default search action
Duong Hieu Phan
Person information
- unicode name: Phan Dương Hiệu
- affiliation: Telecom Paris, Institut Polytechnique de Paris, France
- affiliation (former): University of Limoges, France
- affiliation (former): Ecole Normale Supérieure, Paris, France
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j11]Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. Proc. Priv. Enhancing Technol. 2024(4): 583-604 (2024) - [c47]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Public-Key Anamorphism in (CCA-Secure) Public-Key Encryption and Beyond. CRYPTO (2) 2024: 422-455 - [c46]San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. Public Key Cryptography (1) 2024: 37-73 - [e2]Clemente Galdi, Duong Hieu Phan:
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part I. Lecture Notes in Computer Science 14973, Springer 2024, ISBN 978-3-031-71069-8 [contents] - [e1]Clemente Galdi, Duong Hieu Phan:
Security and Cryptography for Networks - 14th International Conference, SCN 2024, Amalfi, Italy, September 11-13, 2024, Proceedings, Part II. Lecture Notes in Computer Science 14974, Springer 2024, ISBN 978-3-031-71072-8 [contents] - [i31]San Ling, Khoa Nguyen, Duong Hieu Phan, Khai Hanh Tang, Huaxiong Wang, Yanhong Xu:
Fully Dynamic Attribute-Based Signatures for Circuits from Codes. IACR Cryptol. ePrint Arch. 2024: 22 (2024) - [i30]Ferran Alborch Escobar, Sébastien Canard, Fabien Laguillaumie, Duong Hieu Phan:
Computational Differential Privacy for Encrypted Databases Supporting Linear Queries. IACR Cryptol. ePrint Arch. 2024: 48 (2024) - [i29]Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Public Inputs and Strong Security. IACR Cryptol. ePrint Arch. 2024: 740 (2024) - [i28]Sébastien Canard, Caroline Fontaine, Duong Hieu Phan, David Pointcheval, Marc Renard, Renaud Sirdey:
Relations among new CCA security notions for approximate FHE. IACR Cryptol. ePrint Arch. 2024: 812 (2024) - [i27]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Public-Key Anamorphism in (CCA-secure) Public-Key Encryption and Beyond. IACR Cryptol. ePrint Arch. 2024: 1327 (2024) - 2023
- [j10]Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. Proc. Priv. Enhancing Technol. 2023(4): 170-183 (2023) - [c45]Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Optimal Security Notion for Decentralized Multi-Client Functional Encryption. ACNS 2023: 336-365 - [c44]Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval:
Verifiable Decentralized Multi-client Functional Encryption for Inner Product. ASIACRYPT (5) 2023: 33-65 - [c43]Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu:
Privacy-Preserving Digital Vaccine Passport. CANS 2023: 137-161 - [c42]Miroslaw Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
Anamorphic Signatures: Secrecy from a Dictator Who Only Permits Authentication! CRYPTO (2) 2023: 759-790 - [i26]Dinh Duy Nguyen, Duong Hieu Phan, David Pointcheval:
Verifiable Multi-Client Functional Encryption for Inner Product. IACR Cryptol. ePrint Arch. 2023: 268 (2023) - [i25]Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
Anamorphic Signatures: Secrecy From a Dictator Who Only Permits Authentication! IACR Cryptol. ePrint Arch. 2023: 356 (2023) - [i24]Mirek Kutylowski, Giuseppe Persiano, Duong Hieu Phan, Moti Yung, Marcin Zawada:
The Self-Anti-Censorship Nature of Encryption: On the Prevalence of Anamorphic Cryptography. IACR Cryptol. ePrint Arch. 2023: 434 (2023) - [i23]Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Optimal Security Notion for Decentralized Multi-Client Functional Encryption. IACR Cryptol. ePrint Arch. 2023: 435 (2023) - [i22]Thai Duong, Jiahui Gao, Duong Hieu Phan, Ni Trieu:
Privacy-Preserving Digital Vaccine Passport. IACR Cryptol. ePrint Arch. 2023: 1656 (2023) - 2022
- [c41]Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Fine-Grained Access Control. ASIACRYPT (1) 2022: 95-125 - [c40]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Anamorphic Encryption: Private Communication Against a Dictator. EUROCRYPT (2) 2022: 34-63 - [i21]Ky Nguyen, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Fine-Grained Access Control. IACR Cryptol. ePrint Arch. 2022: 215 (2022) - [i20]Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé:
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. IACR Cryptol. ePrint Arch. 2022: 307 (2022) - [i19]Giuseppe Persiano, Duong Hieu Phan, Moti Yung:
Anamorphic Encryption: Private Communication against a Dictator. IACR Cryptol. ePrint Arch. 2022: 639 (2022) - 2021
- [c39]Olivier Blazy, Sayantan Mukherjee, Huyen Nguyen, Duong Hieu Phan, Damien Stehlé:
An Anonymous Trace-and-Revoke Broadcast Encryption Scheme. ACISP 2021: 214-233 - [c38]San Ling, Khoa Nguyen, Duong Hieu Phan, Hanh Tang, Huaxiong Wang:
Zero-Knowledge Proofs for Committed Symmetric Boolean Functions. PQCrypto 2021: 339-359 - 2020
- [j9]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan, Josef Pieprzyk, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [c37]Xuan Thanh Do, Duong Hieu Phan, Moti Yung:
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. ACNS (2) 2020: 145-164 - [c36]Thai Duong, Duong Hieu Phan, Ni Trieu:
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. ASIACRYPT (3) 2020: 870-899 - [c35]Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Dynamic Decentralized Functional Encryption. CRYPTO (1) 2020: 747-775 - [c34]Xuan Thanh Do, Duong Hieu Phan, David Pointcheval:
Traceable Inner Product Functional Encryption. CT-RSA 2020: 564-585 - [c33]Chloé Hébant, Duong Hieu Phan, David Pointcheval:
Linearly-Homomorphic Signatures and Scalable Mix-Nets. Public Key Cryptography (2) 2020: 597-627 - [i18]Jérémy Chotard, Edouard Dufour-Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Dynamic Decentralized Functional Encryption. IACR Cryptol. ePrint Arch. 2020: 197 (2020) - [i17]Xuan Thanh Do, Duong Hieu Phan, Moti Yung:
A Concise Bounded Anonymous Broadcast Yielding Combinatorial Trace-and-Revoke Schemes. IACR Cryptol. ePrint Arch. 2020: 826 (2020) - [i16]Thai Duong, Duong Hieu Phan, Ni Trieu:
Catalic: Delegated PSI Cardinality with Applications to Contact Tracing. IACR Cryptol. ePrint Arch. 2020: 1105 (2020)
2010 – 2019
- 2019
- [c32]Olivier Blazy, Laura Brouilhet, Duong Hieu Phan:
Anonymous Identity Based Encryption with Traceable Identities. ARES 2019: 13:1-13:10 - [c31]Olivier Blazy, Paul Germouty, Duong Hieu Phan:
Downgradable Identity-Based Encryption and Applications. CT-RSA 2019: 44-61 - [c30]Chloé Hébant, Duong Hieu Phan, David Pointcheval:
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data. ISC 2019: 87-106 - [i15]Chloé Hébant, Duong Hieu Phan, David Pointcheval:
Linearly-Homomorphic Signatures and Scalable Mix-Nets. IACR Cryptol. ePrint Arch. 2019: 547 (2019) - [i14]Xuan Thanh Do, Duong Hieu Phan, David Pointcheval:
Traceable Inner Product Functional Encryption. IACR Cryptol. ePrint Arch. 2019: 1358 (2019) - 2018
- [j8]Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh:
Attribute-based broadcast encryption scheme for lightweight devices. IET Inf. Secur. 12(1): 52-59 (2018) - [j7]Sébastien Canard, Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh:
A new technique for compacting ciphertext in multi-channel broadcast encryption and attribute-based encryption. Theor. Comput. Sci. 723: 51-72 (2018) - [c29]Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Decentralized Multi-Client Functional Encryption for Inner Product. ASIACRYPT (2) 2018: 703-732 - [i13]Chloé Hébant, Duong Hieu Phan, David Pointcheval:
Decentralized Evaluation of Quadratic Polynomials on Encrypted Data. IACR Cryptol. ePrint Arch. 2018: 1019 (2018) - [i12]Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Multi-Client Functional Encryption with Repetition for Inner Product. IACR Cryptol. ePrint Arch. 2018: 1021 (2018) - [i11]Olivier Blazy, Paul Germouty, Duong Hieu Phan:
Downgradable Identity-based Encryption and Applications. IACR Cryptol. ePrint Arch. 2018: 1176 (2018) - 2017
- [j6]San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. Algorithmica 79(4): 1318-1352 (2017) - [j5]Duong Hieu Phan, Neal Koblitz:
Cryptography during the French and American Wars in Vietnam. Cryptologia 41(6): 491-511 (2017) - [c28]Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract. CCS 2017: 2277-2293 - [c27]Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich:
Identity-Based Encryption from Codes with Rank Metric. CRYPTO (3) 2017: 194-224 - [c26]Jérémy Chotard, Duong Hieu Phan, David Pointcheval:
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms. ISC 2017: 155-172 - [i10]Philippe Gaborit, Adrien Hauteville, Duong Hieu Phan, Jean-Pierre Tillich:
Identity-based Encryption from Codes with Rank Metric. IACR Cryptol. ePrint Arch. 2017: 514 (2017) - [i9]Shweta Agrawal, Sanjay Bhattacherjee, Duong Hieu Phan, Damien Stehlé, Shota Yamada:
Efficient Public Trace and Revoke from Standard Assumptions. IACR Cryptol. ePrint Arch. 2017: 650 (2017) - [i8]Jérémy Chotard, Edouard Dufour Sans, Romain Gay, Duong Hieu Phan, David Pointcheval:
Decentralized Multi-Client Functional Encryption for Inner Product. IACR Cryptol. ePrint Arch. 2017: 989 (2017) - 2016
- [c25]Sébastien Canard, Duong Hieu Phan, Viet Cuong Trinh:
A New Technique for Compacting Secret Key in Attribute-Based Broadcast Encryption. CANS 2016: 594-603 - [i7]Jérémy Chotard, Duong Hieu Phan, David Pointcheval:
Homomorphic-Policy Attribute-Based Key Encapsulation Mechanisms. IACR Cryptol. ePrint Arch. 2016: 1089 (2016) - [i6]Duong Hieu Phan, Neal Koblitz:
Cryptography during the French and American Wars in Vietnam. IACR Cryptol. ePrint Arch. 2016: 1136 (2016) - 2014
- [b2]Duong Hieu Phan:
Some Advances in Broadcast Encryption and Traitor Tracing. École Normale Supérieure, Paris, France, 2014 - [c24]San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. CRYPTO (1) 2014: 315-334 - [i5]San Ling, Duong Hieu Phan, Damien Stehlé, Ron Steinfeld:
Hardness of k-LWE and Applications in Traitor Tracing. IACR Cryptol. ePrint Arch. 2014: 494 (2014) - 2013
- [j4]Hung Q. Ngo, Duong Hieu Phan, David Pointcheval:
Black-Box Trace&Revoke Codes. Algorithmica 67(3): 418-448 (2013) - [j3]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA broadcast encryption with constant-size secret keys and ciphertexts. Int. J. Inf. Sec. 12(4): 251-265 (2013) - [c23]Philippe Guillot, Abdelkrim Nimour, Duong Hieu Phan, Viet Cuong Trinh:
Optimal Public Key Traitor Tracing Scheme in Non-Black Box Model. AFRICACRYPT 2013: 140-155 - [c22]Duong Hieu Phan, Viet Cuong Trinh:
Key-Leakage Resilient Revoke Scheme Resisting Pirates 2.0 in Bounded Leakage Model. AFRICACRYPT 2013: 342-358 - [c21]Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh:
Multi-channel broadcast encryption. AsiaCCS 2013: 277-286 - 2012
- [j2]Michel Abdalla, Angelo De Caro, Duong Hieu Phan:
Generalized Key Delegation for Wildcarded Identity-Based and Inner-Product Encryption. IEEE Trans. Inf. Forensics Secur. 7(6): 1695-1706 (2012) - [c20]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. ACISP 2012: 308-321 - [c19]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Message-Based Traitor Tracing with Optimal Ciphertext Rate. LATINCRYPT 2012: 56-77 - [c18]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Decentralized Dynamic Broadcast Encryption. SCN 2012: 166-183 - [i4]Duong Hieu Phan, David Pointcheval, Siamak Fayyaz Shahandashti, Mario Strefler:
Adaptive CCA Broadcast Encryption with Constant-Size Secret Keys and Ciphertexts. IACR Cryptol. ePrint Arch. 2012: 216 (2012) - [i3]Duong Hieu Phan, Viet Cuong Trinh:
Resistance to Pirates 2.0: A Method from Leakage Resilient Cryptography. IACR Cryptol. ePrint Arch. 2012: 305 (2012) - [i2]Duong Hieu Phan, David Pointcheval, Viet Cuong Trinh:
Multi-Channel Broadcast Encryption. IACR Cryptol. ePrint Arch. 2012: 307 (2012) - 2011
- [c17]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Security Notions for Broadcast Encryption. ACNS 2011: 377-394 - [c16]Duong Hieu Phan, Viet Cuong Trinh:
Identity-Based Trace and Revoke Schemes. ProvSec 2011: 204-221 - [i1]Duong Hieu Phan, David Pointcheval, Mario Strefler:
Adaptively Secure Broadcast Encryption with Forward Secrecy. IACR Cryptol. ePrint Arch. 2011: 463 (2011)
2000 – 2009
- 2009
- [c15]Olivier Billet, Duong Hieu Phan:
Traitors Collaborating in Public: Pirates 2.0. EUROCRYPT 2009: 189-205 - 2008
- [c14]Yvo Desmedt, Helger Lipmaa, Duong Hieu Phan:
Hybrid Damgård Is CCA1-Secure under the DDH Assumption. CANS 2008: 18-30 - [c13]Olivier Billet, Duong Hieu Phan:
Efficient Traitor Tracing from Collusion Secure Codes. ICITS 2008: 171-182 - [c12]Yvo Desmedt, Duong Hieu Phan:
A CCA Secure Hybrid Damgård's ElGamal Encryption. ProvSec 2008: 68-82 - 2007
- [c11]Nelly Fazio, Antonio Nicolosi, Duong Hieu Phan:
Traitor Tracing with Optimal Transmission Rate. ISC 2007: 71-88 - [c10]Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart:
Identity-Based Traitor Tracing. Public Key Cryptography 2007: 361-376 - 2006
- [c9]Duong Hieu Phan, Reihaneh Safavi-Naini, Dongvu Tonien:
Generic Construction of Hybrid Public Key Traitor Tracing with Full-Public-Traceability. ICALP (2) 2006: 264-275 - [c8]Duong Hieu Phan:
Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate. VIETCRYPT 2006: 354-365 - 2005
- [b1]Duong Hieu Phan:
Sécurité et efficacité des schémas cryptographiques. (Security and Efficiency of Cryptographic Schemes). École Polytechnique, Palaiseau, France, 2005 - [c7]Benoît Chevallier-Mames, Duong Hieu Phan, David Pointcheval:
Optimal Asymmetric Encryption and Signature Paddings. ACNS 2005: 254-268 - [c6]Hervé Chabanne, Duong Hieu Phan, David Pointcheval:
Public Traceability in Traitor Tracing Schemes. EUROCRYPT 2005: 542-558 - 2004
- [c5]Duong Hieu Phan, David Pointcheval:
OAEP 3-Round: A Generic and Secure Asymmetric Encryption Padding. ASIACRYPT 2004: 63-77 - [c4]Duong Hieu Phan, David Pointcheval:
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations). Selected Areas in Cryptography 2004: 182-197 - [c3]Duong Hieu Phan, David Pointcheval:
On the Security Notions for Public-Key Encryption Schemes. SCN 2004: 33-46 - 2003
- [j1]Nguyen Thanh Thuy, Duong Hieu Phan, Takahiro Yamanoi:
Some Preliminary Results on the Stableness of Extended F-rule Systems. J. Adv. Comput. Intell. Intell. Informatics 7(3): 252-259 (2003) - [c2]Duong Hieu Phan, David Pointcheval:
Chosen-Ciphertext Security without Redundancy. ASIACRYPT 2003: 1-18 - [c1]Duong Hieu Phan, David Pointcheval:
Une comparaison entre deux méthodes de preuve de sécurité. RIVF 2003: 105-110
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:24 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint