Efficient and provably-secure identity-based signatures and signcryption from bilinear maps P Barreto, B Libert, N McCullagh, JJ Quisquater Advances in Cryptology-ASIACRYPT 2005, 515-532, 2005 | 738 | 2005 |
Expressive key-policy attribute-based encryption with constant-size ciphertexts N Attrapadung, B Libert, E De Panafieu Public Key Cryptography–PKC 2011, 90-108, 2011 | 492 | 2011 |
A new identity based signcryption scheme from pairings B Libert, JJ Quisquater Information Theory Workshop, 2003. Proceedings. 2003 IEEE, 155-158, 2003 | 458 | 2003 |
Unidirectional chosen-ciphertext secure proxy re-encryption B Libert, D Vergnaud Public Key Cryptography–PKC 2008, 360-379, 2008 | 442 | 2008 |
Fully secure functional encryption for linear functions from standard assumptions S Agrawal, B Libert, D Stehle CRYPTO, 333-362, 2016 | 306* | 2016 |
Attribute-based encryption schemes with constant-size ciphertexts N Attrapadung, J Herranz, F Laguillaumie, B Libert, E De Panafieu, ... Theoretical Computer Science 422, 15-38, 2012 | 243 | 2012 |
Adaptive-ID secure revocable identity-based encryption B Libert, D Vergnaud Topics in Cryptology–CT-RSA 2009, 1-15, 2009 | 238 | 2009 |
Zero-knowledge arguments for lattice-based accumulators: logarithmic-size ring signatures and group signatures without trapdoors B Libert, S Ling, K Nguyen, H Wang Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 229 | 2016 |
Efficient signcryption with key privacy from gap Diffie-Hellman groups B Libert, JJ Quisquater Public Key Cryptography–PKC 2004, 187-200, 2004 | 218 | 2004 |
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model B Libert, K Paterson, E Quaglia Public Key Cryptography–PKC 2012, 206-224, 2012 | 217 | 2012 |
On constructing certificateless cryptosystems from identity based encryption B Libert, JJ Quisquater Public Key Cryptography-PKC 2006, 474-490, 2006 | 214 | 2006 |
Efficient revocation and threshold pairing based cryptosystems B Libert, JJ Quisquater Proceedings of the twenty-second annual symposium on Principles of …, 2003 | 186 | 2003 |
Functional encryption for inner product: Achieving constant-size ciphertexts with adaptive security or support for negation N Attrapadung, B Libert Public Key Cryptography–PKC 2010, 384-402, 2010 | 184 | 2010 |
Lattice-based group signatures with logarithmic signature size F Laguillaumie, A Langlois, B Libert, D Stehlé Advances in Cryptology-ASIACRYPT 2013, 41-61, 2013 | 183 | 2013 |
Short attribute-based signatures for threshold predicates J Herranz, F Laguillaumie, B Libert, C Ràfols Topics in Cryptology–CT-RSA 2012, 51-67, 2012 | 176 | 2012 |
Signature Schemes with Efficient Protocols and Dynamic Group Signatures from Lattice Assumptions B Libert, FM San Ling, K Nguyen, H Wang Cryptology ePrint Archive, Report 2016/101, 2016. http://eprint. iacr. org, 2016 | 168 | 2016 |
Unidirectional chosen-ciphertext secure proxy re-encryption B Libert, D Vergnaud Information Theory, IEEE Transactions on 57 (3), 1786-1802, 2011 | 159 | 2011 |
Multi-use unidirectional proxy re-signatures B Libert, D Vergnaud Proceedings of the 15th ACM conference on Computer and communications …, 2008 | 155 | 2008 |
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data M Joye, B Libert Financial Cryptography and Data Security, 111-125, 2013 | 154 | 2013 |
Group Signatures with Almost-for-free Revocation B Libert, T Peters, M Yung Advances in Cryptology–CRYPTO 2012, 571-589, 2012 | 154 | 2012 |