publications
Publications in alphabetical order of authors (if not stated differently with an asterisk). Preprints included and marked as such (i.e., EPRINT).
2024
2023
- Unique-Path Identity Based Encryption with Applications to Strongly Secure MessagingAdvances in Cryptology - EUROCRYPT 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part V
2022
- Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain ModelPublic-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II
2021
- Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key ExchangeJournal of Cryptology
- Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract)Computer Security - ESORICS 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part II
- Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS ApproachComputer Safety, Reliability, and Security. SAFECOMP 2021 Workshops - DECSoS, MAPSOD, DepDevOps, USDAI, and WAISE, York, UK, September 7, 2021, Proceedings
- Updatable Signatures and Message Authentication CodesPublic-Key Cryptography - PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, Virtual Event, May 10-13, 2021, Proceedings, Part I
- Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and ApplicationsFinancial Cryptography and Data Security - 25th International Conference, FC 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part II
2020
- CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption ErrorsAdvances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I
- Privacy-Preserving Incentive Systems with Highly Efficient Point-CollectionASIA CCS ’20: The 15th ACM Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020
- Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS ApproachComputer Safety, Reliability, and Security. SAFECOMP 2020 Workshops - DECSoS 2020, DepDevOps 2020, USDAI 2020, and WAISE 2020, Lisbon, Portugal, September 15, 2020, Proceedings
2019
- Practical Group-Signatures with Privacy-Friendly OpeningsProceedings of the 14th International Conference on Availability, Reliability and Security, ARES 2019, Canterbury, UK, August 26-29, 2019
- Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based26th Annual Network and Distributed System Security Symposium, NDSS 2019, San Diego, California, USA, February 24-27, 2019
2018
- Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key ExchangeAdvances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part III
- Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and ApplicationsPublic-Key Cryptography - PKC 2018 - 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I
2017
- Towards Attribute-Based Credentials in the CloudCryptology and Network Security - 16th International Conference, CANS 2017, Hong Kong, China, November 30 - December 2, 2017, Revised Selected Papers
- Secure and Privacy-Friendly Storage and Data Processing in the CloudPrivacy and Identity Management. The Smart Revolution - 12th IFIP WG 9.2, 9.5, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Ispra, Italy, September 4-8, 2017, Revised Selected Papers
- Batch-verifiable Secret Sharing with Unconditional PrivacyProceedings of the 3rd International Conference on Information Systems Security and Privacy, ICISSP 2017, Porto, Portugal, February 19-21, 2017
2016
- Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity ProviderPrivacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers
2015
- Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext SettingPublic-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30 - April 1, 2015, Proceedings
2014
- A Generic View on Trace-and-Revoke Broadcast Encryption SchemesTopics in Cryptology - CT-RSA 2014 - The Cryptographer’s Track at the RSA Conference 2014, San Francisco, CA, USA, February 25-28, 2014. Proceedings
2013
- Programmable Hash Functions in the Multilinear SettingAdvances in Cryptology - CRYPTO 2013 - 33rd Annual Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2013. Proceedings, Part I
- Practical Signatures from Standard AssumptionsAdvances in Cryptology - EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26-30, 2013. Proceedings