boyen06, author = {Xavier Boyen}, editor = {Gadiel Seroussi and Alfredo Viola}, title = {A Promenade through the New Cryptography of Bilinear Pairings}, booktitle = {2006 {IEEE} Information Theory Workshop, {ITW} 2006, Punta del Este, Uruguay, March 13-17, 2006}, pages = {19--23}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ITW.2006.1633773}, doi = {10.1109/ITW.2006.1633773}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/itw/Boyen06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenW06, author = {Xavier Boyen and Brent Waters}, title = {Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {85}, year = {2006}, url = {http://eprint.iacr.org/2006/085}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenSSW06, author = {Xavier Boyen and Hovav Shacham and Emily Shen and Brent Waters}, title = {Forward-Secure Signatures with Untrusted Update}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {297}, year = {2006}, url = {http://eprint.iacr.org/2006/297}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenSSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/BoyenMW05, author = {Xavier Boyen and Qixiang Mei and Brent Waters}, editor = {Vijay Atluri and Catherine Meadows and Ari Juels}, title = {Direct chosen ciphertext security from identity-based techniques}, booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005}, pages = {320--329}, publisher = {{ACM}}, year = {2005}, url = {https://doi.org/10.1145/1102120.1102162}, doi = {10.1145/1102120.1102162}, timestamp = {Tue, 19 Sep 2023 14:44:32 +0200}, biburl = {https://dblp.org/rec/conf/ccs/BoyenMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BoyenDKOS05, author = {Xavier Boyen and Yevgeniy Dodis and Jonathan Katz and Rafail Ostrovsky and Adam D. Smith}, editor = {Ronald Cramer}, title = {Secure Remote Authentication Using Biometric Data}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {147--163}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_9}, doi = {10.1007/11426639\_9}, timestamp = {Tue, 20 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BoyenDKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehBG05, author = {Dan Boneh and Xavier Boyen and Eu{-}Jin Goh}, editor = {Ronald Cramer}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3494}, pages = {440--456}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11426639\_26}, doi = {10.1007/11426639\_26}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBG05, author = {Dan Boneh and Xavier Boyen and Eu{-}Jin Goh}, title = {Hierarchical Identity Based Encryption with Constant Size Ciphertext}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {15}, year = {2005}, url = {http://eprint.iacr.org/2005/015}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBG05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenMW05, author = {Xavier Boyen and Qixiang Mei and Brent Waters}, title = {Direct Chosen Ciphertext Security from Identity-Based Techniques}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {288}, year = {2005}, url = {http://eprint.iacr.org/2005/288}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenMW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BoyenW05, author = {Xavier Boyen and Brent Waters}, title = {Compact Group Signatures Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {381}, year = {2005}, url = {http://eprint.iacr.org/2005/381}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BoyenW05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Boyen04, author = {Xavier Boyen}, editor = {Vijayalakshmi Atluri and Birgit Pfitzmann and Patrick D. McDaniel}, title = {Reusable cryptographic fuzzy extractors}, booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004}, pages = {82--91}, publisher = {{ACM}}, year = {2004}, url = {https://doi.org/10.1145/1030083.1030096}, doi = {10.1145/1030083.1030096}, timestamp = {Fri, 13 Nov 2020 16:10:44 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Boyen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehBS04, author = {Dan Boneh and Xavier Boyen and Hovav Shacham}, editor = {Matthew K. Franklin}, title = {Short Group Signatures}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {41--55}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_3}, doi = {10.1007/978-3-540-28628-8\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehBS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/BonehB04, author = {Dan Boneh and Xavier Boyen}, editor = {Matthew K. Franklin}, title = {Secure Identity Based Encryption Without Random Oracles}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {443--459}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_27}, doi = {10.1007/978-3-540-28628-8\_27}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/BonehB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehB04, author = {Dan Boneh and Xavier Boyen}, editor = {Christian Cachin and Jan Camenisch}, title = {Short Signatures Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {56--73}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_4}, doi = {10.1007/978-3-540-24676-3\_4}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BonehB04a, author = {Dan Boneh and Xavier Boyen}, editor = {Christian Cachin and Jan Camenisch}, title = {Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3027}, pages = {223--238}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24676-3\_14}, doi = {10.1007/978-3-540-24676-3\_14}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eurocrypt/BonehB04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehB04, author = {Dan Boneh and Xavier Boyen}, title = {Short Signatures Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {171}, year = {2004}, url = {http://eprint.iacr.org/2004/171}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehB04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehB04a, author = {Dan Boneh and Xavier Boyen}, title = {Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {172}, year = {2004}, url = {http://eprint.iacr.org/2004/172}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehB04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehB04b, author = {Dan Boneh and Xavier Boyen}, title = {Secure Identity Based Encryption Without Random Oracles}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {173}, year = {2004}, url = {http://eprint.iacr.org/2004/173}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehB04b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BonehBS04, author = {Dan Boneh and Xavier Boyen and Hovav Shacham}, title = {Short Group Signatures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {174}, year = {2004}, url = {http://eprint.iacr.org/2004/174}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BonehBS04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boyen04, author = {Xavier Boyen}, title = {Reusable Cryptographic Fuzzy Extractors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2004}, url = {http://eprint.iacr.org/2004/358}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boyen04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Boyen03, author = {Xavier Boyen}, editor = {Dan Boneh}, title = {Multipurpose Identity-Based Signcryption {(A} Swiss Army Knife for Identity-Based Cryptography)}, booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2729}, pages = {383--399}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45146-4\_23}, doi = {10.1007/978-3-540-45146-4\_23}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Boyen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Boyen03, author = {Xavier Boyen}, title = {Multipurpose Identity-Based Signcryption : {A} Swiss Army Knife for Identity-Based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {163}, year = {2003}, url = {http://eprint.iacr.org/2003/163}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Boyen03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/us/Boyen02, author = {Xavier Boyen}, title = {Inference and learning in complex stochastic processes}, school = {Stanford University, {USA}}, year = {2002}, url = {https://searchworks.stanford.edu/view/5506759}, timestamp = {Wed, 31 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/us/Boyen02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fss/BoyenW99, author = {Xavier Boyen and Louis Wehenkel}, title = {Automatic induction of fuzzy decision trees and its application to power system security assessment}, journal = {Fuzzy Sets Syst.}, volume = {102}, number = {1}, pages = {3--19}, year = {1999}, url = {https://doi.org/10.1016/S0165-0114(98)00198-5}, doi = {10.1016/S0165-0114(98)00198-5}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fss/BoyenW99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/BoyenK99, author = {Xavier Boyen and Daphne Koller}, editor = {Jim Hendler and Devika Subramanian}, title = {Exploiting the Architecture of Dynamic Systems}, booktitle = {Proceedings of the Sixteenth National Conference on Artificial Intelligence and Eleventh Conference on Innovative Applications of Artificial Intelligence, July 18-22, 1999, Orlando, Florida, {USA}}, pages = {313--320}, publisher = {{AAAI} Press / The {MIT} Press}, year = {1999}, url = {http://www.aaai.org/Library/AAAI/1999/aaai99-046.php}, timestamp = {Tue, 05 Sep 2023 09:10:47 +0200}, biburl = {https://dblp.org/rec/conf/aaai/BoyenK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uai/BoyenFK99, author = {Xavier Boyen and Nir Friedman and Daphne Koller}, editor = {Kathryn B. Laskey and Henri Prade}, title = {Discovering the Hidden Structure of Complex Dynamic Systems}, booktitle = {{UAI} '99: Proceedings of the Fifteenth Conference on Uncertainty in Artificial Intelligence, Stockholm, Sweden, July 30 - August 1, 1999}, pages = {91--100}, publisher = {Morgan Kaufmann}, year = {1999}, url = {https://dslpitt.org/uai/displayArticleDetails.jsp?mmnu=1\&\#38;smnu=2\&\#38;article\_id=157\&\#38;proceeding\_id=15}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uai/BoyenFK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nips/BoyenK98, author = {Xavier Boyen and Daphne Koller}, editor = {Michael J. Kearns and Sara A. Solla and David A. Cohn}, title = {Approximate Learning of Dynamic Models}, booktitle = {Advances in Neural Information Processing Systems 11, {[NIPS} Conference, Denver, Colorado, USA, November 30 - December 5, 1998]}, pages = {396--402}, publisher = {The {MIT} Press}, year = {1998}, url = {http://papers.nips.cc/paper/1588-approximate-learning-of-dynamic-models}, timestamp = {Mon, 16 May 2022 15:41:51 +0200}, biburl = {https://dblp.org/rec/conf/nips/BoyenK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uai/BoyenK98, author = {Xavier Boyen and Daphne Koller}, editor = {Gregory F. Cooper and Seraf{\'{\i}}n Moral}, title = {Tractable Inference for Complex Stochastic Processes}, booktitle = {{UAI} '98: Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence, University of Wisconsin Business School, Madison, Wisconsin, USA, July 24-26, 1998}, pages = {33--42}, publisher = {Morgan Kaufmann}, year = {1998}, url = {https://dslpitt.org/uai/displayArticleDetails.jsp?mmnu=1\&\#38;smnu=2\&\#38;article\_id=230\&\#38;proceeding\_id=14}, timestamp = {Wed, 03 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/uai/BoyenK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.