Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Laurent Fousse is active.

Publication


Featured researches published by Laurent Fousse.


privacy enhancing technologies | 2016

XPIR : Private Information Retrieval for Everyone

Carlos Aguilar Melchor; Joris Barrier; Laurent Fousse; Marc-Olivier Killijian

Abstract A Private Information Retrieval (PIR) scheme is a protocol in which a user retrieves a record from a database while hiding which from the database administrators. PIR can be achieved using mutuallydistrustful replicated databases, trusted hardware, or cryptography. In this paper we focus on the later setting which is known as single-database computationally- Private Information Retrieval (cPIR). Classic cPIR protocols require that the database server executes an algorithm over all the database content at very low speeds which impairs their usage. In [1], given certain assumptions, realistic at the time, Sion and Carbunar showed that cPIR schemes were not practical and most likely would never be. To this day, this conclusion is widely accepted by researchers and practitioners. Using the paradigm shift introduced by lattice-based cryptography, we show that the conclusion of Sion and Carbunar is not valid anymore: cPIR is of practical value. This is achieved without compromising security, using standard crytosystems, and conservative parameter choices.


international conference on cryptology in africa | 2013

Adapting Lyubashevsky’s Signature Schemes to the Ring Signature Setting

Carlos Aguilar Melchor; Slim Bettaieb; Xavier Boyen; Laurent Fousse; Philippe Gaborit

Basing signature schemes on strong lattice problems has been a long standing open issue. Today, two families of lattice-based signature schemes are known: the ones based on the hash-and-sign construction of Gentry et al.; and Lyubashevsky’s schemes, which are based on the Fiat-Shamir framework. In this paper we show for the first time how to adapt the schemes of Lyubashevsky to the ring signature setting. In particular we transform the scheme of ASIACRYPT 2009 into a ring signature scheme that provides strong properties of security under the random oracle model. Anonymity is ensured in the sense that signatures of different users are within negligible statistical distance even under full key exposure. In fact, the scheme satisfies a notion which is stronger than the classical full key exposure setting as even if the keypair of the signing user is adversarially chosen, the statistical distance between signatures of different users remains negligible. Considering unforgeability, the best lattice-based ring signature schemes provide either unforgeability against arbitrary chosen subring attacks or insider corruption in log-sized rings. In this paper we present two variants of our scheme. In the basic one, unforgeability is ensured in those two settings. Increasing signature and key sizes by a factor k (typically 80 − 100), we provide a variant in which unforgeability is ensured against insider corruption attacks for arbitrary rings. The technique used is pretty general and can be adapted to other existing schemes.


Mathematical Structures in Computer Science | 2012

A duality between exceptions and states

Jean-Guillaume Dumas; Dominique Duval; Laurent Fousse; Jean-Claude Reynaud

Computational effects may often be interpreted in the Kleisli category of a monad or in the coKleisli category of a comonad. The duality between monads and comonads corresponds, in general, to a symmetry between construction and observation, for instance between raising an exception and looking up a state. Thanks to the properties of adjunction one may go one step further: the coKleisli-on-Kleisli category of a monad provides a kind of observation with respect to a given construction, while dually the Kleisli-on-coKleisli category of a comonad provides a kind of construction with respect to a given observation. In the previous examples this gives rise to catching an exception and updating a state. However, the interpretation of computational effects is usually based on a category which is not self-dual, like the category of sets. This leads to a breaking of the monad-comonad duality. For instance, in a distributive category the state effect has much better properties than the exception effect. This remark provides a novel point of view on the usual mechanism for handling exceptions. The aim of this paper is to build an equational semantics for handling exceptions based on the coKleisli-on-Kleisli category of the monad of exceptions. We focus on n-ary functions and conditionals. We propose a programmer’s language for exceptions and we prove that it has the required behaviour with respect to n-ary functions and conditionals.In this short note we study the semantics of two basic computational effects, exceptions and states, from a new point of view. In the handling of exceptions we dissociate the control from the elementary operation that recovers from the exception. In this way it becomes apparent that there is a duality, in the categorical sense, between exceptions and states.


arXiv: Programming Languages | 2012

Decorated proofs for computational effects: States

Jean-Guillaume Dumas; Dominique Duval; Laurent Fousse; Jean-Claude Reynaud

The syntax of an imperative language does not mention explicitly the state, while its denotational semantics has to mention it. In this paper we show that the equational proofs about an imperative language may hide the state, in the same way as the syntax does.


Journal of Symbolic Computation | 2011

Simultaneous modular reduction and Kronecker substitution for small finite fields

Jean-Guillaume Dumas; Laurent Fousse; Bruno Salvy


arXiv: Symbolic Computation | 2008

Compressed Modular Matrix Multiplication

Laurent Fousse; Bruno Salvy


IACR Cryptology ePrint Archive | 2014

XPIRe: Private Information Retrieval for Everyone.

Carlos Aguilar Melchor; Joris Barrier; Laurent Fousse; Marc-Olivier Killijian


arXiv: Logic in Computer Science | 2012

Adjunctions for exceptions

Dominique Duval; Laurent Fousse; Jean-Claude Reynaud


arXiv: Logic in Computer Science | 2011

States and exceptions considered as dual effects

Dominique Duval; Laurent Fousse; Jean-Claude Reynaud


Science & Engineering Faculty | 2013

Adapting Lyubashevsky's signature schemes to the ring signature setting

Carlos Aguilar-Melchor; Slim Bettaieb; Xavier Boyen; Laurent Fousse; Philippe Gaborit

Collaboration


Dive into the Laurent Fousse's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jean-Claude Reynaud

Centre national de la recherche scientifique

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xavier Boyen

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jean-Claude Reynaud

Centre national de la recherche scientifique

View shared research outputs
Researchain Logo
Decentralizing Knowledge