Search for courses or information

Dr Christophe Tartary

Lecturer, School of Architecture, Computing and Engineering

  • EB 1.86, Docklands Campus
    School of Architecture Computing and Engineering (ACE)
    University of East London
    4-6 University Way
    London
    E16 2RD
  • c.tartary@uel.ac.uk +442082237235
    Christophe’s main areas of investigation are secure multiparty computation, multicast communication and secret sharing.


    Overview




    Christophe’s main research interests are:

    Cryptography,
    Coding Theory,
    Information Security,
    Complexity Theory,
    Theoretical Computer Science.

    An important research theme of his is the construction and analysis of protocols for secure distributed computing. In recent investigations, he has studied the design of algorithms for generic multiparty computation, secret sharing and oblivious transfer. His work also focuses on the study of algebraic techniques (lattices, elliptic curves) for information security.


    Collaborators

    • test

    Research

    Conference Articles R. Steinfeld, S. Ling, J. Pieprzyk, C. Tartary and H. Wang. NTRUCCA: How to Strengthen NTRUEncrypt to Chosen-Ciphertext Security in the Standard Model. Proceedings of the 15th IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2012), May 21-24, Darmstadt (Germany). Lecture Notes in Computer Science, vol. 7293, pp 353 - 371. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary and H. Wang. Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication. Proceedings of the 12th Australasian Conference on Information Security and Privacy (ACISP 2007), July 2-4, 2007, Townsville (Australia). Lecture Notes in Computer Science, vol. 4586, pp 293 - 307. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary and H. Wang. Achieving Multicast Stream Authentication using MDS Codes. Proceedings of the 5th International Conference on Cryptology and Network Security (CANS 2006), December 8-10, 2006, Suzhou (China). Lecture Notes in Computer Science, vol. 4301, pp 108 - 125. Springer - Verlag. Abstract: html Download: pdf

    C. Tartary and H. Wang. Dynamic Threshold and Cheater Resistance for Shamir Secret Sharing Scheme. Proceedings of the 2nd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2006), November 29 - December 1, 2006, Beijing (China). Lecture Notes in Computer Science, vol. 4318, pp 103 - 117. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary and H. Wang. Rateless Codes for the Multicast Stream Authentication Problem. Proceedings of the 1st International Workshop on Security (IWSEC 2006) October 23-24, 2006, Kyoto (Japan). Lecture Notes in Computer Science, vol. 4266, pp 136 - 151. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary and H. Wang. Efficient Multicast Stream Authentication for the Fully Adversarial Network Model. Proceedings of the 6th International Workshop on Information Security Applications (WISA 2005) August 22-24, 2005, JejuCity (Korea). Lecture Notes in Computer Science, vol. 3786, pp 108 - 125. Springer - Verlag, 2006. Abstract: html Download: pdf Original Publication: www.springerlink.com

    Journal Articles B. Zeng, C. Tartary, P. Xu, J. Jing, X. Tang. A Practical Framework for t-out-of-n Oblivious Transfer with Security against Covert Adversaries. IEEE Transactions on Information Forensics and Security, vol. 7, no. 2, pp 465 - 479, April 2012, IEEE Signal Processing Society. Abstract: html Download: pdf Original Publication: ieeexplore.ieee.org

    Y. Desmedt, J. Pieprzyk, R. Steinfeld, X. Sun, C. Tartary, H. Wang and A. C.-C. Yao. Graph Coloring Applied to Secure Computation in Non-Abelian Groups. Journal of Cryptology, vol. 25, no. 4, pp 557 - 600, October 2012, Springer. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary, H. Wang and S. Ling. Authentication of Digital Streams. IEEE Transactions on Information Theory, vol. 57, no. 9, pp 6285 - 6303, September 2011, IEEE Information Theory Society. Abstract: html Download: pdf Original Publication: ieeexplore.ieee.org

    C. Tartary, H. Wang and Y. Zhang. An Efficient and Information Theoretically Secure Rational Secret Sharing Scheme based on Symmetric Bivariate Polynomials. International Journal of Foundations of Computer Science (Special Issue on Cryptography), vol. 22, no. 6, pp 1395 - 1416, September 2011. World Scientific. Abstract: html Download: pdf Original Publication: www.worldscinet.com

    T. Lou, X. Sun and C. Tartary. Bounds and Trade-offs for Double-Base Number Systems. Information Processing Letters, vol. 111, no. 10, pp 488 - 493, April 2011, Elsevier. Abstract: html Download: pdf

    Y. Zhang, C. Tartary and H. Wang. An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem. Proceedings of the 16th Australasian Conference on Information Security and Privacy (ACISP 2011), July 11-13, 2011, Melbourne (Australia). Lecture Notes in Computer Science, vol. 6812, pp 259 - 275. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary, S. Zhou, D. Lin, H. Wang and J. Pieprzyk. Analysis of Bilinear Pairing-based Accumulator for Identity Escrowing. IET Information Security, vol. 2, no. 4, pp 99 - 107, December 2008. Institution of Engineering and Technology. Abstract: html Download: pdf

    C. Tartary, H. Wang and J. Pieprzyk. A Coding Approach to the Multicast Stream Authentication Problem. International Journal of Information Security, vol. 7, no. 4, pp 265 - 283, August 2008. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary and H. Wang. Efficient Multicast Stream Authentication for the Fully Adversarial Network. International Journal of Security and Network (Special Issue on Cryptography in Networks), vol. 2, nos. 3/4, pp 175 - 191, 2007. Inderscience. Abstract: html Download: pdf

    PhD Thesis C. Tartary. Authentication for Multicast Communication. Department of Computing, Macquarie University, Australia, 2007. Abstract: html Download: pdf

    C. Tartary. Ensuring Authentication of Digital Information using Cryptographic Accumulators. Proceedings of the 8th International Conference on Cryptology and Network Security (CANS 2009), December 12-14, 2009, Kanazawa (Japan). Lecture Notes in Computer Science, vol. 5888, pp 315 - 333. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    L. Tiancheng and C. Tartary. Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. Proceedings of the 7th International Conference on Cryptology and Network Security (CANS 2008). Lecture Notes in Computer Science, vol. 5339, pp 196 - 213. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    Y. Qiao and C. Tartary. Counting Method For Multi-Party Computation over Non-Abelian Groups. Proceedings of the 7th International Conference on Cryptology and Network Security (CANS 2008). Lecture Notes in Computer Science, vol. 5339, pp 162 - 177. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    X. Sun, A. C.-C. Yao and C. Tartary. Graph Design for Secure Multiparty Computation over Non-Abelian Groups. Proceedings of the 14th Annual International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT 2008). Lecture Notes in Computer Science, vol. 5350, pp 37 - 53. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    Q. Ye, H. Wang and C. Tartary. Privacy-Preserving Distributed Set Intersection. Proceedings of the 2nd International Workshop on Advances in Information Security (WAIS 2008) included into the Proceedings of the 3rd International Conference on Availability, Security and Reliability (ARES 2008), pp 1332 - 1339. IEEE Computer Society. Abstract: html Download: pdf

    C. Tartary, H. Wang and J. Pieprzyk. An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels. Proceedings of the 1st International Conference on Provable Security (ProvSec 2007), November 1-2, 2007, Wollongong (Australia). Lecture Notes in Computer Science, vol. 4784, pp 17 - 34. Springer - Verlag. Abstract: html Download: pdf Original Publication: www.springerlink.com

    C. Tartary, J. Pieprzyk and H. Wang. Verifiable Multi-Secret Sharing Schemes for Multiple Threshold Access Structures. Proceedings of the 3rd SKLOIS Conference on Information Security and Cryptology (INSCRYPT 2007), August 31 - September 5, 2007, Xining (China). Lecture Notes in Computer Science, vol. 4990, pp 167 - 181. Springer - Verlag, 2008. Abstract: html Download: pdf Original Publication: www.springerlink.com

    Publications


    Funding



    Interests

    Portfolio


    Teaching