Key escrow protocol based on a tripartite authenticated key agreement and threshold cryptography

Z Wang, Z Ma, S Luo, H Gao - IEEE Access, 2019 - ieeexplore.ieee.org
While instant messaging systems bring convenience to people's lives and work, they also
make it easier for malicious users to discuss and plot illegal activities. Therefore …

How to (legally) keep secrets from mobile operators

G Arfaoui, O Blazy, X Bultel, PA Fouque… - … –ESORICS 2021: 26th …, 2021 - Springer
Secure-channel establishment allows two endpoints to communicate confidentially and
authentically. Since they hide all data sent across them, good or bad, secure channels are …

Pairing-free secure-channel establishment in mobile networks with fine-grained lawful interception

X Bultel, C Onete - Proceedings of the 37th ACM/SIGAPP Symposium on …, 2022 - dl.acm.org
Modern-day mobile communications allow users to connect from any place, at any time.
However, this ubiquitous access comes at the expense of their privacy. Currently, the …

Adaptation d'Outils Cryptographiques pour un Contexte Post-Quantique

C Nugier - 2023 - laas.hal.science
La cryptographie est utilisée pour protéger la vie privée de tous quotidiennement lors de la
navigation sur Internet. On observe de multiples changements en cours ces dernières …

[PDF][PDF] Legally keeping secrets from mobile operators: Lawful Interception Key Exchange (LIKE).

G Arfaoui, O Blazy, X Bultel, PA Fouque… - IACR Cryptol. ePrint …, 2020 - iacr.steepath.eu
How to balance user privacy with a law enforcement agency's need to view their
communications during investigations has always been a delicate and hard to formalize …

Cloud key directory for federating data exchanges

RP D'souza, O Pandey - US Patent 11,082,424, 2021 - Google Patents
Embodiments are directed to securing data using attribute-based encryption. In an
embodiment, a computer system encrypts a portion of data with an attribute-based …