selected publications

selected publications in reversed chronological order

  1. Zero-Knowledge Protocols for the Subset Sum Problem from MPC-in-the-Head with Rejection
    Thibauld Feneuil, Jules Maire, Matthieu Rivain, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings (Shweta Agrawal, and Dongdai Lin, eds), Springer, Lecture Notes in Computer Science, vol. 13792, pp. 371–402 (2022).
    open access doi
  2. Lower and Upper Bounds on the Randomness Complexity of Private Computations of AND
    Eyal Kushilevitz, Rafail Ostrovsky, Emmanuel Prouff, Adi Rosén, Adrian Thillard, and Damien Vergnaud
    SIAM J. Discret. Math. 35, 1, pp. 465-484 (2021).
    open access doi
  3. Privately Outsourcing Exponentiation to a Single Server: Cryptanalysis and Optimal Constructions
    Céline Chevalier, Fabien Laguillaumie, and Damien Vergnaud
    Algorithmica 83, 1, pp. 72-115 (2021).
    open access doi
  4. Private Multiplication over Finite Fields
    Sonia Belaı̈d, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud
    In Advances in Cryptology - CRYPTO 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part III (Jonathan Katz, and Hovav Shacham, eds), Springer, Lecture Notes in Computer Science, vol. 10403, pp. 397–426 (2017).
    open access doi video
  5. Randomness Complexity of Private Circuits for Multiplication
    Sonia Belaı̈d, Fabrice Benhamouda, Alain Passelègue, Emmanuel Prouff, Adrian Thillard, and Damien Vergnaud
    In Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part II (Marc Fischlin, and Jean-Sébastien Coron, eds), Springer, Lecture Notes in Computer Science, vol. 9666, pp. 616–648 (2016).
    open access doi video
  6. Security analysis of pseudo-random number generators with input: /dev/random is not robust
    Yevgeniy Dodis, David Pointcheval, Sylvain Ruhault, Damien Vergnaud, and Daniel Wichs
    In 2013 ACM SIGSAC Conference on Computer and Communications Security, CCS’13, Berlin, Germany, November 4-8, 2013 (Ahmad-Reza Sadeghi, Virgil D. Gligor, and Moti Yung, eds), ACM, pp. 647–658 (2013).
    open access doi
  7. New Techniques for SPHFs and Efficient One-Round PAKE Protocols
    Fabrice Benhamouda, Olivier Blazy, Céline Chevalier, David Pointcheval, and Damien Vergnaud
    In Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I (Ran Canetti, and Juan A. Garay, eds), Springer, Lecture Notes in Computer Science, vol. 8042, pp. 449–475 (2013).
    open access doi
  8. Round-Optimal Privacy-Preserving Protocols with Smooth Projective Hash Functions
    Olivier Blazy, David Pointcheval, and Damien Vergnaud
    In Theory of Cryptography - 9th Theory of Cryptography Conference, TCC 2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 7194, pp. 94–111 (2012).
    open access doi
  9. Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen Ciphertext Security
    Brett Hemenway, Benoı̂t Libert, Rafail Ostrovsky, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2011 - 17th International Conference on the Theory and Application of Cryptology and Information Security, Seoul, South Korea, December 4-8, 2011. Proceedings (Dong Hoon Lee, and Xiaoyun Wang, eds), Springer, Lecture Notes in Computer Science, vol. 7073, pp. 70–88 (2011).
    open access doi
  10. Signatures on Randomizable Ciphertexts
    Olivier Blazy, Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud
    In Public Key Cryptography - PKC 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings (Dario Catalano, Nelly Fazio, Rosario Gennaro, and Antonio Nicolosi, eds), Springer, Lecture Notes in Computer Science, vol. 6571, pp. 403–422 (2011).
    open access doi
  11. Multi-use unidirectional proxy re-signatures
    Benoı̂t Libert, and Damien Vergnaud
    In Proceedings of the 2008 ACM Conference on Computer and Communications Security, CCS 2008, Alexandria, Virginia, USA, October 27-31, 2008 (Peng Ning, Paul F. Syverson, and Somesh Jha, eds), ACM, pp. 511–520 (2008).
    open access doi
  12. Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption
    Benoı̂t Libert, and Damien Vergnaud
    In Public Key Cryptography - PKC 2008, 11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings (Ronald Cramer, ed), Springer, Lecture Notes in Computer Science, vol. 4939, pp. 360–379 (2008).
    open access doi
    winner of PKC Test-of-Time Award
  13. New Extensions of Pairing-Based Signatures into Universal Designated Verifier Signatures
    Damien Vergnaud
    In Automata, Languages and Programming, 33rd International Colloquium, ICALP 2006, Venice, Italy, July 10-14, 2006, Proceedings, Part II (Michele Bugliesi, Bart Preneel, Vladimiro Sassone, and Ingo Wegener, eds), Springer, Lecture Notes in Computer Science, vol. 4052, pp. 58–69 (2006).
    open access doi
  14. Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
    Pascal Paillier, and Damien Vergnaud
    In Advances in Cryptology - ASIACRYPT 2005, 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Bimal K. Roy, ed), Springer, Lecture Notes in Computer Science, vol. 3788, pp. 1–20 (2005).
    open access doi
    winner of the Best Paper Award
    winner of IACR Test-of-Time Award