scispace - formally typeset
D

Duong Hieu Phan

Researcher at University of Limoges

Publications -  76
Citations -  1400

Duong Hieu Phan is an academic researcher from University of Limoges. The author has contributed to research in topics: Encryption & Broadcast encryption. The author has an hindex of 21, co-authored 70 publications receiving 1217 citations. Previous affiliations of Duong Hieu Phan include École Normale Supérieure & Centre national de la recherche scientifique.

Papers
More filters
Journal Article

Public traceability in traitor tracing schemes

TL;DR: This paper introduces a new feature, the “public traceability”, which means that the center can delegate the tracing capability to any “untrusted” person, and improves bilinear maps for traitor tracing applications, and gets an “almost” optimal scheme.
Book ChapterDOI

Public traceability in traitor tracing schemes

TL;DR: In this paper, the authors proposed a bilinear Diffie-Hellman-based traitor tracing scheme with a ciphertext/plaintext rate asymptotically 1.
Book ChapterDOI

Decentralized Multi-Client Functional Encryption for Inner Product

TL;DR: Decentralized Multi-Client Functional Encryption (DMCFE) as mentioned in this paper allows various senders to noninteractively generate ciphertexts which support inner-product evaluation, with functional decryption keys that can also be generated non-interactively, in a distributed way, among the senders.
Book ChapterDOI

About the security of ciphers (semantic security and pseudo-random permutations)

TL;DR: This paper considers the security notions for length-preserving, deterministic and symmetric encryption schemes, also termed ciphers: semantic security under lunchtime and challenge-adaptive adversaries, and provides some relations for this notion between different models of adversaries.
Journal ArticleDOI

Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts

TL;DR: Boneh, Gentry, and Waters as mentioned in this paper proposed a broadcast encryption scheme with constant-size secret keys and ciphertexts and proved that it is selective chosen-ciphertext secure based on standard assumptions.