In Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4-8, 2023, Proceedings, Part V, 2023
@inproceedings{AC:FioKolPer23,author={Fiore, Dario and Kolonelos, Dimitris and de Perthuis, Paola},title={Cuckoo Commitments: Registration-Based Encryption and Key-Value Map
Commitments for Large Spaces},editor={Guo, Jian and Steinfeld, Ron},booktitle={Advances in Cryptology - {ASIACRYPT} 2023 - 29th International Conference
on the Theory and Application of Cryptology and Information Security,
Guangzhou, China, December 4-8, 2023, Proceedings, Part {V}},series={Lecture Notes in Computer Science},volume={14442},pages={166--200},publisher={Springer},year={2023},doi={10.1007/978-981-99-8733-7_6},}
ESOR:BPP23
Covercrypt: An Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
In Computer Security - ESORICS 2023 - 28th European Symposium on Research in Computer Security, The Hague, The Netherlands, September 25-29, 2023, Proceedings, Part I, 2023
@inproceedings{ESORICS:BrePerPoi23,author={Brézot, Théophile and de Perthuis, Paola and Pointcheval, David},title={Covercrypt: An Efficient Early-Abort {KEM} for Hidden Access Policies
with Traceability from the {DDH} and {LWE}},editor={Tsudik, Gene and Conti, Mauro and Liang, Kaitai and Smaragdakis, Georgios},booktitle={Computer Security - {ESORICS} 2023 - 28th European Symposium on Research
in Computer Security, The Hague, The Netherlands, September 25-29,
2023, Proceedings, Part {I}},series={Lecture Notes in Computer Science},volume={14344},pages={372--392},publisher={Springer},year={2023},doi={10.1007/978-3-031-50594-2_19},}
2022
CCS:PP22
Two-Client Inner-Product Functional Encryption with an Application to Money-Laundering Detection
@inproceedings{CCS:PerPoi22,author={de Perthuis, Paola and Pointcheval, David},title={Two-Client Inner-Product Functional Encryption with an Application
to Money-Laundering Detection},editor={Yin, Heng and Stavrou, Angelos and Cremers, Cas and Shi, Elaine},booktitle={Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
7-11, 2022},pages={725--737},publisher={{ACM}},year={2022},doi={10.1145/3548606.3559374},}
SCN:INPP22
MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation
Oblivious Polynomial Evaluation (OPE) schemes are interactive protocols between a sender with a private polynomial and a receiver with a private evaluation point where the receiver learns the evaluation of the polynomial in their point and no additional information. In this work, we introduce MyOPE, a “short-sighted” non-interactive polynomial evaluation scheme with a poly-logarithmic communication complexity in the presence of malicious senders. In addition to strong privacy guarantees, MyOPE enforces honest sender behavior and consistency by adding verifiability to the calculations.
@inproceedings{SCN:INPP22,author={Izabach{\`e}ne, Malika and Nitulescu, Anca and de Perthuis, Paola and Pointcheval, David},editor={Galdi, Clemente and Jarecki, Stanislaw},title={MyOPE: Malicious SecuritY for Oblivious Polynomial Evaluation},booktitle={Security and Cryptography for Networks},year={2022},month=sep,publisher={Springer International Publishing},address={Cham},pages={663--686},isbn={978-3-031-14791-3},}
Unpublished
2024
EPR:PP24
Post-Quantum Privacy for Traceable Receipt-Free Encryption
@unpublished{EPRINT:PerPet24,author={de Perthuis, Paola and Peters, Thomas},title={Post-Quantum Privacy for Traceable Receipt-Free Encryption},howpublished={Cryptology {ePrint} Archive, Paper 2024/2087},year={2024},}
2023
EPR:FKP23
Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces
@unpublished{EPRINT:FioKolPer23,author={Fiore, Dario and Kolonelos, Dimitris and de Perthuis, Paola},title={Cuckoo Commitments: Registration-Based Encryption and Key-Value Map Commitments for Large Spaces},howpublished={Cryptology {ePrint} Archive, Paper 2023/1389},year={2023},}
EPR:BPP23
Covercrypt: an Efficient Early-Abort KEM for Hidden Access Policies with Traceability from the DDH and LWE
@unpublished{EPRINT:BrePerPoi23,author={Brézot, Théophile and de Perthuis, Paola and Pointcheval, David},title={Covercrypt: an Efficient Early-Abort {KEM} for Hidden Access Policies with Traceability from the {DDH} and {LWE}},howpublished={Cryptology {ePrint} Archive, Paper 2023/836},year={2023},}
ARX:KHCPM23
Catch Me If You Can: Semi-supervised Graph Learning for Spotting Money Laundering
Md. Rezaul Karim, Felix Hermsen, Sisay Adugna Chala, Paola Perthuis, and Avikarsha Mandal
@unpublished{ARXIV:KHCPM23,title={Catch Me If You Can: Semi-supervised Graph Learning for Spotting Money Laundering},author={Karim, Md. Rezaul and Hermsen, Felix and Chala, Sisay Adugna and de Perthuis, Paola and Mandal, Avikarsha},year={2023},eprint={2302.11880},archiveprefix={arXiv},primaryclass={cs.AI},}
2022
EPR:PP22
Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection
@unpublished{EPRINT:PerPoi22,author={de Perthuis, Paola and Pointcheval, David},title={Two-Client Inner-Product Functional Encryption, with an Application to Money-Laundering Detection},year={2022},howpublished={Cryptology ePrint Archive, Report 2022/441},}
2021
EPR:INPP21
MyOPE: Malicious securitY for Oblivious Polynomial Evaluation
@unpublished{EPRINT:INPP21,author={Izabach{\`e}ne, Malika and Nitulescu, Anca and de Perthuis, Paola and Pointcheval, David},title={{MyOPE}: Malicious {securitY} for Oblivious Polynomial Evaluation},year={2021},howpublished={Cryptology ePrint Archive, Report 2021/1291},}
Journal Articles
2024
IEEE:KHCPM24
Scalable Semi-Supervised Graph Learning Techniques for Anti Money Laundering
Md. Rezaul Karim, Felix Hermsen, Sisay Adugna Chala, Paola Perthuis, and Avikarsha Mandal
@article{IEEE:KHCPM24,author={Karim, Md. Rezaul and Hermsen, Felix and Chala, Sisay Adugna and de Perthuis, Paola and Mandal, Avikarsha},title={Scalable Semi-Supervised Graph Learning Techniques for Anti Money
Laundering},journal={{IEEE} Access},volume={12},pages={50012--50029},year={2024},doi={10.1109/ACCESS.2024.3383784},timestamp={Tue, 16 Apr 2024 13:57:09 +0200},}