Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fabrice Benhamouda is active.

Publication


Featured researches published by Fabrice Benhamouda.


international cryptology conference | 2013

New Techniques for SPHFs and Efficient One-Round PAKE Protocols

Fabrice Benhamouda; Olivier Blazy; Céline Chevalier; David Pointcheval; Damien Vergnaud

Password-authenticated key exchange (PAKE) protocols allow two players to agree on a shared high entropy secret key, that depends on their own passwords only. Following the Gennaro and Lindell’s approach, with a new kind of smooth-projective hash functions (SPHFs), Katz and Vaikuntanathan recently came up with the first concrete one-round PAKE protocols, where the two players just have to send simultaneous flows to each other. The first one is secure in the Bellare-Pointcheval-Rogaway (BPR) model and the second one in the Canetti’s UC framework, but at the cost of simulation-sound non-interactive zero-knowledge (SS−NIZK) proofs (one for the BPR-secure protocol and two for the UC-secure one), which make the overall constructions not really efficient.


international cryptology conference | 2013

SPHF-Friendly Non-interactive Commitments

Michel Abdalla; Fabrice Benhamouda; Olivier Blazy; Céline Chevalier; David Pointcheval

In 2009, Abdalla et al. proposed a reasonably practical password-authenticated key exchange PAKE secure against adaptive adversaries in the universal composability UC framework. It exploited the Canetti-Fischlin methodology for commitments and the Cramer-Shoup smooth projective hash functions SPHFs, following the Gennaro-Lindell approach for PAKE. In this paper, we revisit the notion of non-interactive commitments, with a new formalism that implies UC security. In addition, we provide a quite efficient instantiation. We then extend our formalism to SPHF-friendly commitments. We thereafter show that it allows a blackbox application to one-round PAKE and oblivious transfer OT, still secure in the UC framework against adaptive adversaries, assuming reliable erasures and a single global common reference string, even for multiple sessions. Our instantiations are more efficient than the Abdalla et al. PAKE in Crypto 2009 and the recent OT protocol proposed by Choi et al. in PKC 2013. Furthermore, the new PAKE instantiation is the first one-round scheme achieving UC security against adaptive adversaries.


theory and application of cryptographic techniques | 2015

Disjunctions for Hash Proof Systems: New Constructions and Applications

Michel Abdalla; Fabrice Benhamouda; David Pointcheval

Hash Proof Systems were first introduced by Cramer and Shoup (Eurocrypt’02) as a tool to construct efficient chosen-ciphertext-secure encryption schemes. Since then, they have found many other applications, including password authenticated key exchange, oblivious transfer, and zero-knowledge arguments. One of the aspects that makes hash proof systems so interesting and powerful is that they can be seen as implicit proofs of membership for certain languages. As a result, by extending the family of languages that they can handle, one often obtains new applications or new ways to understand existing schemes. In this paper, we show how to construct hash proof systems for the disjunction of languages defined generically over cyclic, bilinear, and multilinear groups. Among other applications, this enables us to construct the most efficient one-time simulation-sound (quasi-adaptive) non-interactive zero-knowledge arguments for linear languages over cyclic groups, the first one-round group password-authenticated key exchange without random oracles, the most efficient threshold structure-preserving chosen- ciphertext-secure encryption scheme, and the most efficient one-round password authenticated key exchange in the UC framework.


international conference on the theory and application of cryptology and information security | 2014

Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures

Fabrice Benhamouda; Jan Camenisch; Stephan Krenn; Vadim Lyubashevsky; Gregory Neven

Lattice problems are an attractive basis for cryptographic systems because they seem to offer better security than discrete logarithm and factoring based problems. Efficient lattice-based constructions are known for signature and encryption schemes. However, the constructions known for more sophisticated schemes such as group signatures are still far from being practical. In this paper we make a number of steps towards efficient lattice-based constructions of more complex cryptographic protocols. First, we provide a more efficient way to prove knowledge of plaintexts for lattice-based encryption schemes. We then show how our new protocol can be combined with a proof of knowledge for Pedersen commitments in order to prove that the committed value is the same as the encrypted one. Finally, we make use of this to construct a new group signature scheme that is a “hybrid” in the sense that privacy holds under a lattice-based assumption while security is discrete-logarithm-based.


international cryptology conference | 2016

Randomness Complexity of Private Circuits for Multiplication

Sonia Belaïd; Fabrice Benhamouda; Alain Passelègue; Emmanuel Prouff; Adrian Thillard; Damien Vergnaud

Many cryptographic algorithms are vulnerable to side channel analysis and several leakage models have been introduced to better understand these flaws. In 2003, Ishai, Sahai and Wagner introduced the d-probing security model, in which an attacker can observe at most d intermediate values during a processing. They also proposed an algorithm that securely performs the multiplication of 2 bits in this model, using only


international cryptology conference | 2014

Related-Key Security for Pseudorandom Functions Beyond the Linear Barrier

Michel Abdalla; Fabrice Benhamouda; Alain Passelègue; Kenneth G. Paterson


public key cryptography | 2015

Public-Key Encryption Indistinguishable Under Plaintext-Checkable Attacks

Michel Abdalla; Fabrice Benhamouda; David Pointcheval

dd+1/2


ieee symposium on security and privacy | 2015

Security of the J-PAKE Password-Authenticated Key Exchange Protocol

Michel Abdalla; Fabrice Benhamouda; Philip D. MacKenzie


ACM Transactions on Information and System Security | 2016

A New Framework for Privacy-Preserving Aggregation of Time-Series Data

Fabrice Benhamouda; Marc Joye; Benoît Libert

dd+1/2 random bits to protect the computation. We study the randomness complexity of multiplication algorithms secure in the d-probing model. We propose several contributions: we provide new theoretical characterizations and constructions, new practical constructions and a new efficient algorithmic tool to analyze the security of such schemes. We start with a theoretical treatment of the subject: we propose an algebraic model for multiplication algorithms and exhibit an algebraic characterization of the security in the d-probing model. Using this characterization, we prove a linear in d lower bound and a quasi-linear non-constructive upper bound for this randomness cost. Then, we construct a new generic algorithm to perform secure multiplication in the d-probing model that only uses


international cryptology conference | 2015

Implicit Zero-Knowledge Arguments and Applications to the Malicious Setting

Fabrice Benhamouda; Geoffroy Couteau; David Pointcheval; Hoeteck Wee

Collaboration


Dive into the Fabrice Benhamouda's collaboration.

Top Co-Authors

Avatar

Michel Abdalla

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Damien Vergnaud

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar

Céline Chevalier

École Normale Supérieure

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Stephan Krenn

Austrian Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge