20 Publications

Mark all

[20]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer, Georg, Chethan Kamath Hosdurg, Karen Klein, and Krzysztof Z Pietrzak. “Adaptively Secure Proxy Re-Encryption,” 11443:317–46. Springer Nature, 2019. https://doi.org/10.1007/978-3-030-17259-6_11.
View | DOI
 
[19]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park, Sunoo, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joel F Alwen, and Krzysztof Z Pietrzak. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” In 22nd International Conference on Financial Cryptography and Data Security, 10957:480–99. Springer Nature, 2018. https://doi.org/10.1007/978-3-662-58387-6_26.
View | DOI | Download (ext.)
 
[18]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Offline Witness Encryption,” 9696:285–303. Springer, 2016. https://doi.org/10.1007/978-3-319-39555-5_16.
View | Files available | DOI
 
[17]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Constrained PRFs for Unbounded Inputs,” 9610:413–28. Springer, 2016. https://doi.org/10.1007/978-3-319-29485-8_24.
View | Files available | DOI
 
[16]
2016 | Journal Article | IST-REx-ID: 1592
Abe, Masayuki, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, and Miyako Ohkubo. “Structure Preserving Signatures and Commitments to Group Elements.” Journal of Cryptology 29, no. 2 (2016): 363–421. https://doi.org/10.1007/s00145-014-9196-7.
View | DOI
 
[15]
2016 | Conference Paper | IST-REx-ID: 1225
Fuchsbauer, Georg, Christian Hanser, Chethan Kamath Hosdurg, and Daniel Slamanig. “Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions,” 9841:391–408. Springer, 2016. https://doi.org/10.1007/978-3-319-44618-9_21.
View | Files available | DOI | Download (ext.)
 
[14]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer, Georg, Felix Heuer, Eike Kiltz, and Krzysztof Z Pietrzak. “Standard Security Does Imply Security against Selective Opening for Markov Distributions,” 9562:282–305. Springer, 2016. https://doi.org/10.1007/978-3-662-49096-9_12.
View | DOI | Download (ext.)
 
[13]
2016 | Conference Paper | IST-REx-ID: 1235
Abusalah, Hamza M, and Georg Fuchsbauer. “Constrained PRFs for Unbounded Inputs with Short Keys,” 9696:445–63. Springer, 2016. https://doi.org/10.1007/978-3-319-39555-5_24.
View | Files available | DOI | Download (ext.)
 
[12]
2015 | Conference Paper | IST-REx-ID: 1647   OA
Fuchsbauer, Georg, Christian Hanser, and Daniel Slamanig. “Practical Round-Optimal Blind Signatures in the Standard Model,” 9216:233–53. Springer, 2015. https://doi.org/10.1007/978-3-662-48000-7_12.
View | Files available | DOI | Download (ext.)
 
[11]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer, Georg, Zahra Jafargholi, and Krzysztof Z Pietrzak. “A Quasipolynomial Reduction for Generalized Selective Decryption on Trees,” 9215:601–20. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_29.
View | Files available | DOI
 
[10]
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi, Foteini, Melissa Chase, Georg Fuchsbauer, and Markulf Kohlweiss. “Anonymous Transferable E-Cash,” 9020:101–24. Springer, 2015. https://doi.org/10.1007/978-3-662-46447-2_5.
View | DOI
 
[9]
2015 | Conference Paper | IST-REx-ID: 1474   OA
Ferrara, Anna, Georg Fuchsbauer, Bin Liu, and Bogdan Warinschi. “Policy Privacy in Cryptographic Access Control,” 46–60. IEEE, 2015. https://doi.org/10.1109/CSF.2015.11.
View | DOI | Download (ext.)
 
[8]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee, Abishek, Georg Fuchsbauer, Chris Peikert, Krzysztof Z Pietrzak, and Sophie Stevens. “Key-Homomorphic Constrained Pseudorandom Functions.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-46497-7_2.
View | Files available | DOI
 
[7]
2014 | Conference Paper | IST-REx-ID: 1643   OA
Fuchsbauer, Georg. “Constrained Verifiable Random Functions .” In SCN 2014, edited by Michel Abdalla and Roberto De Prisco, 8642:95–114. Springer, 2014. https://doi.org/10.1007/978-3-319-10879-7_7.
View | DOI | Download (ext.)
 
[6]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer, Georg, Momchil Konstantinov, Krzysztof Z Pietrzak, and Vanishree Rao. “Adaptive Security of Constrained PRFs,” 8874:173–92. Springer, 2014. https://doi.org/10.1145/2591796.2591825.
View | DOI | Download (ext.)
 
[5]
2014 | Conference Paper | IST-REx-ID: 2045   OA
Dachman Soled, Dana, Georg Fuchsbauer, Payman Mohassel, and Adam O’Neill. “Enhanced Chosen-Ciphertext Security and Applications.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, 8383:329–44. Springer, 2014. https://doi.org/10.1007/978-3-642-54631-0_19.
View | DOI | Download (ext.)
 
[4]
2014 | Conference Paper | IST-REx-ID: 2046   OA
Bellare, Mihir, and Georg Fuchsbauer. “Policy-Based Signatures.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, 8383:520–37. Springer, 2014. https://doi.org/10.1007/978-3-642-54631-0_30.
View | DOI | Download (ext.)
 
[3]
2013 | Conference Paper | IST-REx-ID: 2291   OA
Ferrara, Anna, Georg Fuchsbauer, and Bogdan Warinschi. “Cryptographically Enforced RBAC,” 115–29. IEEE, 2013. https://doi.org/10.1109/CSF.2013.15.
View | DOI | Download (ext.)
 
[2]
2013 | Conference Paper | IST-REx-ID: 2260   OA
Bernhard, David, Georg Fuchsbauer, and Essam Ghadafi. “Efficient Signatures of Knowledge and DAA in the Standard Model.” Lecture Notes in Computer Science. Springer, 2013. https://doi.org/10.1007/978-3-642-38980-1_33.
View | DOI | Download (ext.)
 
[1]
2013 | Journal Article | IST-REx-ID: 502
Blazy, Olivier, Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud. “Short Blind Signatures.” Journal of Computer Security 21, no. 5 (2013): 627–61. https://doi.org/10.3233/JCS-130477.
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed

20 Publications

Mark all

[20]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer, Georg, Chethan Kamath Hosdurg, Karen Klein, and Krzysztof Z Pietrzak. “Adaptively Secure Proxy Re-Encryption,” 11443:317–46. Springer Nature, 2019. https://doi.org/10.1007/978-3-030-17259-6_11.
View | DOI
 
[19]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park, Sunoo, Albert Kwon, Georg Fuchsbauer, Peter Gazi, Joel F Alwen, and Krzysztof Z Pietrzak. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” In 22nd International Conference on Financial Cryptography and Data Security, 10957:480–99. Springer Nature, 2018. https://doi.org/10.1007/978-3-662-58387-6_26.
View | DOI | Download (ext.)
 
[18]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Offline Witness Encryption,” 9696:285–303. Springer, 2016. https://doi.org/10.1007/978-3-319-39555-5_16.
View | Files available | DOI
 
[17]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah, Hamza M, Georg Fuchsbauer, and Krzysztof Z Pietrzak. “Constrained PRFs for Unbounded Inputs,” 9610:413–28. Springer, 2016. https://doi.org/10.1007/978-3-319-29485-8_24.
View | Files available | DOI
 
[16]
2016 | Journal Article | IST-REx-ID: 1592
Abe, Masayuki, Georg Fuchsbauer, Jens Groth, Kristiyan Haralambiev, and Miyako Ohkubo. “Structure Preserving Signatures and Commitments to Group Elements.” Journal of Cryptology 29, no. 2 (2016): 363–421. https://doi.org/10.1007/s00145-014-9196-7.
View | DOI
 
[15]
2016 | Conference Paper | IST-REx-ID: 1225
Fuchsbauer, Georg, Christian Hanser, Chethan Kamath Hosdurg, and Daniel Slamanig. “Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions,” 9841:391–408. Springer, 2016. https://doi.org/10.1007/978-3-319-44618-9_21.
View | Files available | DOI | Download (ext.)
 
[14]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer, Georg, Felix Heuer, Eike Kiltz, and Krzysztof Z Pietrzak. “Standard Security Does Imply Security against Selective Opening for Markov Distributions,” 9562:282–305. Springer, 2016. https://doi.org/10.1007/978-3-662-49096-9_12.
View | DOI | Download (ext.)
 
[13]
2016 | Conference Paper | IST-REx-ID: 1235
Abusalah, Hamza M, and Georg Fuchsbauer. “Constrained PRFs for Unbounded Inputs with Short Keys,” 9696:445–63. Springer, 2016. https://doi.org/10.1007/978-3-319-39555-5_24.
View | Files available | DOI | Download (ext.)
 
[12]
2015 | Conference Paper | IST-REx-ID: 1647   OA
Fuchsbauer, Georg, Christian Hanser, and Daniel Slamanig. “Practical Round-Optimal Blind Signatures in the Standard Model,” 9216:233–53. Springer, 2015. https://doi.org/10.1007/978-3-662-48000-7_12.
View | Files available | DOI | Download (ext.)
 
[11]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer, Georg, Zahra Jafargholi, and Krzysztof Z Pietrzak. “A Quasipolynomial Reduction for Generalized Selective Decryption on Trees,” 9215:601–20. Springer, 2015. https://doi.org/10.1007/978-3-662-47989-6_29.
View | Files available | DOI
 
[10]
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi, Foteini, Melissa Chase, Georg Fuchsbauer, and Markulf Kohlweiss. “Anonymous Transferable E-Cash,” 9020:101–24. Springer, 2015. https://doi.org/10.1007/978-3-662-46447-2_5.
View | DOI
 
[9]
2015 | Conference Paper | IST-REx-ID: 1474   OA
Ferrara, Anna, Georg Fuchsbauer, Bin Liu, and Bogdan Warinschi. “Policy Privacy in Cryptographic Access Control,” 46–60. IEEE, 2015. https://doi.org/10.1109/CSF.2015.11.
View | DOI | Download (ext.)
 
[8]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee, Abishek, Georg Fuchsbauer, Chris Peikert, Krzysztof Z Pietrzak, and Sophie Stevens. “Key-Homomorphic Constrained Pseudorandom Functions.” Lecture Notes in Computer Science. Springer, 2015. https://doi.org/10.1007/978-3-662-46497-7_2.
View | Files available | DOI
 
[7]
2014 | Conference Paper | IST-REx-ID: 1643   OA
Fuchsbauer, Georg. “Constrained Verifiable Random Functions .” In SCN 2014, edited by Michel Abdalla and Roberto De Prisco, 8642:95–114. Springer, 2014. https://doi.org/10.1007/978-3-319-10879-7_7.
View | DOI | Download (ext.)
 
[6]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer, Georg, Momchil Konstantinov, Krzysztof Z Pietrzak, and Vanishree Rao. “Adaptive Security of Constrained PRFs,” 8874:173–92. Springer, 2014. https://doi.org/10.1145/2591796.2591825.
View | DOI | Download (ext.)
 
[5]
2014 | Conference Paper | IST-REx-ID: 2045   OA
Dachman Soled, Dana, Georg Fuchsbauer, Payman Mohassel, and Adam O’Neill. “Enhanced Chosen-Ciphertext Security and Applications.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, 8383:329–44. Springer, 2014. https://doi.org/10.1007/978-3-642-54631-0_19.
View | DOI | Download (ext.)
 
[4]
2014 | Conference Paper | IST-REx-ID: 2046   OA
Bellare, Mihir, and Georg Fuchsbauer. “Policy-Based Signatures.” In Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, 8383:520–37. Springer, 2014. https://doi.org/10.1007/978-3-642-54631-0_30.
View | DOI | Download (ext.)
 
[3]
2013 | Conference Paper | IST-REx-ID: 2291   OA
Ferrara, Anna, Georg Fuchsbauer, and Bogdan Warinschi. “Cryptographically Enforced RBAC,” 115–29. IEEE, 2013. https://doi.org/10.1109/CSF.2013.15.
View | DOI | Download (ext.)
 
[2]
2013 | Conference Paper | IST-REx-ID: 2260   OA
Bernhard, David, Georg Fuchsbauer, and Essam Ghadafi. “Efficient Signatures of Knowledge and DAA in the Standard Model.” Lecture Notes in Computer Science. Springer, 2013. https://doi.org/10.1007/978-3-642-38980-1_33.
View | DOI | Download (ext.)
 
[1]
2013 | Journal Article | IST-REx-ID: 502
Blazy, Olivier, Georg Fuchsbauer, David Pointcheval, and Damien Vergnaud. “Short Blind Signatures.” Journal of Computer Security 21, no. 5 (2013): 627–61. https://doi.org/10.3233/JCS-130477.
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: Chicago

Export / Embed