Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Batch Signatures, Revisited

    We revisit batch signatures (previously considered in a draft RFC and used in multiple recent works), where a single, potentially expensive, “inner” digital signature authenticates a Merkle tree constructed fr...

    Carlos Aguilar-Melchor, Martin R. Albrecht in Topics in Cryptology – CT-RSA 2024 (2024)

  2. No Access

    Chapter and Conference Paper

    SDitH in the QROM

    The MPC in the Head (MPCitH) paradigm has recently led to significant improvements for signatures in the code-based setting. In this paper we consider some modifications to a recent twist of MPCitH, called Hyp...

    Carlos Aguilar-Melchor, Andreas Hülsing in Advances in Cryptology – ASIACRYPT 2023 (2023)

  3. No Access

    Chapter and Conference Paper

    The Return of the SDitH

    This paper presents a code-based signature scheme based on the well-known syndrome decoding (SD) problem. The scheme builds upon a recent line of research which uses the Multi-Party-Computation-in-the-Head (MP...

    Carlos Aguilar-Melchor, Nicolas Gama, James Howe in Advances in Cryptology – EUROCRYPT 2023 (2023)

  4. No Access

    Chapter and Conference Paper

    Towards Automating Cryptographic Hardware Implementations: A Case Study of HQC

    While hardware implementations allow the production of highly efficient and performance-oriented designs, exploiting features such as parallelization, their longer time to code and implement often bottlenecks ...

    Carlos Aguilar-Melchor, Jean-Christophe Deneuville, Arnaud Dion in Code-Based Cryptography (2023)

  5. No Access

    Chapter and Conference Paper

    LRPC Codes with Multiple Syndromes: Near Ideal-Size KEMs Without Ideals

    We introduce a new rank-based key encapsulation mechanism (KEM) with public key and ciphertext sizes around 3.5 Kbytes each, for 128 bits of security, without using ideal structures. Such structures allow to c...

    Carlos Aguilar-Melchor, Nicolas Aragon, Victor Dyseryn in Post-Quantum Cryptography (2022)

  6. No Access

    Article

    Constant Time Algorithms for ROLLO-I-128

    In this work, we propose different techniques that can be used to implement the rank-based key encapsulation methods and public key encryption schemes of the ROLLO, and partially RQC, family of algorithms in a...

    Carlos Aguilar-Melchor, Nicolas Aragon, Emanuele Bellini in SN Computer Science (2021)

  7. No Access

    Chapter and Conference Paper

    A Comparison of the Homomorphic Encryption Libraries HElib, SEAL and FV-NFLlib

    Fully homomorphic encryption has considerably evolved during the past 10 years. In particular, the discovery of more efficient schemes has brought the computational complexity down to acceptable levels for som...

    Carlos Aguilar Melchor in Innovative Security Solutions for Informat… (2019)

  8. Article

    Open Access

    Efficient and secure outsourcing of genomic data storage

    Cloud computing is becoming the preferred solution for efficiently dealing with the increasing amount of genomic data. Yet, outsourcing storage and processing sensitive information, such as genomic data, comes...

    João Sá Sousa, Cédric Lefebvre, Zhicong Huang, Jean Louis Raisaro in BMC Medical Genomics (2017)

  9. Chapter and Conference Paper

    Sampling from Arbitrary Centered Discrete Gaussians for Lattice-Based Cryptography

    Non-Centered Discrete Gaussian sampling is a fundamental building block in many lattice-based constructions in cryptography, such as signature and identity-based encryption schemes. On the one hand, the center...

    Carlos Aguilar-Melchor, Martin R. Albrecht in Applied Cryptography and Network Security (2017)

  10. No Access

    Chapter and Conference Paper

    NFLlib: NTT-Based Fast Lattice Library

    Recent years have witnessed an increased interest in lattice cryptography. Besides its strong security guarantees, its simplicity and versatility make this powerful theoretical tool a promising competitive alt...

    Carlos Aguilar-Melchor, Joris Barrier, Serge Guelton in Topics in Cryptology - CT-RSA 2016 (2016)

  11. No Access

    Chapter and Conference Paper

    Sealing the Leak on Classical NTRU Signatures

    Initial attempts to obtain lattice based signatures were closely related to reducing a vector modulo the fundamental parallelepiped of a secret basis (like GGH [9], or NTRUSign [12]). This approach leaked some in...

    Carlos Aguilar Melchor, Xavier Boyen in Post-Quantum Cryptography (2014)

  12. No Access

    Chapter and Conference Paper

    Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting

    Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Ge...

    Carlos Aguilar Melchor, Slim Bettaieb in Progress in Cryptology – AFRICACRYPT 2013 (2013)

  13. No Access

    Chapter and Conference Paper

    A Code-Based Undeniable Signature Scheme

    In this work we propose the first code-based undeniable signature scheme (and more generally the first post-quantum undeniable signature scheme). The verification protocols for our scheme are 3-pass zero-knowl...

    Carlos Aguilar-Melchor, Slim Bettaieb, Philippe Gaborit in Cryptography and Coding (2013)

  14. No Access

    Chapter

    Further Privacy Mechanisms

    In general, designing reasonable metrics for privacy quantification is an approach of several disciplines. This section focuses on technical and formal metrics. They can be distinguished depending on purposes ...

    Anas Abou El Kalam, Carlos Aguilar Melchor, Stefan Berthold in Digital Privacy (2011)

  15. Chapter and Conference Paper

    Additively Homomorphic Encryption with d-Operand Multiplications

    The search for encryption schemes that allow to evaluate functions (or circuits) over encrypted data has attracted a lot of attention since the seminal work on this subject by Rivest, Adleman and Dertouzos in ...

    Carlos Aguilar Melchor, Philippe Gaborit in Advances in Cryptology – CRYPTO 2010 (2010)

  16. No Access

    Chapter and Conference Paper

    A New Efficient Threshold Ring Signature Scheme Based on Coding Theory

    Ring signatures were introduced by Rivest, Shamir and Tauman in 2001. Bresson, Stern and Szydlo extended the ring signature concept to t-out-of-N threshold ring signatures in 2002. We present in this paper a gene...

    Carlos Aguilar Melchor, Pierre-Louis Cayrel, Philippe Gaborit in Post-Quantum Cryptography (2008)

  17. No Access

    Article

    Current and future privacy enhancing technologies for the internet

    This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (Pets).

    Yves Deswarte, Carlos Aguilar Melchor in Annales Des Télécommunications (2006)

  18. No Access

    Chapter and Conference Paper

    Single-Database Private Information Retrieval Schemes : Overview, Performance Study, and Usage with Statistical Databases

    This paper presents an overview of the current single-database private information retrieval (PIR) schemes and proposes to explore the usage of these protocols with statistical databases. The vicinity of this ...

    Carlos Aguilar Melchor, Yves Deswarte in Privacy in Statistical Databases (2006)