Edit Profile Boyen, Xavier Compute Distance To: Compute Author ID: boyen.xavier Published as: Boyen, Xavier External Links: MGP Documents Indexed: 50 Publications since 2003, including 1 Book all top 5 Co-Authors 16 single-authored 12 Boneh, Dan 6 Li, Qinyi 4 Agrawal, Shweta 4 Waters, Brent 2 Aguilar-Melchor, Carlos 2 Chevalier, Céline 2 Gaborit, Philippe 2 Haines, Thomas J. 2 Pointcheval, David 1 Abdalla, Michel 1 Aono, Yoshinori 1 Bansal, Tarun Kumar 1 Bettaieb, Slim 1 Boyd, Colin A. 1 Carr, Christopher 1 Chen, Xiaofeng 1 Delerablée, Cécile 1 Deneuville, Jean-Christophe 1 Dodis, Yevgeniy 1 Fousse, Laurent 1 Freeman, David Mandell 1 Fuchsbauer, Georg 1 Goh, Eu-Jin 1 Halevi, Shai 1 Katz, Jonathan N. 1 Le Trieu Phong 1 Ostrovsky, Rafail 1 Pieprzyk, Josef P. 1 Shacham, Hovav 1 Smith, Adam T. 1 Vaikuntanathan, Vinod 1 Voulgaris, Panagiotis 1 Wang, Lihua 1 Wee, Hoeteck Serials 3 Journal of Cryptology 1 Lecture Notes in Computer Science 1 Journal of Mathematical Cryptology 1 International Journal of Applied Cryptography all top 5 Fields 49 Information and communication theory, circuits (94-XX) 7 Computer science (68-XX) 2 Number theory (11-XX) 2 Algebraic geometry (14-XX) 1 General and overarching topics; collections (00-XX) 1 Quantum theory (81-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 36 Publications have been cited 1,002 times in 569 Documents Cited by ▼ Year ▼ Efficient selective-id secure identity-based encryption without random oracles. Zbl 1122.94355Boneh, Dan; Boyen, Xavier 184 2004 Short group signatures. Zbl 1104.94044Boneh, Dan; Boyen, Xavier; Shacham, Hovav 133 2004 Hierarchical identity based encryption with constant size ciphertext. Zbl 1137.94340Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin 119 2005 Short signatures without random oracles. Zbl 1122.94354Boneh, Dan; Boyen, Xavier 101 2004 Efficient lattice (H)IBE in the standard model. Zbl 1227.94022Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 66 2010 Secure identity based encryption without random oracles. Zbl 1104.94019Boneh, Dan; Boyen, Xavier 54 2004 Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373Boneh, Dan; Boyen, Xavier 46 2008 Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390Boyen, Xavier; Waters, Brent 41 2006 Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more. Zbl 1281.94074Boyen, Xavier 26 2010 Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Zbl 1280.94035Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 25 2010 Compact group signatures without random oracles. Zbl 1140.94327Boyen, Xavier; Waters, Brent 25 2006 Multipurpose identity-based signcryption. Zbl 1122.94356Boyen, Xavier 25 2003 Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020Boyen, Xavier; Waters, Brent 21 2007 Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012Boneh, Dan; Boyen, Xavier; Halevi, Shai 20 2006 Efficient selective identity-based encryption without random oracles. Zbl 1251.94022Boneh, Dan; Boyen, Xavier 15 2011 The uber-assumption family. A unified complexity framework for bilinear groups. Zbl 1186.94427Boyen, Xavier 15 2008 Mesh signatures. How to leak a secret with unwitting and unwilling participants. Zbl 1141.94342Boyen, Xavier 15 2007 Secure remote authentication using biometric data. Zbl 1137.94365Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam 9 2005 Attribute-based functional encryption on lattices. Zbl 1310.94131Boyen, Xavier 8 2013 A tapestry of identity-based encryption: practical frameworks compared. Zbl 1178.94001Boyen, Xavier 8 2008 General ad hoc encryption from exponent inversion IBE. Zbl 1141.94343Boyen, Xavier 7 2007 Towards tightly secure lattice short signature and id-based encryption. Zbl 1407.94091Boyen, Xavier; Li, Qinyi 6 2016 Adapting Lyubashevsky’s signature schemes to the ring signature setting. Zbl 1312.94108Aguilar Melchor, Carlos; Bettaieb, Slim; Boyen, Xavier; Fousse, Laurent; Gaborit, Philippe 4 2013 Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062Boyen, Xavier; Waters, Brent 4 2010 All-but-many lossy trapdoor functions from lattices and applications. Zbl 1406.94028Boyen, Xavier; Li, Qinyi 3 2017 Key-private proxy re-encryption under LWE. Zbl 1288.94051Aono, Yoshinori; Boyen, Xavier; Le Trieu Phong; Wang, Lihua 3 2013 Preventing pollution attacks in multi-source network coding. Zbl 1279.94050Agrawal, Shweta; Boneh, Dan; Boyen, Xavier; Freeman, David Mandell 3 2010 Miniature CCA2 PK encryption: Tight security without redundancy. Zbl 1153.94352Boyen, Xavier 3 2007 On the impossibility of efficiently combining collision resistant hash functions. Zbl 1138.94347Boneh, Dan; Boyen, Xavier 3 2006 Functional encryption for threshold functions (or fuzzy IBE) from lattices. Zbl 1290.94039Agrawal, Shweta; Boyen, Xavier; Vaikuntanathan, Vinod; Voulgaris, Panagiotis; Wee, Hoeteck 2 2012 Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords. Zbl 1284.94056Boyen, Xavier; Chevalier, Céline; Fuchsbauer, Georg; Pointcheval, David 2 2010 Expressive subgroup signatures. Zbl 1180.94069Boyen, Xavier; Delerablée, Cécile 2 2008 Almost tight multi-instance multi-ciphertext identity-based encryption on lattices. Zbl 1440.94033Boyen, Xavier; Li, Qinyi 1 2018 Attribute-based encryption for finite automata from LWE. Zbl 1388.94036Boyen, Xavier; Li, Qinyi 1 2015 Sealing the leak on classical NTRU signatures. Zbl 1302.94057Melchor, Carlos Aguilar; Boyen, Xavier; Deneuville, Jean-Christophe; Gaborit, Philippe 1 2014 Distributed public-key cryptography from weak secrets. Zbl 1227.94018Abdalla, Michel; Boyen, Xavier; Chevalier, Céline; Pointcheval, David 1 2009 Almost tight multi-instance multi-ciphertext identity-based encryption on lattices. Zbl 1440.94033Boyen, Xavier; Li, Qinyi 1 2018 All-but-many lossy trapdoor functions from lattices and applications. Zbl 1406.94028Boyen, Xavier; Li, Qinyi 3 2017 Towards tightly secure lattice short signature and id-based encryption. Zbl 1407.94091Boyen, Xavier; Li, Qinyi 6 2016 Attribute-based encryption for finite automata from LWE. Zbl 1388.94036Boyen, Xavier; Li, Qinyi 1 2015 Sealing the leak on classical NTRU signatures. Zbl 1302.94057Melchor, Carlos Aguilar; Boyen, Xavier; Deneuville, Jean-Christophe; Gaborit, Philippe 1 2014 Attribute-based functional encryption on lattices. Zbl 1310.94131Boyen, Xavier 8 2013 Adapting Lyubashevsky’s signature schemes to the ring signature setting. Zbl 1312.94108Aguilar Melchor, Carlos; Bettaieb, Slim; Boyen, Xavier; Fousse, Laurent; Gaborit, Philippe 4 2013 Key-private proxy re-encryption under LWE. Zbl 1288.94051Aono, Yoshinori; Boyen, Xavier; Le Trieu Phong; Wang, Lihua 3 2013 Functional encryption for threshold functions (or fuzzy IBE) from lattices. Zbl 1290.94039Agrawal, Shweta; Boyen, Xavier; Vaikuntanathan, Vinod; Voulgaris, Panagiotis; Wee, Hoeteck 2 2012 Efficient selective identity-based encryption without random oracles. Zbl 1251.94022Boneh, Dan; Boyen, Xavier 15 2011 Efficient lattice (H)IBE in the standard model. Zbl 1227.94022Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 66 2010 Lattice mixing and vanishing trapdoors: a framework for fully secure short signatures and more. Zbl 1281.94074Boyen, Xavier 26 2010 Lattice basis delegation in fixed dimension and shorter-ciphertext hierarchical IBE. Zbl 1280.94035Agrawal, Shweta; Boneh, Dan; Boyen, Xavier 25 2010 Shrinking the keys of discrete-log-type lossy trapdoor functions. Zbl 1315.94062Boyen, Xavier; Waters, Brent 4 2010 Preventing pollution attacks in multi-source network coding. Zbl 1279.94050Agrawal, Shweta; Boneh, Dan; Boyen, Xavier; Freeman, David Mandell 3 2010 Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords. Zbl 1284.94056Boyen, Xavier; Chevalier, Céline; Fuchsbauer, Georg; Pointcheval, David 2 2010 Distributed public-key cryptography from weak secrets. Zbl 1227.94018Abdalla, Michel; Boyen, Xavier; Chevalier, Céline; Pointcheval, David 1 2009 Short signatures without random oracles and the SDH assumption in bilinear groups. Zbl 1140.94373Boneh, Dan; Boyen, Xavier 46 2008 The uber-assumption family. A unified complexity framework for bilinear groups. Zbl 1186.94427Boyen, Xavier 15 2008 A tapestry of identity-based encryption: practical frameworks compared. Zbl 1178.94001Boyen, Xavier 8 2008 Expressive subgroup signatures. Zbl 1180.94069Boyen, Xavier; Delerablée, Cécile 2 2008 Full-domain subgroup hiding and constant-size group signatures. Zbl 1127.94020Boyen, Xavier; Waters, Brent 21 2007 Mesh signatures. How to leak a secret with unwitting and unwilling participants. Zbl 1141.94342Boyen, Xavier 15 2007 General ad hoc encryption from exponent inversion IBE. Zbl 1141.94343Boyen, Xavier 7 2007 Miniature CCA2 PK encryption: Tight security without redundancy. Zbl 1153.94352Boyen, Xavier 3 2007 Anonymous hierarchical identity-based encryption (without random oracles). Zbl 1161.94390Boyen, Xavier; Waters, Brent 41 2006 Compact group signatures without random oracles. Zbl 1140.94327Boyen, Xavier; Waters, Brent 25 2006 Chosen ciphertext secure public key threshold encryption without random oracles. Zbl 1125.94012Boneh, Dan; Boyen, Xavier; Halevi, Shai 20 2006 On the impossibility of efficiently combining collision resistant hash functions. Zbl 1138.94347Boneh, Dan; Boyen, Xavier 3 2006 Hierarchical identity based encryption with constant size ciphertext. Zbl 1137.94340Boneh, Dan; Boyen, Xavier; Goh, Eu-Jin 119 2005 Secure remote authentication using biometric data. Zbl 1137.94365Boyen, Xavier; Dodis, Yevgeniy; Katz, Jonathan; Ostrovsky, Rafail; Smith, Adam 9 2005 Efficient selective-id secure identity-based encryption without random oracles. Zbl 1122.94355Boneh, Dan; Boyen, Xavier 184 2004 Short group signatures. Zbl 1104.94044Boneh, Dan; Boyen, Xavier; Shacham, Hovav 133 2004 Short signatures without random oracles. Zbl 1122.94354Boneh, Dan; Boyen, Xavier 101 2004 Secure identity based encryption without random oracles. Zbl 1104.94019Boneh, Dan; Boyen, Xavier 54 2004 Multipurpose identity-based signcryption. Zbl 1122.94356Boyen, Xavier 25 2003 all cited Publications top 5 cited Publications all top 5 Cited by 928 Authors 36 Susilo, Willy 32 Mu, Yi 19 Libert, Benoît 16 Guo, Fuchun 13 Hofheinz, Dennis 13 Wang, Huaxiong 13 Wong, Duncan S. 12 Hanaoka, Goichiro 12 Hu, Yupu 12 Kiltz, Eike 12 Waters, Brent 12 Yang, Guomin 11 Emura, Keita 11 Park, Jonghwan 11 Wu, Qianhong 10 Abdalla, Michel 10 Jager, Tibor 10 Lee, Kwangsu 9 Chen, Jie 9 Deng, Robert Huijie 9 Huang, Qiong 9 Ling, San 9 Weng, Jian 9 Yung, Moti 8 Au, Man Ho 8 Boneh, Dan 8 Catalano, Dario 8 Chen, Kefei 8 Lai, Junzuo 8 Liu, Shengli 8 Qin, Bo 8 Seo, Jae Hong 8 Yang, Bo 7 Abe, Masayuki 7 Bellare, Mihir 7 Herranz, Javier 7 Hohenberger, Susan 7 Huang, Xinyi 7 Lee, Donghoon 7 Menezes, Alfred J. 7 Nguyen, Khoa 7 Pointcheval, David 7 Ràfols, Carla 7 Wang, Baocang 6 Boyen, Xavier 6 Cao, Zhenfu 6 Domingo-Ferrer, Josep 6 Fiore, Dario 6 Fuchsbauer, Georg 6 Groth, Jens 6 Gu, Dawu 6 Lai, Jianchang 6 Li, Jin 6 Liang, Kaitai 6 Qin, Baodong 6 Sahai, Amit 6 Smart, Nigel P. 6 Venturi, Daniele 6 Zhang, Fangguo 6 Zhang, Mingwu 5 Camenisch, Jan L. 5 Chen, Xiaofeng 5 Chen, Yu 5 Cui, Hui 5 Faonio, Antonio 5 Kunihiro, Noboru 5 Laguillaumie, Fabien 5 Lee, Dong Hoon 5 Li, Jiguo 5 Liu, Joseph K. K. 5 Ohkubo, Miyako 5 Takagi, Tsuyoshi 5 Watanabe, Yodai 5 Wee, Hoeteck 5 Yamada, Shota 5 Zhang, Lei 5 Zhang, Zhenfeng 4 Ateniese, Giuseppe 4 Cash, David M. 4 Chase, Melissa 4 Chatterjee, Sanjit 4 Chen, Rongmao 4 Cheon, Jung Hee 4 Ferrara, Anna Lisa 4 Fujisaki, Eiichiro 4 Galbraith, Steven D. 4 Galindo, David 4 Jiang, Peng 4 Kohlweiss, Markulf 4 Li, Fagen 4 Liu, JianWei 4 Long, Yu 4 Lu, Yang 4 Ma, Chunguang 4 Ma, Sha 4 Meshram, Chandrashekhar 4 Miyaji, Atsuko 4 Mouhartem, Fabrice 4 Neven, Gregory 4 Nielsen, Jesper Buus ...and 828 more Authors all top 5 Cited in 44 Serials 61 Theoretical Computer Science 59 Information Sciences 58 Journal of Cryptology 46 Designs, Codes and Cryptography 9 Soft Computing 8 Information Processing Letters 6 Computers & Mathematics with Applications 6 International Journal of Foundations of Computer Science 6 Applicable Algebra in Engineering, Communication and Computing 6 Journal of Shanghai Jiaotong University (Science) 6 Science China. Information Sciences 6 Frontiers of Computer Science 5 Journal of Computer and System Sciences 5 Mathematical Problems in Engineering 5 Wuhan University Journal of Natural Sciences (WUJNS) 4 Discrete Applied Mathematics 4 Algorithmica 4 International Journal of Computer Mathematics 4 Journal of Mathematical Cryptology 3 Computing 3 Information and Computation 3 Journal of Applied Mathematics 3 Arabian Journal for Science and Engineering 2 Acta Informatica 2 Mathematics of Computation 2 Journal of Number Theory 2 SIAM Journal on Computing 2 Mathematical and Computer Modelling 2 Science in China. Series F 2 Advances in Mathematics of Communications 2 Symmetry 1 Applied Mathematics and Computation 1 Journal of Computer Science and Technology 1 Cybernetics and Systems Analysis 1 Formal Methods in System Design 1 Finite Fields and their Applications 1 Journal of the ACM 1 Journal of Discrete Mathematical Sciences & Cryptography 1 Journal of Systems Science and Complexity 1 Quantum Information Processing 1 Science China. Mathematics 1 RAIRO. Theoretical Informatics and Applications 1 Afrika Matematika 1 Computer Science Review all top 5 Cited in 13 Fields 537 Information and communication theory, circuits (94-XX) 148 Computer science (68-XX) 23 Number theory (11-XX) 22 Algebraic geometry (14-XX) 4 Quantum theory (81-XX) 2 Numerical analysis (65-XX) 2 Operations research, mathematical programming (90-XX) 2 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 History and biography (01-XX) 1 Commutative algebra (13-XX) 1 Linear and multilinear algebra; matrix theory (15-XX) 1 Probability theory and stochastic processes (60-XX) 1 Biology and other natural sciences (92-XX) Citations by Year