publications

Publications in alphabetical order of authors (if not stated differently with an asterisk). Preprints included and marked as such (i.e., EPRINT or ARXIV).

2024

  1. Quantum-Safe Hybrid Key Exchanges with KEM-Based Authentication
    *Christopher Battarbee, Christoph Striecks, Ludovic Perret, Sebastian Ramacher, and Kevin Verhaeghe.
    Preprint arXiv
  2. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    Dennis Hofheinz, Jessica Koch, and Christoph Striecks.
    Journal of Cryptology, Vol. 37, Num. 2, 2024
  3. (Inner-Product) Functional Encryption with Updatable Ciphertexts
    Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, and Erkan Tairi.
    Journal of Cryptology, Volume 37, Num. 1, 2024

2023

  1. Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective
    Daniel Slamanig, and Christoph Striecks.
    Theory of Cryptography - 21st International Conference, TCC 2023, Taipei, Taiwan, November 29 - December 2, 2023, Proceedings, Part II
  2. Optimizing 0-RTT Key Exchange with Full Forward Security
    Christian Göth, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, Erkan Tairi, and Alexander Zikulnig.
    Proceedings of the 2023 on Cloud Computing Security Workshop, CCSW 2023, Copenhagen, Denmark, 26 November 2023
  3. Muckle+: End-to-End Hybrid Authenticated Key Exchanges
    Sonja Bruckner, Sebastian Ramacher, and Christoph Striecks.
    Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings
  4. Unique-Path Identity Based Encryption with Applications to Strongly Secure Messaging
    Paul Rösler, Daniel Slamanig, and Christoph Striecks.
    Advances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part V

2022

  1. Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
    Abida Haque, Stephan Krenn, Daniel Slamanig, and Christoph Striecks.
    Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II

2021

  1. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, and Christoph Striecks.
    Journal of Cryptology
  2. Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)
    Peter Chvojka, Tibor Jager, Daniel Slamanig, and Christoph Striecks.
    Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II
  3. Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach
    *Nadja Marko, Joaquim Maria Castella Triginer, Christoph Striecks, Tobias Braun, Reinhard Schwarz, Stefan Marksteiner, Alexandr Vasenev, Joerg Kemmerich, Hayk Hamazaryan, Lijun Shan, and Claire Loiseaux.
    Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops - DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September 7, 2021, Proceedings
  4. Updatable Signatures and Message Authentication Codes
    Valerio Cini, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks, and Erkan Tairi.
    Public-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I
  5. Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
    David Derler, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks.
    Financial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II

2020

  1. CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors
    Valerio Cini, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks.
    Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I
  2. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
    Jan Bobolz, Fabian Eidens, Stephan Krenn, Daniel Slamanig, and Christoph Striecks.
    ASIA CCS ’20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020
  3. Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach
    *Nadja Marko, Alexandr Vasenev, and Christoph Striecks.
    Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops - DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings

2019

  1. Practical Group-Signatures with Privacy-Friendly Openings
    Stephan Krenn, Kai Samelin, and Christoph Striecks.
    Proceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019
  2. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
    David Derler, Kai Samelin, Daniel Slamanig, and Christoph Striecks.
    26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019

2018

  1. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    David Derler, Tibor Jager, Daniel Slamanig, and Christoph Striecks.
    Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III
  2. Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications
    David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, Daniel Slamanig, and Christoph Striecks.
    Public-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I
  3. Engineering Cryptography for Security and Privacy in the Cloud
    Stephan Krenn, Thomas Lorünser, and Christoph Striecks.
    ERCIM News

2017

  1. Towards Attribute-Based Credentials in the Cloud
    Stephan Krenn, Thomas Lorünser, Anja Salzer, and Christoph Striecks.
    Cryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers
  2. Secure and Privacy-Friendly Storage and Data Processing in the Cloud
    Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martı́nez Garcı́, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, Christoph Striecks, and Alberto Zanini.
    Privacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers
  3. Agile cryptographic solutions for the cloud
    *Thomas Lorünser, Stephan Krenn, Christoph Striecks, and Thomas Länger.
    Elektrotech. Informationstechnik
  4. Batch-verifiable Secret Sharing with Unconditional Privacy
    Stephan Krenn, Thomas Lorünser, and Christoph Striecks.
    Proceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017

2016

  1. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider
    *Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, and Simone Fischer-Hübner.
    Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers

2015

  1. On Cryptographic Building Blocks and Transformations
    Christoph Striecks.
  2. Confined Guessing: New Signatures From Standard Assumptions
    Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Christoph Striecks.
    Journal of Cryptology
  3. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    Dennis Hofheinz, Jessica Koch, and Christoph Striecks.
    Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings

2014

  1. A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
    Dennis Hofheinz, and Christoph Striecks.
    Topics in Cryptology - CT-RSA 2014 - The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings

2013

  1. Programmable Hash Functions in the Multilinear Setting
    Eduarda S. V. Freire, Dennis Hofheinz, Kenneth G. Paterson, and Christoph Striecks.
    Advances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
  2. Practical Signatures from Standard Assumptions
    Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, Jae Hong Seo, and Christoph Striecks.
    Advances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings