-
Notifications
You must be signed in to change notification settings - Fork 0
/
PhD.html
86 lines (71 loc) · 4.71 KB
/
PhD.html
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8" />
<title>Ida Tucker</title>
<link rel="stylesheet" href="main.css" type="text/css" />
<!--[if IE]>
<script src="http://html5shiv.googlecode.com/svn/trunk/html5.js"></script><![endif]-->
<!--[if lte IE 7]>
<script src="js/IE8.js" type="text/javascript"></script><![endif]-->
<!--[if lt IE 7]>
<link rel="stylesheet" type="text/css" media="all" href="css/ie6.css"/><![endif]-->
</head>
<body id="index" class="home">
<header id="banner" class="body">
<img alt="there should be a picture here" class="corner-picture" src="logos/ida.jpg" style="height: 140px;">
<h1><a href="index.html">Ida Tucker</a></h1>
<nav><ul>
<li><a href="index.html">home</a></li>
<li><a href="contact.html">contact</a></li>
<li class="active"><a href="PhD.html">PhD Defense & Thesis</a></li>
<li><a href="cv.pdf" target="_blank">cv</a></li>
</ul></nav>
</header><!-- /#banner If you wish to contact me, you should find me here:-->
<section id="content" class="body">
<ol id="posts-list" class="hfeed">
<li><article class="hentry">
<header>
<h2 class="entry-title"><a href="#" rel="bookmark" title="Permalink to this POST TITLE">PhD Defense</a></h2>
</header>
<div class="entry-content">
<p>My Ph.D. defense entitled <em>“Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups” </em>will take place on October 19th, 9:00am at École Normale Supérieure of Lyon (room D8 001 Buisson).</p>
<p><span style="font-family: Helvetica Neue;">
You can also view it <strong>
<a href="https://youtu.be/-UZGUa0Y7cw">here</a></strong>.
</span></p>
<p>Here you can find the updated version of my <strong><a href="idathesis.pdf">thesis</a></strong>.</p>
<h2><strong>Jury</strong></h2>
<ul>
<li> Abdalla Michel, <em> Directeur de Recherche CNRS à l'ENS Paris </em> <strong>(Rapporteur)</strong>,</li>
<li>Damgård Ivan, <em>Professeur à Aarhus University</em> <strong>(Rapporteur)</strong>,</li>
<li>Agrawal Shweta, <em>Associate Professor à I.I.T. Madras</em> <strong>(Examinatrice)</strong>,</li>
<li>Fouque Pierre-Alain, <em>Professeur à l'Université Rennes 1</em> <strong>(Examinateur).</strong></li>
<li>Ràfols Carla, <em>Lectora Tenure Track à l'Universitat Pompeu Fabra</em> <strong>(Examinatrice)</strong>,</li>
<li>Laguillaumie Fabien,<em> Professeur,Université de Montpellier, LIRMM </em> <strong>(Directeur)</strong>,</li>
<li>Castagnos Guilhem, <em>Maître de Conférences HDR à l'Université de Bordeaux </em><strong>(Co-Directeur)</strong>.</li>
</ul>
<p> </p>
<h2><strong>Abstract</strong></h2>
<div class="page" title="Page 5">
<div class="layoutArea">
<div class="column">
<p>One of the current challenges in cryptographic research is the development of advanced cryptographic primitives ensuring a high level of confidence. In this thesis, we focus on their design, while proving their security under well-studied algorithmic assumptions.</p>
<p>My work grounds itself on the linearity of homomorphic encryption, which allows to perform linear operations on encrypted data. Precisely, I built upon the linearly homomorphic encryption scheme introduced by Castagnos and Laguillaumie at CT-RSA’15. Their scheme possesses the unusual property of having a prime order plaintext space, whose size can essentially be tailored to ones’ needs. Aiming at a modular approach, I designed from their work technical tools (projective hash functions, zero-knowledge proofs of knowledge) which provide a rich framework lending itself to many applications.</p>
<p>This framework first allowed me to build functional encryption schemes; this highly expressive primitive allows a fine grained access to the information contained in e.g., an encrypted database. Then, in a different vein, but from these same tools, I designed threshold digital signatures, allowing a secret key to be shared among multiple users, so that the latter must collaborate in order to produce valid signatures. Such signatures can be used, among other applications, to secure crypto-currency wallets.</p>
<p>Significant efficiency gains, namely in terms of bandwidth, result from the instantiation of these constructions from class groups. This work is at the forefront of the revival these mathematical objects have seen in cryptography over the last few years.</p>
</div>
</div>
</div>
<p> </p>
</div><!-- .entry-content -->
</article></li>
</ol><!-- /#posts-list -->
</section><!-- /#content -->
<div class="body">
<div>
<img class="photo" src="logos/pyrennees.jpg" alt="pic" style="height: 130px; display: block; margin-left: 0px; margin-right: 0px; border-radius: 10px; width: 800px">
</div>
</div>
</body>
</html>