On hiding information from an oracle, Journal of Computer and System Sciences, vol.39, issue.1, pp.21-50, 1989. ,
DOI : 10.1016/0022-0000(89)90018-4
I Have a DREAM! (DiffeRentially privatE smArt Metering), Information Hiding (IH 2011) (LNCS), pp.118-132, 2011. ,
Practice-Oriented Provable Security, Information Security (ISW '97) (LNCS), pp.221-231, 1998. ,
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin, EUROCRYPT'96 (LNCS), pp.399-416, 1996. ,
DOI : 10.1007/3-540-68339-9_34
New Techniques for SPHFs and Efficient One-Round PAKE Protocols, CRYPTO 2013, Part I (LNCS), pp.449-475, 2013. ,
DOI : 10.1007/978-3-642-40041-4_25
URL : https://hal.archives-ouvertes.fr/hal-01139395
Short Group Signatures, CRYPTO 2004 (LNCS), pp.41-55, 2004. ,
DOI : 10.1007/978-3-540-28628-8_3
Evaluating 2-DNF Formulas on Ciphertexts, TCC 2005 (LNCS), pp.325-341, 2005. ,
DOI : 10.1007/978-3-540-30576-7_18
Privacy-Preserving Stream Aggregation with Fault Tolerance, FC 2012, pp.200-214, 2012. ,
DOI : 10.1007/978-3-642-32946-3_15
On the Exact Security of Full Domain Hash, CRYPTO 2000 (LNCS), Mihir Bellare, pp.229-235, 2000. ,
DOI : 10.1007/3-540-44598-6_14
Optimal Security Proofs for PSS and Other Signature Schemes, EURO- CRYPT 2002, pp.272-287, 2002. ,
DOI : 10.1007/3-540-46035-7_18
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption, EUROCRYPT 2002, pp.45-64, 2002. ,
DOI : 10.7146/brics.v8i37.21697
A Note On Game-Hopping Proofs, Cryptology ePrint Archive Report, vol.260, 2006. ,
Differential Privacy: A Survey of Results, Theory and applications of models of computation, pp.1-19, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Our Data, Ourselves: Privacy Via Distributed Noise Generation, EUROCRYPT 2006, pp.486-503, 2006. ,
DOI : 10.1007/11761679_29
An Algebraic Framework for Diffie-Hellman Assumptions, pp.129-147978, 2013. ,
Privacy-Friendly Energy-Metering via Homomorphic Encryption, pp.226-238, 2010. ,
Candidate Indistinguishability Obfuscation and Functional Encryption for all Circuits, 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pp.40-49, 2013. ,
DOI : 10.1109/FOCS.2013.13
Multi-input Functional Encryption, EURO- CRYPT 2014, pp.578-602, 2014. ,
DOI : 10.1007/978-3-642-55220-5_32
Secure Hybrid Encryption from Weakened Key Encapsulation, CRYPTO 2007 (LNCS), Alfred Menezes, pp.553-571, 2007. ,
DOI : 10.1007/978-3-540-74143-5_31
Fault-Tolerant Privacy-Preserving Statistics, Privacy Enhancing Technologies (PETS 2012) (LNCS), pp.221-238, 2012. ,
DOI : 10.1007/978-3-642-31680-7_12
Privacy Technologies for Smart Grids ? A Survey of Options, 2012. ,
A Scalable Scheme for Privacy-Preserving Aggregation of Time-Series Data, FC 2013, pp.111-125, 2013. ,
DOI : 10.1007/978-3-642-39884-1_10
Privacy-Friendly Aggregation for the Smart-Grid, Privacy Enhancing Technologies (PETS 2011) (LNCS), pp.221-238, 2011. ,
DOI : 10.1007/978-3-642-22263-4_10
Private and Dynamic Time-Series Data Aggregation with Trust Relaxation, CANS 14 (LNCS), pp.305-320, 2014. ,
DOI : 10.1007/978-3-319-12280-9_20
Security and Privacy Challenges in the Smart Grid, IEEE Security & Privacy Magazine, vol.7, issue.3, pp.75-77, 2009. ,
DOI : 10.1109/MSP.2009.76
How long does it take to catch a wild kangaroo?, Proceedings of the 41st annual ACM symposium on Symposium on theory of computing, STOC '09, pp.553-560, 2009. ,
DOI : 10.1145/1536414.1536490
Number-theoretic constructions of efficient pseudo-random functions, Proceedings 38th Annual Symposium on Foundations of Computer Science, pp.458-467, 1997. ,
DOI : 10.1109/SFCS.1997.646134
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes, EURO- CRYPT'99 (LNCS), Jacques Stern, pp.223-238, 1999. ,
DOI : 10.1007/3-540-48910-X_16
Differentially private aggregation of distributed time-series with transformation and encryption, Proceedings of the 2010 international conference on Management of data, SIGMOD '10, pp.735-746, 2010. ,
DOI : 10.1145/1807167.1807247
A Cramer-Shoup Encryption Scheme from the Linear Assumption and from Progressively Weaker Linear Variants, Cryptology ePrint Archive Report, issue.074, 2007. ,
Privacy-Preserving Aggregation of Time-Series Data, NDSS 2011, 2011. ,
Publicly Verifiable Secret Sharing, EUROCRYPT'96, pp.190-199, 1996. ,
DOI : 10.1007/3-540-68339-9_17