Benoît Libert homepage

UCL Crypto Group
ICTEAM Institute
Université Catholique de Louvain
Place du Levant, 3
13148 Louvain-la-Neuve - Belgium

Email: benoit.libert@uclouvain.be
Phone: +32.10.47.80.62

Ph.D. in Cryptography (February 2006) at the UCL Crypto Group, under the direction of Jean-Jacques Quisquater.
Previously F.N.R.S. post-doctoral researcher at the UCL Crypto Group.
Currently F.N.R.S. scientific collaborator at the UCL Crypto Group.

Publications

Journal Papers
  • Nuttapong Attrapadung, Javier Herranz, Fabien Laguillaumie, Benoît Libert, Elie de Panafieu, Carla Ràfols, Attribute-Based Encryption Schemes with Constant-Size Ciphertexts, in Theoretical Computer Science, to appear, 2012.
  • Nuttapong Attrapadung, Benoît Libert, Functional Encryption for Public-Attribute Inner Products: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation, in Journal of Mathematical Cryptology, October 2011, vol. 5, n°2, pp. 115-158.
  • Benoît Libert, Damien Vergnaud, Towards Practical Black-Box Accountable Authority IBE: Weak Black-Box Traceability with Short Ciphertexts and Private Keys, in IEEE Trans. on Information Theory, October 2011, vol. 57, n°10, pp. 7189-7204.
  • Benoît Libert, Moti Yung, Efficient Traceable Signatures in the Standard Model, in Theoretical Computer Science, March 2011, vol. 412, n° 12-14, pp. 1220-1242.
  • Benoît Libert, Damien Vergnaud, Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption, in IEEE Trans. on Information Theory, March 2011, vol. 57, n° 3, pp. 1786-1802.
  • Benoît Libert, Jean-Jacques Quisquater, Moti Yung, Key Evolution Systems in Untrusted Update Environments, in ACM Transactions on Information and System Security (ACM-TISSEC), Vol. 13 Issue 4, December 2010.
  • Conference Papers
  • Nuttapong Attrapadung, Benoît Libert, Thomas Peters, Computing on Authenticated Data: New Privacy Definitions and Constructions, in Asiacrypt 2012, LNCS series, to appear, 2012. Full version
  • Benoît Libert, Thomas Peters, Moti Yung, Group Signatures with Almost-for-free Revocation, in Crypto 2012, LNCS 7417, pp. 571-589, 2012. Full version
  • Malika Izabachène, Benoît Libert, Divisible E-Cash in the Standard Model, in 5th International Conference on Pairing-Based Cryptography (Pairing'12), LNCS series, to appear, 2012.
  • Benoît Libert, Kenneth G. Paterson, Elizabeth A. Quaglia, Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, in Public Key Cryptography 2012 (PKC'12), LNCS 7293, pp. 206-224, 2012. Full version
  • Benoît Libert, Thomas Peters, Moti Yung, Scalable Group Signatures with Revocation, in Eurocrypt 2012, LNCS 7323, pp. 609-627, 2012. Full version
  • Benoît Libert, Moti Yung, Non-Interactive CCA-Secure Threshold Cryptosystems with Adaptive Security: New Framework and Constructions, in Theory of Cryptography Conference 2012 (TCC'12), LNCS 7194, pp. 75-93, 2012. Full version
  • Javier Herranz, Fabien Laguillaumie, Benoît Libert, Carla Ràfols, Short Attribute-Based Signatures for Threshold Predicates, in CT-RSA 2012, LNCS 7178, pp. 51-67, 2012. Full version
  • Malika Izabachène, Benoît Libert, Damien Vergnaud, Block-wise P-Signatures and Non-Interactive Anonymous Credentials with Efficient Attributes, in 13th IMA International Conference on Cryptography and Coding 2011 (IMACC 2011), LNCS 7089, pp. 431-450, 2011.
  • Brett Hemenway, Benoît Libert, Rafail Ostrovsky, Damien Vergnaud, Lossy Encryption: Constructions from General Assumptions and Efficient Selective Opening Chosen-Ciphertext Security, in Asiacrypt 2011, LNCS 7073, pp. 70-88, 2011. Full version
  • Marc Fischlin, Benoît Libert, Mark Manulis, Non-interactive and Re-Usable Universally Composable String Commitments with Adaptive Security, in Asiacrypt 2011, LNCS 7073, pp. 468-485, 2011.
  • Benoît Libert, Moti Yung, Adaptively Secure Non-Interactive Threshold Cryptosystems, in ICALP 2011 - Track C, LNCS 6756, pp. 588-600, Springer, 2011. Full version
  • Nuttapong Attrapadung, Benoît Libert, Elie de Panafieu, Expressive Key-Policy Attribute-Based Encryption with Constant-Size Ciphertexts, in Public Key Cryptography 2011 (PKC'11), LNCS 6571, pp. 90-108, 2011. Full version
  • Nuttapong Attrapadung, Benoît Libert, Homomorphic Network Coding Signatures in the Standard Model, in Public Key Cryptography 2011 (PKC'11), LNCS 6571, pp. 17-34, 2011. Copyright Springer.
  • Benoît Libert, Moti Yung, Efficient Completely Non-Malleable Public Key Encryption, in ICALP 2010 - Track A, LNCS 6198, pp. 127-139, 2010.
  • David Galindo, Benoît Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, Dominique Schröder, Public Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions, in Africacrypt 2010, LNCS 6055, pp. 333-350, 2010.
  • Nuttapong Attrapadung, Benoît Libert, Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Security or Support for Negation, in Public Key Cryptography 2010 (PKC'10), LNCS 6056, pp. 384-402, 2010. Full version
  • Benoît Libert, Moti Yung, Dynamic Fully Forward-Secure Group Signatures, in 5th ACM Symposium on Information, Computer and Communications Security (AsiaCCS'10), pp. 70-81, 2010.
  • Benoît Libert, Moti Yung, Concise Mercurial Vector Commitments and Independent Zero-Knowledge Sets with Short Proofs, in Theory of Cryptography Conference 2010 (TCC'10), LNCS 5978, pp. 499-517, 2010. Full version
  • Benoît Libert, Damien Vergnaud, Group Signatures with Verifier-Local Revocation and Backward Unlinkability in the Standard Model, in 8th International Conference on Cryptology and Network Security (CANS'09), LNCS 5888, pp. 498-517, 2009.
  • Julien Cathalo, Benoît Libert, Moti Yung, Group Encryption: Non-Interactive Realization in the Standard Model, in Asiacrypt 2009, LNCS 5912, pp. 179-196, 2009. Full version
  • Benoît Libert, Moti Yung, Efficient Traceable Signatures in the Standard Model, in 3rd International Conference on Pairing-Based Cryptography (Pairing'09), LNCS 5671, pp. 187-205, 2009. Full version
  • Benoît Libert, Damien Vergnaud, Adaptive-ID Secure Revocable Identity-Based Encryption, in CT-RSA 2009, LNCS 5473, pp. 1-15, 2009.
  • Benoît Libert, Damien Vergnaud, Towards Black-Box Accountable Authority IBE with Short Ciphertexts and Private Keys, in Public Key Cryptography 2009 (PKC'09), LNCS 5443, pp. 235-255, 2009. Full version.
  • Benoît Libert, Damien Vergnaud, Multi-Use Unidirectional Proxy Re-Signatures, in 15th ACM Conference on Computer and Communications Security (ACM CCS'08), 2008.
  • Benoît Libert, Damien Vergnaud, Tracing Malicious Proxies in Proxy Re-Encryption , in 2nd International Conference on Pairing-Based Cryptography (Pairing'08), LNCS 5209, pp. 332-353, 2008. Copyright Springer.
  • Benoît Libert, Damien Vergnaud, Unidirectional Chosen-Ciphertext Secure Proxy Re-Encryption, in Public Key Cryptography 2008 (PKC'08), LNCS 4939, pp. 360-379, 2008. Full version.
  • Alexander W. Dent, Benoît Libert, Kenneth G. Paterson, Certificateless Encryption Schemes Strongly Secure in the Standard Model, in Public Key Cryptography 2008 (PKC'08), LNCS 4939, pp. 344-359, 2008. Full version.
  • Benoît Libert, Jean-Jacques Quisquater, Moti Yung, Forward-Secure Signatures in Untrusted Update Environments: Efficient and Generic Constructions , in 14th ACM Conference on Computer and Communications Security (ACM CCS'07). Copyright ACM.
  • Benoît Libert, Jean-Jacques Quisquater, Practical Time Capsule Signatures in the Standard Model from Bilinear Maps , in 1st International Conference on Pairing Based Cryptography (Pairing'07), LNCS 4575, pp. 23-38. Copyright Springer.
  • Benoît Libert, Jean-Jacques Quisquater, Moti Yung, Parallel Key-Insulated Public Key Encryption Without Random Oracles, in Public Key Cryptography 2007 (PKC'07), LNCS 4450, pp. 298-314. Copyright IACR.
  • Benoît Libert, Jean-Jacques Quisquater, Moti Yung, Efficient Intrusion-Resilient Signatures Without Random Oracles, in 2nd SKLOIS Conference on Information Security and Cryptology (Inscrypt) 2006, LNCS 4318, pp. 27-41, 2006. Copyright Springer.
  • Fabien Laguillaumie, Benoît Libert, Jean-Jacques Quisquater, Universal Designated Verifier Signatures Without Random Oracles or Non-Black Box Assumptions, in Security and Cryptography for Networks (SCN'06), LNCS 4116, pp. 63-77, 2006. Copyright Springer.
  • Benoît Libert, Jean-Jacques Quisquater, On Constructing Certificateless Cryptosystems from Identity Based Encryption, in Public Key Cryptography 2006 (PKC'06), LNCS 3958, pp. 474-490, 2006. Copyright IACR.
  • Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater, Efficient and Non-Interactive Timed-Release Encryption. In Information and Communications Security 2005 (ICICS'05), LNCS 3783, pp. 291-303, Springer, 2005.
  • Paulo S.L.M. Barreto, Benoît Libert, Noel McCullagh, Jean-Jacques Quisquater, Efficient and Provably-Secure Identity-Based Signatures and Signcryption from Bilinear Maps. In Asiacrypt 2005, LNCS 3788, pp. 515-532. Copyright IACR.
  • Benoît Libert, Jean-Jacques Quisquater, Identity Based Encryption Without Redundancy. In Applied Cryptography and Network Security (ACNS) 2005, LNCS 3531, pp. 285-300, Springer, 2005.
  • Benoît Libert, Jean-Jacques Quisquater, Improved Signcryption from q-Diffie-Hellman Problems. In Security in Communication Networks 2004 (SCN'04), LNCS 3352, pp. 220-235, Spinger-Verlag, 2004. Updated version.
  • Julien Cathalo, Benoît Libert, Jean-Jacques Quisquater, Cryptanalysis of a Verifiably Committed Signature Scheme based on GPS and RSA, in Information Security Conference (ISC) 2004, LNCS 3225, pp. 52-60, Springer-Verlag, 2004. Copyright Springer.
  • Benoît Libert, Jean-Jacques Quisquater, Efficient Signcryption with Key Privacy from Gap-Diffie-Hellman Groups, In Public Key Cryptography 2004 (PKC'04), LNCS 2947, pp. 187-200, Spinger-Verlag, 2004. Updated version.
  • Benoît Libert, Jean-Jacques Quisquater, Identity Based Undeniable Signatures, In Cryptographer's Track - RSA 2004, LNCS 2964, pp. 112-125, Springer-Verlag, 2004. Updated version available here.
  • Benoît Libert, Jean-Jacques Quisquater, Efficient revocation and threshold pairing based cryptosystems, in 22nd ACM Symposium on Principles of Distributed Computing (PODC 2003), pp. 163-171, 2003. Copyright ACM.
  • Benoît Libert, Jean-Jacques Quisquater, New identity based signcryption schemes from pairings, 2003 IEEE Information Theory Workshop. Copyright IEEE.
  • PhD Thesis
    Benoît Libert. New Secure Applications of Bilinear Maps in Cryptography. PhD Thesis, Université Catholique de Louvain, January 2006. [pdf]

    Activities

    External reviewer
  • ACM CCS 2003; PKC 2004, 2006 and 2009; ISC 2004; ESORICS 2004, 2007 and 2008; ICICS 2004 and 2005; Asiacrypt 2004, 2005, 2006 and 2009; Indocrypt 2004 and 2005; WITS 2005; Mycrypt 2005; ACNS 2006; ICALP 2006; IWSEC 2006 and 2008; Crypto 2006 and 2009; CANS 2006; CIS 2006; Pairing 2007 and 2009; CT-RSA 2008; Eurocrypt 2008; SAC 2008; Africacrypt 2009.
  • IEEE Trans. on Computers, IEEE Trans. on Information Theory, IEE Proceedings on Information Security, Designs Codes and Cryptography, The Computer Journal, Information Processing Letters, Journal of Computer Science and Technology, Information & Computation.
  • Handbook of Information Security, John Wiley & Sons, Inc., 2005.
  • Program Committees
  • Asiacrypt 2013
  • Financial Cryptography 2013
  • International Workshop on Security (IWSEC) 2012
  • Eurocrypt 2011 and 2012
  • 4th and 5th International Conference on Pairing-Based Cryptography (Pairing 2010 and 2012)
  • 1st International Conference on Cryptology and Information security in Latin America (Latincrypt 2010)
  • Applied Cryptography and Network Security (ACNS) 2010 and 2012
  • Public Key Cryptography (PKC) 2010 and 2013
  • Information Security Conference 2009 (ISC 2009)
  • 7th, 8th and 11th International Conference on Cryptology and Network Security (CANS 2008, 2009 and 2012)
  • 13th Australasian Conference on Information Security and Privacy (ACISP 2008)
  • International Conference on Provable Security 2007, 2010, 2011 and 2012 (ProvSec'07, '10, '11 and '12)
  • 3rd, 4th and 5th Information Security Practice and Experience Conference (ISPEC'07, '08, '09 and '10)
  • 2nd, 3rd and 4th SKLOIS Conference on Information Security and Cryptology (Inscrypt'06, '07 and '08)
  • 1st International Workshop on Information Security (IS'06), in conjunction with OTM Workshops 2006.
  • Applied Cryptography and Information Security (ACIS'06)

  • Links

  • Don't forget to visit our CFP page.

  • Last modified: 09/21/12