D
Duong Hieu Phan
Researcher at University of Limoges
Publications - 76
Citations - 1400
Duong Hieu Phan is an academic researcher from University of Limoges. The author has contributed to research in topics: Encryption & Broadcast encryption. The author has an hindex of 21, co-authored 70 publications receiving 1217 citations. Previous affiliations of Duong Hieu Phan include École Normale Supérieure & Centre national de la recherche scientifique.
Papers
More filters
Journal Article
Public traceability in traitor tracing schemes
TL;DR: This paper introduces a new feature, the “public traceability”, which means that the center can delegate the tracing capability to any “untrusted” person, and improves bilinear maps for traitor tracing applications, and gets an “almost” optimal scheme.
Book ChapterDOI
Public traceability in traitor tracing schemes
TL;DR: In this paper, the authors proposed a bilinear Diffie-Hellman-based traitor tracing scheme with a ciphertext/plaintext rate asymptotically 1.
Book ChapterDOI
Decentralized Multi-Client Functional Encryption for Inner Product
TL;DR: Decentralized Multi-Client Functional Encryption (DMCFE) as mentioned in this paper allows various senders to noninteractively generate ciphertexts which support inner-product evaluation, with functional decryption keys that can also be generated non-interactively, in a distributed way, among the senders.
Book ChapterDOI
About the security of ciphers (semantic security and pseudo-random permutations)
TL;DR: This paper considers the security notions for length-preserving, deterministic and symmetric encryption schemes, also termed ciphers: semantic security under lunchtime and challenge-adaptive adversaries, and provides some relations for this notion between different models of adversaries.
Journal ArticleDOI
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts
TL;DR: Boneh, Gentry, and Waters as mentioned in this paper proposed a broadcast encryption scheme with constant-size secret keys and ciphertexts and proved that it is selective chosen-ciphertext secure based on standard assumptions.