Skip to content. Skip to navigation
McGill Home SOCS Home
Personal tools
You are here: Home People Profile

Claude Crépeau


photo

Email: crepeau AT cs DOT mcgill DOT ca
Home Page: http://www.cs.mcgill.ca/~crepeau
Office: MC110N
Phone: +1-514-398-4716
Fax: +1-514-398-3883
Address:

Research Description

Professor Crépeau's research is mainly concerned with "cryptographic protocols": techniques for processing confidential data by several users that do not trust each other. He also has broad interests in the field of cryptography, most notably in

  • encryption schemes
  • digital signatures
  • identification schemes
  • "cryptographically strong" generation of pseudo-random numbers
  • "zero-knowledge" proofs.

Part of his research has been to use physical assumptions such as memory limitations, sources of noise and quantum properties of particles as sources of security in cryptographic protocols. This has also led him to investigate the general nature of quantum systems as carriers of information, resulting in his interest in "quantum teleportation" and "quantum information theory".

Research Interests

Research Labs

Teaching

Selected Publications (click link in front of each publication to see bibtex in ASCII format)

[1] Arboit, G., Crépeau, C., Davis, C. R., and Maheswaran, M. A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, 2008, v. 6, n. 1, pp. 17-31.
[2] Crépeau, C., and Wullschleger, J. Statistical security conditions for two-party secure function evaluation. In Safavi-Naini, R., editor, Proceedings of ICITS 2008, Berlin/Heidelberg. Springer-Verlag, August 2008, v. 5155 of Lecture Notes in Computer Science, Lecture Notes in Computer Science, pp. 86–-99.
[ .pdf ]
[3] Crépeau, C., Kilian, J., and Savvides, G. Interactive hashing: An information theoretic tool. In Safavi-Naini, R., editor, Proceedings of ICITS 2008, Berlin/Heidelberg. Springer-Verlag, August 2008, v. 5155 of Lecture Notes in Computer Science, Lecture Notes in Computer Science, pp. 14-28.
[ .pdf ]
[4] Desrosiers, S. P., and Dupuis, F. Quantum entropic security and approximate quantum encryption. July 2007, p. 16 pages. Quantum Physics (quant-ph).
[ http | http ]
[5] Desrosiers, S. P. Entropic security in quantum cryptography. March 2007, p. 12 pages. Quantum Physics (quant-ph).
[ http | http ]
[6] Layouni, M. Accredited symmetrically private information retrieval. In Miyaji, A., Kikuchi, H., and Rannenberg, K., editors, Lecture Notes in Computer Science, Berlin. Springer, 2007, v. 4752, pp. 262-277.
[7] Layouni, M., and Vangheluwe, H. Anonymous k-show credentials. In Lopez, J., Samarati, P., and Ferrer, J. L., editors, Lecture Notes in Computer Science IWSEC, Berlin. Springer, 2007, v. 4582, pp. 181-192.
[ http ]
[8] Crépeau, C., Davis, C. R., and Maheswaran, M. A secure manet routing protocol with resilience against byzantine behaviours of malicious or selfish nodes. In AINA Workshops, 2007, n. 2, pp. 19-26.
[9] Ben-Or, M., Crépeau, C., Gottesman, D., Hassidim, A., and Smith, A. Secure multiparty quantum computation with (only) a strict honest majority. 2006, pp. 249-260. ISBN=0-7695-2720-5.
[ http | .pdf ]
[10] Crépeau, C., and Savvides, G. Optimal reductions between oblivious transfers using interactive hashing. July 2006, v. LNCS 4004/2006, pp. 201-221. ISBN = 3-540-34546-9 ISSN = 0302-9743 (Print) 1611-3349 (Online).
[ http | .pdf ]
[11] Crépeau, C., Savvides, G., Schaffner, C., and Wullschleger, J. Information-theoretic conditions for two-party secure function evaluation. July 2006, v. LNCS 4004/2006, pp. 538-554. ISSN 0302-9743 (Print) 1611-3349 (Online) ISBN 3-540-34546-9.
[ http | .pdf ]
[12] Arboit, G., Crépeau, C., Davis, C. R., and Maheswaran, M. A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, August 2006. ISSN: 1570-8705 *Please be aware that although 'Articles in Press' do not have all bibliographic details available yet, they can already be cited using the year of online availability and the DOI as follows: Author(s), Article Title, Journal (Year), DOI. In Press.
[ http | .pdf ]
[13] Brassard, G., Crépeau, C., and Wolf, S. Oblivious transfers and privacy amplification. Journal of Cryptology, September 2003, v. 16, n. 4, pp. 219-237. Received: 1 April 2001, Revised: 1 July 2002, Published online: 5 March 2003.
[ .ps | .pdf ]
[14] Brassard, G., Crépeau, C., and Sántha, M. Oblivious transfers and intersecting codes. IEEE Transaction on Information Theory, November 1996, v. 42, n. 6, pp. 1769-1780. special issue on coding and complexity.
[ .ps | .pdf ]
[15] Bennett, C., Brassard, G., Crépeau, C., and Maurer, U. Generalized privacy amplification. IEEE Transaction on Information Theory, November 1995, v. 41, n. 6, pp. 1915-1923.
[ .ps | .pdf ]
[16] Bennett, C., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., and Wootters, W. Teleporting an unkown quantum state by dual classical and epr channels. Physical Review Letter, 1993, v. 70, pp. 1895-1898.
[ .ps | .pdf ]

Last Update:   2013/08/05 08:07:34.100 GMT-4