• Publications
  • Influence
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
TLDR
We extend the GSW/RingGSW ciphertexts to TGSW, which is the combined analogue of Gentry-Sahai-Water’s Ciphertexts. Expand
  • 232
  • 19
  • PDF
TFHE: Fast Fully Homomorphic Encryption Over the Torus
TLDR
This work describes a fast fully homomorphic encryption scheme over the torus (TFHE) that revisits, generalizes and improves the fully Homomorphic encryption (FHE) based on GSW and its ring variants. Expand
  • 101
  • 15
  • PDF
An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication
TLDR
This work deals with the security challenges in authentication protocols employing volatile biometric features, where the authentication is indeed a comparison between a fresh biometric template and that enrolled during enrollment phase. Expand
  • 130
  • 13
  • PDF
Election Verifiability for Helios under Weaker Trust Assumptions
TLDR
We provide a generic construction that transforms a voting scheme that is verifiable against an honest bulletin board and an honest registration authority weakly verifiable into a verifiable voting scheme under the weaker trust assumption that the registration authority and the bulletin board are not simultaneously dishonest strong verifiability. Expand
  • 81
  • 10
  • PDF
Faster Packed Homomorphic Operations and Efficient Circuit Bootstrapping for TFHE
TLDR
We propose two methods to manipulate packed data, in order to decrease the ciphertext expansion and optimize the evaluation of look-up tables in \({\mathrm {RingGSW}}\) based homomorphic schemes. Expand
  • 73
  • 9
  • PDF
Block-Wise P-Signatures and Non-interactive Anonymous Credentials with Efficient Attributes
TLDR
We present an anonymous credential scheme with non-interactive proofs of credential possession where credentials are associated with a number of attributes. Expand
  • 40
  • 4
  • PDF
Divisible E-Cash in the Standard Model
TLDR
This paper presents the first construction of divisible e-cash in the standard model (i.e., without the random oracle heuristic). Expand
  • 18
  • 3
  • PDF
New Anonymity Notions for Identity-Based Encryption
TLDR
This paper extends this notion to stronger adversaries (the authority itself). Expand
  • 17
  • 3
  • PDF
Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange
TLDR
In Asiacrypt 2005, Abdalla et al. put forward the notion of gateway-based password-authenticated key exchange protocol, which allows clients and gateways to establish a common session key with the help of an authentication server. Expand
  • 37
  • 2
  • PDF
Improving TFHE: faster packed homomorphic operations and efficient circuit bootstrapping
TLDR
We propose two packing methods, in order to decrease the expansion factor and optimize the evaluation of look-up tables and random functions in TRGSW-based homomorphic schemes. Expand
  • 30
  • 1
  • PDF