Christoph Striecks

AIT Austrian Institute of Technology, Cyber Security, Giefinggasse 4, 1220 Vienna, Austria

Cryptography researcher in the Cyber Security team at AIT Austrian Institute of Technology in Vienna, Austria.

My professional focus lies in the area of privacy-enhancing cryptographic technologies (such as end-to-end encryption, secure selective data sharing and computation on data, and authentication) with applications to concrete real-world problems (such as Big Data, Cloud, and IoT).

In 2015, I received my PhD (Dr. rer. nat.) in cryptography from the Karlsruhe Institute of Technology (KIT) in Germany under the supervision of Prof. Dennis Hofheinz and second doctoral thesis appraiser Prof. Eike Kiltz on scalable identity-based encryption, short digital signatures, and modular revocation schemes. Larger-scale teaching activities included Algorithms I (lab, SS 2015) and IT security (lab, SS 2013), encompassed by several smaller-scale seminars and labs on the topic of cryptography.

In 2010, I received my Diploma in computer science from the Technical University of Braunschweig in Germany with a major in cryptography and software engineering. From March to September 2008, I worked as a software-development intern for Siemens USA in Princeton, New Jersey.

More recently, I was involved in the standardization process of ETSI STF 529 within ETSI TC CYBER (on Attribute-Based Encryption for access control and data privacy). Furthermore, I was part of the ENISA List of Experts for field B: ICT Security Standardisation and Certification in category 1) Applied Cryptography (Algorithms, Protocols, Standards). Moreover, I am a member of the International Association for Cryptologic Research (IACR).

Program committees: CANS 2022, ARES 2022 (Workshop on Security, Privacy, and Identity Management in the Cloud), SICHERHEIT 2022, ARES 2020 (Workshop on Industrial Security and IoT), SICHERHEIT 2020, IMA International Conference on Cryptography and Coding 2019, IFIP Summer School on Privacy and Identity Management 2019, ARES 2019 (Workshop on Industrial Security and IoT), IFIP Summer School on Privacy and Identity Management 2018, and SICHERHEIT 2018 (Doktorandenforum).

Further main reviewing activities: ASIACRYPT 2022, CRYPTO 2022, ICALP 2022, IEEE Symposium on Security and Privacy 2022, ACM CCS 2022, EUROCRYPT 2022, IEEE Transactions on Information Forensics and Security 2022, IEEE Transactions on Dependable and Secure Computing 2022, ASIACRYPT 2021, IEEE Transactions on Dependable and Secure Computing 2021, USENIX Security 2021, CT-RSA 2021, ACM CCS 2020, PKC 2020, CRYPTO 2019, EuroS&P 2018, PKC 2018, SAC 2017, PKC 2017, ASIACRYPT 2016, PKC 2016, and ASIACRYPT 2015, among others.

Main projects: PROFET (FWF, netidee SCIENCE Call #2, 2019-2023), COMP4DRONES (EU HORIZON 2020, ECSEL-2018-2, RIA, 2019-2023), SECREDAS (EU HORIZON 2020, ECSEL-2017-2, RIA, 2018-2021), IoT4CPS (FFG and BMK, ICT of the Future, 2017-2020), PRISMACLOUD (EU HORIZON 2020, ICT-32-2014, RIA, 2015-2018), CREDENTIAL (EU HORIZON 2020, DS-02-2014, IA, 2015-2018).

Together with my colleagues Sebastian Ramacher and Daniel Slamanig, I wrote a series of blog posts on Puncturable Encryption for fine-grained forward security in public-key encryption. See here for Part I (Introduction and Motivation) and here for Part II (Techniques and State-of-the-Art), and here for Part III (Applications and Implementation).


Sep 24, 2022 From 19 to 23 September, I visited Dennis Hofheinz’ group at ETH Zurich and held a talk on Puncturable Encryption.
Apr 20, 2022 Last week, I attended Real World Crypto Symposium 2022 in Amsterdam and gave a contributed talk on Puncturable Encryption.
Mar 11, 2022 I will serve as a program committee member of CANS 2022.
Nov 30, 2021 Accepted paper on Threshold Ring Signatures at the International Conference on Practice and Theory of Public-Key Cryptography (PKC) 2022.
Nov 9, 2021 Accepted talk on Puncturable Encryption and Fine-Grained Forward Security at the Real World Crypto Symposium 2022.

selected publications

  1. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    Journal of Cryptology, Volume 34, 2021.
  2. CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors
    With Valerio Cini, Sebastian Ramacher, and Daniel Slamanig.
    ASIACRYPT 2020, Daejeon, South Korea, December 7-11. (Recorded talk given by Valerio Cini.)
  3. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
    With David Derler, Kai Samelin, and Daniel Slamanig.
    NDSS 2019, San Diego, USA, February 24-27.
  4. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    With Dennis Hofheinz, and Jessica Koch.
    PKC 2015, Gaithersburg, MD, USA, March 30 - April 1. (Invited to the Journal of Cryptology.)
  5. Programmable Hash Functions in the Multilinear Setting
    With Eduarda S. V. Freire, Dennis Hofheinz, and Kenneth G. Paterson.
    CRYPTO 2013, Santa Barbara, USA, August 18-22.