My Ph.D. defense entitled “Functional encryption and distributed signatures based on projective hash functions, the benefit of class groups” will take place on October 19th, 9:00am at École Normale Supérieure of Lyon (room D8 001 Buisson).
You can also view it here.
Here you can find the updated version of my thesis.
Jury
- Abdalla Michel, Directeur de Recherche CNRS à l'ENS Paris (Rapporteur),
- Damgård Ivan, Professeur à Aarhus University (Rapporteur),
- Agrawal Shweta, Associate Professor à I.I.T. Madras (Examinatrice),
- Fouque Pierre-Alain, Professeur à l'Université Rennes 1 (Examinateur).
- Ràfols Carla, Lectora Tenure Track à l'Universitat Pompeu Fabra (Examinatrice),
- Laguillaumie Fabien, Professeur,Université de Montpellier, LIRMM (Directeur),
- Castagnos Guilhem, Maître de Conférences HDR à l'Université de Bordeaux (Co-Directeur).
Abstract
One of the current challenges in cryptographic research is the development of advanced cryptographic primitives ensuring a high level of confidence. In this thesis, we focus on their design, while proving their security under well-studied algorithmic assumptions.
My work grounds itself on the linearity of homomorphic encryption, which allows to perform linear operations on encrypted data. Precisely, I built upon the linearly homomorphic encryption scheme introduced by Castagnos and Laguillaumie at CT-RSA’15. Their scheme possesses the unusual property of having a prime order plaintext space, whose size can essentially be tailored to ones’ needs. Aiming at a modular approach, I designed from their work technical tools (projective hash functions, zero-knowledge proofs of knowledge) which provide a rich framework lending itself to many applications.
This framework first allowed me to build functional encryption schemes; this highly expressive primitive allows a fine grained access to the information contained in e.g., an encrypted database. Then, in a different vein, but from these same tools, I designed threshold digital signatures, allowing a secret key to be shared among multiple users, so that the latter must collaborate in order to produce valid signatures. Such signatures can be used, among other applications, to secure crypto-currency wallets.
Significant efficiency gains, namely in terms of bandwidth, result from the instantiation of these constructions from class groups. This work is at the forefront of the revival these mathematical objects have seen in cryptography over the last few years.