Xavier Boyen
Chronological Roster

This page provides a reasonably complete (and somewhat redundant) account of my academic works. Entries are classified by the nature of the work, and in reverse chronological order within each class.

See also my thematic bibliography — or go back to my homepage.

Published

0.     Conference Proceedings
1.     Book Chapters — by invitation —
2.     Featured Pieces — by invitation —
3.     Journal Articles (contributed)
4.     Refereed Papers (contributed)
5.     Workshop Notices (contributed)
6.     Standard Sheets
7.     Technical Reports
8.     Posted Briefs
9.     Issued Patents
10.     Doctoral Dissertation

Presented

11.     Doctoral Defense
12.     Special Courses — by invitation —
13.     Featured Lectures — by invitation —
14.     Contributed Exposes





Publications    

Conference Proceedings

Proceedings of the 5th International Conference on Provable Security — PROVSEC 2011. (Info) (Details)


Book Chapters — by invitation —

Identity-Based Signcryption, invited book chapter, in Practical Signcryption, 2010. (Info) (Details)

Generalized IBE in the Exponent-Inversion Framework, invited book chapter, in Identity-Based Encryption, 2008. (Info) (Details)

Flexible IBE and Beyond in the Commutative-Blinding Framework, invited book chapter, in Identity-Based Encryption, 2008. (Info) (Details)

Robust and Reusable Fuzzy Extractors, invited book chapter, in Security with Noisy Data, 2007. (Info) (Details)


Featured Pieces — by invitation —

Expressive Encryption Systems from Lattices (abstract from the invited lecture), invited paper, in CANS 2011, 2008. (Info) (Details)

A Tapestry of Identity-Based Encryption: Practical Frameworks Compared, invited article (for the inaugural issue), in International Journal of Applied Cryptography, 2008. (Info) (Details)

The Uber-Assumption Family – A Unified Complexity Framework for Bilinear Groups, invited paper, in PAIRING 2008. (Info) (Details)

New Paradigms for Password Security (abstract from the keynote lecture), invited abstract, in ACISP 2008. (Info) (Details)

A Promenade through the New Cryptography of Bilinear Pairings, invited short survey, in IEEE ITW 2006. (Info) (Details)


Journal Articles (excl. invited)

Efficient Selective Identity-Based Encryption Without Random Oracles, with D. Boneh, in Journal of Cryptology, online 2010, print 2011. (Info) (Details) (Original paper details)

Short Signatures Without Random Oracles and the SDH Assumption in Bilinear Groups, with D. Boneh, in Journal of Cryptology, online 2007, print 2008. (Info) (Details) (Original paper details)


Refereed Papers (excl. invited)

(New)   Attribute-Based Functional Encryption on Lattices, in TCC 2013. (To appear.) (Info) (Details)

Functional Encryption for Threshold Functions (or, Fuzzy IBE) from Lattices, with S. Agrawal, V. Vaikuntanathan, P. Voulgaris, and H. Wee, in PKC 2012. (Info) (Details)

Bitter to Better : How to Make Bitcoin a Better Currency, with S. Barber, E. Shi, and E. Uzun, in FC 2012. (Info) (Details)

Kamouflage: Loss-Resistant Password Management, with H. Bojinov, D. Boneh, and E. Bursztein, in ESORICS 2010. (Info) (Details)

Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE, with S. Agrawal and D. Boneh, in CRYPTO 2010. (Info) (Details)

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions, with B. Waters, in ACNS 2010. (Info) (Details)

Lattice Mixing and Vanishing Trapdoors – A Framework for Fully Secure Short Signatures and More, in PKC 2010. (Info) (Details)

Preventing Pollution Attacks in Multi-source Network Coding, with S. Agrawal, D. Boneh, and D. Mandell Freeman, in PKC 2010. (Info) (Details)

Efficient Lattice (H)IBE in the Standard Model, with S. Agrawal and D. Boneh, in EUROCRYPT 2010. (Info) (Details)

Strong Cryptography from Weak Secrets – Building Efficient PKE and IBE from Distributed Passwords, with C. Chevalier, G. Fuchsbauer, and D. Pointcheval, in AFRICACRYPT 2010. (Info) (Details)

HPAKE : Password Authentication Secure Against Cross-Site User Impersonation, in CANS 2009. (Info) (Details)

Distributed Public-Key Cryptography from Weak Secrets, with M. Abdalla, C. Chevalier, and D. Pointcheval, in PKC 2009. (Info) (Details)

Hidden Credential Retrieval from a Reusable Password, in ASIACCS 2009. (Info) (Details)

Expressive Subgroup Signatures, with C. Delerablée, in SCN 2008. (Info) (Details)

Miniature CCA2 PK Encryption : Tight Security Without Redundancy, in ASIACRYPT 2007. (Info) (Details)

Halting Password Puzzles – Hard-to-break Encryption from Human-memorable Keys, in USENIX SECURITY 2007. (Info) (Details)

Mesh Signatures – How to Leak a Secret with Unwitting and Unwilling Participants, in EUROCRYPT 2007. (Info) (Details)

General Ad Hoc Encryption from Exponent Inversion IBE, in EUROCRYPT 2007. (Info) (Details)

**Best paper award**   Full-Domain Subgroup Hiding and Constant-Size Group Signatures, with B. Waters, in PKC 2007. (Info) (Details)

Forward-Secure Signatures with Untrusted Update, with H. Shacham, E. Shen, and B. Waters, in ACM CCS 2006. (Info) (Details)

On the Impossibility of Efficiently Combining Collision Resistant Hash Functions, with D. Boneh, in CRYPTO 2006. (Info) (Details)

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), with B. Waters, in CRYPTO 2006. (Info) (Details)

Compact Group Signatures Without Random Oracles, with B. Waters, in EUROCRYPT 2006. (Info) (Details)

Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles, with D. Boneh and S. Halevi, in CT-RSA 2006. (Info) (Details)

Direct Chosen Ciphertext Security from Identity-Based Techniques, with Q. Mei and B. Waters, in ACM CCS 2005. (Info) (Details)

Secure Remote Authentication Using Biometric Data, with Y. Dodis, J. Katz, R. Ostrovsky, and A. Smith, in EUROCRYPT 2005. (Info) (Details)

Hierarchical Identity Based Encryption with Constant Size Ciphertext, with D. Boneh and E.-J. Goh, in EUROCRYPT 2005. (Info) (Details)

Reusable Cryptographic Fuzzy Extractors, in ACM CCS 2004. (Info) (Details)

Secure Identity Based Encryption Without Random Oracles, with D. Boneh, in CRYPTO 2004. (Info) (Details)

Short Group Signatures, with D. Boneh and H. Shacham, in CRYPTO 2004. (Info) (Details)

Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, with D. Boneh, in EUROCRYPT 2004. (Info) (Details)

Short Signatures Without Random Oracles, with D. Boneh, in EUROCRYPT 2004. (Info) (Details)

Multipurpose Identity-Based Signcryption – A Swiss Army Knife for Identity-Based Cryptography, in CRYPTO 2003. (Info) (Details)

Discovering the Hidden Structure of Complex Dynamic Systems, with N. Friedman and D. Koller, in UAI 1999. (Info) (Details)

Exploiting the Architecture of Dynamic Systems, with D. Koller, in AAAI 1999. (Info) (Details)

Approximate Learning of Dynamic Models, with D. Koller, in NIPS 1998. (Info) (Details)

Tractable Inference for Complex Stochastic Processes, with D. Koller, in UAI 1998. (Info) (Details)


Workshop Notices

Practical and Secure Password-based Encryption for Mobile Storage, at the IEEE Key Management Summit, 2008. (Details)

A Roadmap of IBE Systems and their Applications, at the NIST IBE Workshop, 2008. (Details)

Towards the Visualization of Overlapping Sets, with N. Mishra and L. O'Callaghan, in DIMACS Comp. Geom. Wkshp. 2002. (Info) (Details)


Standard Sheets

RFC 5091 — Identity-Based Cryptography Standard (IBCS) #1: Supersingular Curve Implementations of the BF and BB1 Cryptosystems, with L. Martin, in IETF Secretariat RFC Repository, 2007. (Link)


Technical Reports

(New)   Attribute-Based Functional Encryption on Lattices, preprint, in Cryptology ePrint Archive. (Link)

Fuzzy Identity Based Encryption from Lattices, preprint, with S. Agrawal, V. Vaikuntanathan, P. Voulgaris, and H. Wee, in Cryptology ePrint Archive. (Link)

Mesh Signatures – How to Leak a Secret with Unwitting and Unwilling Participants, expanded paper, in Cryptology ePrint Archive. (Link)

Forward-Secure Signatures with Untrusted Update, expanded paper, with H. Shacham, E. Shen, and B. Waters, in Cryptology ePrint Archive. (Link)

Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles), expanded paper, with B. Waters, in Cryptology ePrint Archive. (Link)

Compact Group Signatures Without Random Oracles, expanded paper, with B. Waters, in Cryptology ePrint Archive. (Link)

Direct Chosen Ciphertext Security from Identity-Based Techniques, expanded paper, with Q. Mei and B. Waters, in Cryptology ePrint Archive. (Link)

Hierarchical Identity Based Encryption with Constant Size Ciphertext, expanded paper, with D. Boneh and E.-J. Goh, in Cryptology ePrint Archive. (Link)

Reusable Cryptographic Fuzzy Extractors, expanded paper, in Cryptology ePrint Archive. (Link)

Short Group Signatures, expanded paper, with D. Boneh and H. Shacham, in Cryptology ePrint Archive. (Link)

Secure Identity Based Encryption Without Random Oracles, expanded paper, with D. Boneh, in Cryptology ePrint Archive. (Link)

Efficient Selective-ID Secure Identity Based Encryption Without Random Oracles, expanded paper, with D. Boneh, in Cryptology ePrint Archive. (Link)

Short Signatures Without Random Oracles, expanded paper, with D. Boneh, in Cryptology ePrint Archive. (Link)

Multipurpose Identity-Based Signcryption – A Swiss Army Knife for Identity-Based Cryptography, expanded paper, in Cryptology ePrint Archive. (Link)


Posted Briefs

Identity-Based Encryption from Lattices in the Standard Model, preliminary paper, with S. Agrawal. (Details)


Issued Patents

(U.S. and International) — not listed here


Doctoral Dissertation

Inference and Learning in Complex Stochastic Processes, Ph.D. Thesis, 2002. (Info) (Details)



Presentations

Doctoral Defense

(Ph.D. Defense) Inference and Learning in Complex Stochastic Processes, at Stanford, June 2001. (Slides)


Special Courses — by invitation —

(New)   Expressive Cryptography (14:00 hours in four lectures), special course seminar sponsored by the Chinese Association for Cryptographic Research, in Beijing, China, December 2012. (Details) (Slides I) (Slides II) (Slides III)

Pairing-based Systems (4:00 hours in two lectures), invited to the eCrypt-2 Summer School on Provable Security, in Barcelona, Spain, September 2009. (Details) (Slides)


Featured Lectures — by invitation —

Expressive Encryption Systems from Lattices, invited to the 10th international conference on Cryptography and Network Security, in Sanya, China, December 2011. (Details) (Slides)

Fine-Grained Anonymity in Signatures: Tools & Apps., invited to the 3rd international conference on Trust and Trustworthy Computing, workshop on Anonymous Signatures, in Berlin, Germany, June 2010. (Details) (Slides)

Some Wonders of Modern Cryptography, invited to the Belgian Graduate School on Computer Science, in Liège, Belgium, March 2010. (Details) (Slides)

“T B D” The Bertinoro Dilemma, invited to the international workshop on Cryptographic Protocols and Public-Key Cryptography, in Bertinoro, Italy, May 2009. (Details) (Slides)

The Uber-Assumption Framework, invited to the 2nd International Conference on Pairing-based Cryptography, at Royal Holloway University of London, England, September 2008. (Details) (Slides)

New Paradigms for (Real-World) Password Security, invited to the 13th Australasian Conference on Information Security and Privacy, in Wollongong, New South Wales, July 2008. (Details) (Slides)

Complexity Assumptions from Pairings, invited to the 1st QUT Workshop on Pairing Based Cryptography, in Brisbane, Queensland, June 2007. (Details) (Slides)

Pairing-Based Signatures, invited to same, in Brisbane, Queensland, June 2007. (Details) (Slides)

An Introduction to Identity-Based Encryption, invited to same, in Brisbane, Queensland, June 2007. (Details) (Slides)

New Techniques for Ring Signatures and Beyond, invited to the Bertinoro Workshop on Cryptographic Protocols, in Bertinoro, Italy, March 2007. (Details) (Slides)

Practical Aspects of Identity-Based Encryption, invited to the 10th workshop on Elliptic Curves in Cryptography, in Toronto, Ontario, September 2006. (Details) (Slides)

Provably Secure Cryptosystems from Pairings, invited to the 3rd YACC biennial cryptography workshop, on Porquerolles Island, France, June 2006. (Details) (Slides)

A Promenade through the New Cryptography of Bilinear Pairings, invited to the IEEE Information Theory Workshop, in Punta del Este, Uruguay, March 2006. (Details) (Slides)

Modern Identity-Based Encryption and Applications, invited to the 1st workshop on Pairings in Cryptography, in Dublin, Ireland, June 2005. (Details) (Slides)

Secure Fuzzy Extractors, invited to the DIMACS workshop on Cryptography Theory Meets Practice, at Rutgers, New Jersey, October 2004. (Details) (Slides)


Contributed Exposes

Bitter to Better : How to Make Bitcoin a Better Currency, at FC, February 2012. (Slides)

Lattice Basis Delegation in Fixed Dimension & Shorter HIBE, at CRYPTO, August 2010. (Slides)

Shrinking the Keys of Discrete-Log-Type Lossy Trapdoor Functions, at ACNS, June 2010. (Slides)

Lattice Mixing and Vanishing Trapdoors, at PKC, May 2010. (Slides)

Portable Authentication from a Weaker Password, at CANS, December 2009. (Slides)

How Your Friends Can Help You Remember Your Keys, at PKC, March 2009. (Slides)

How to Store and Retrieve Online Credentials with Minimal Trust Assumptions, at ASIACCS, March 2009. (Slides)

Expressive Subgroup Signatures, at SCN, September 2008. (Slides)

Miniature CCA2 Public-Key Encryption, at ASIACRYPT, December 2007. (Slides)

Halting Password Puzzles -or- how best to defeat offline attacks, at USENIX Security, August 2007. (Slides)

Mesh Signatures (and more on Ring Signatures), at EUROCRYPT, May 2007. (Slides)

General Ad Hoc Encryption from “Exponent Inversion” IBE, at EUROCRYPT, May 2007. (Slides)

**Best paper award**   Full-Domain Subgroup Hiding and Constant-Size Group Signatures, at PKC, April 2007. (Slides)

Can CRHFs be Combined Efficiently?, at CRYPTO, August 2006. (Slides)

Anonymous Hierarchical IBE (without RO), at CRYPTO, August 2006. (Slides)

Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles, at CT-RSA, February 2006. (Slides)

Direct Chosen Ciphertext Security from Identity-Based Techniques, at ACM CCS, November 2005. (Slides)

Secure Remote Authentication Using Biometric Data, at EUROCRYPT, May 2005. (Slides)

Reusable Cryptographic Fuzzy Extractors, at ACM CCS, October 2004. (Slides)

Secure Identity Based Encryption Without Random Oracles, at CRYPTO, August 2004. (Slides)

Short Signatures Without Random Oracles, at EUROCRYPT, May 2004. (Slides)

Multipurpose Identity-Based Signcryption, at CRYPTO, August 2003. (Slides)

Discovering the Hidden structure of Complex Dynamic Systems, at UAI, July 1999. (Slides)

Exploiting the Architecture of Dynamic Systems, at AAAI, July 1999. (Slides)

Approximate Learning of Dynamic Models, at NIPS, December 1998.

Tractable Inference for Complex Stochastic Processes, at UAI, July 1998. (Slides)





Unless indicated otherwise, these pages and documents are Copyright © Xavier Boyen; all rights reserved in all countries.
Back to Xavier's homepage