publications

Own publications are listed below in reversed chronological order; author names are given in alphabetical order depending on the author's last name (if not stated differently).

2022

  1. Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model
    With Abida Haque, Stephan Krenn, and Daniel Slamanig.
    PKC 2022, Virtual, March 7-11.

2021

  1. Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles
    With Peter Chvojka, Tibor Jager, and Daniel Slamanig.
    European Symposium on Research in Computer Security (ESORICS) 2021, Virtual, October 4-8.
  2. Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach
    With Nadja Marko, Joaquim Maria Castella Triginer, Tobias Braun, Reinhard Schwarz, Stefan Marksteiner, Alexandr Vasenev, Joerg Kemmerich, Hayk Hamazaryan, Lijun Shan, and Claire Loiseaux.
    Computer Safety, Reliability, and Security. SAFECOMP Workshops – DECSoS 2021, Virtual, September 7-10.
  3. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    Journal of Cryptology, Volume 34, 2021.
  4. Puncture ’Em All: Stronger Updatable Encryption with No-Directional Key Updates
    IACR ePrint 268, 2021.
  5. Updatable Signatures and Message Authentication Codes
    With Valerio Cini, Sebastian Ramacher, Daniel Slamanig, and Erkan Tairi.
    PKC 2021, Virtual, May 10-13. (Recorded talk given by Valerio Cini and Erkan Tairi.)
  6. Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications
    Financial Cryptography and Data Security 2021, Virtual, March 1-5. (Recorded talk given with Sebastian Ramacher and Daniel Slamanig.)

2020

  1. CCA-Secure (Puncturable) KEMs from Encryption with Non-Negligible Decryption Errors
    With Valerio Cini, Sebastian Ramacher, and Daniel Slamanig.
    ASIACRYPT 2020, Daejeon, South Korea, December 7-11. (Recorded talk given by Valerio Cini.)
  2. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection
    With Jan Bobolz, Fabian Eidens, Stephan Krenn, and Daniel Slamanig.
    AsiaCCS 2020, Taipei, Taiwan, October 5-9.
  3. Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach
    With Nadja Marko, and Alexandr Vasenev.
    Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops – DECSoS 2020, Lisbon, Portugal, September 15.

2019

  1. Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based
    With David Derler, Kai Samelin, and Daniel Slamanig.
    NDSS 2019, San Diego, USA, February 24-27.
  2. Practical Group-Signatures with Privacy-Friendly Openings
    With Stephan Krenn, and Kai Samelin.
    International Conference on Availability, Reliability and Security (ARES) 2019, Canterbury, UK, August 26-29.

2018

  1. Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange
    EUROCRYPT 2018, Tel Aviv, Israel, April 29 - May 3. (Recorded talk at Real World Crypto 2018 and EUROCRYPT 2018 given by David Derler.)
  2. Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications
    With David Derler, Stephan Krenn, Thomas Lorünser, Sebastian Ramacher, and Daniel Slamanig.
    PKC 2018, Rio de Janeiro, Brazil, March 25-29.
  3. Engineering Cryptography for Security and Privacy in the Cloud
    With Stephan Krenn, and Thomas Lorünser.
    ERCIM News 2018.

2017

  1. Agile cryptographic solutions for the cloud
    With Thomas Lorünser, Stephan Krenn, and Thomas Länger.
    Elektrotechnik und Informationstechnik 2017.
  2. Towards Attribute-Based Credentials in the Cloud
    With Stephan Krenn, Thomas Lorünser, and Anja Salzer.
    CANS 2017, Hong Kong, China, November 30 - December 2.
  3. Batch-verifiable Secret Sharing with Unconditional Privacy
    With Stephan Krenn, and Thomas Lorünser.
    International Conference on Information Systems Security and Privacy (ICISSP) 2017, Porto, Portugal, February 19-21.
  4. Secure and Privacy-Friendly Storage and Data Processing in the Cloud
    With Pasquale Chiaro, Simone Fischer-Hübner, Thomas Groß, Stephan Krenn, Thomas Lorünser, Ana Isabel Martı́nez Garcı́, Andrea Migliavacca, Kai Rannenberg, Daniel Slamanig, and Alberto Zanini.
    IFIP Summer School 2016 - Privacy and Identity Management, Ispra, Italy, September 4-8.

2016

  1. Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider
    With Farzaneh Karegar, Stephan Krenn, Felix Hörandner, Thomas Lorünser, and Simone Fischer-Hübner.
    IFIP Summer School 2016 - Privacy and Identity Management, Karlstad, Sweden, August 21-26.

2015

  1. On Cryptographic Building Blocks and Transformations
    PhD thesis, Karlsruhe Institute of Technology, Karlsruhe, Germany, June 26, 2015.
  2. Confined Guessing: New Signatures From Standard Assumptions
    With Florian Böhl, Dennis Hofheinz, Tibor Jager, and Jessica Koch.
    Journal of Cryptology, Volume 28, 2015.
  3. Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting
    With Dennis Hofheinz, and Jessica Koch.
    PKC 2015, Gaithersburg, MD, USA, March 30 - April 1. (Invited to the Journal of Cryptology.)

2014

  1. A Generic View on Trace-and-Revoke Broadcast Encryption Schemes
    CT-RSA 2014 - The Cryptographer’s Track at the RSA Conference 2014, San Francisco, USA, February 25-28.

2013

  1. Programmable Hash Functions in the Multilinear Setting
    With Eduarda S. V. Freire, Dennis Hofheinz, and Kenneth G. Paterson.
    CRYPTO 2013, Santa Barbara, USA, August 18-22.
  2. Practical Signatures from Standard Assumptions
    With Florian Böhl, Dennis Hofheinz, Tibor Jager, Jessica Koch, and Jae Hong Seo.
    EUROCRYPT 2013, Athens, Greece, May 26-30.