20 Publications

Mark all

[20]
2019 | Conference Paper | IST-REx-ID: 6430 | OA
Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. 2019. Adaptively secure proxy re-encryption. PKC: Public-Key Cryptograhy, LNCS, vol. 11443, 317–346.
View | DOI | Download Preprint (ext.)
 
[19]
2018 | Conference Paper | IST-REx-ID: 6941 | OA
Park S, Kwon A, Fuchsbauer G, Gazi P, Alwen JF, Pietrzak KZ. 2018. SpaceMint: A cryptocurrency based on proofs of space. 22nd International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 10957, 480–499.
View | DOI | Download Submitted Version (ext.)
 
[18]
2016 | Journal Article | IST-REx-ID: 1592
Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M. 2016. Structure preserving signatures and commitments to group elements. Journal of Cryptology. 29(2), 363–421.
View | DOI
 
[17]
2016 | Conference Paper | IST-REx-ID: 1225 | OA
Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. 2016. Practical round-optimal blind signatures in the standard model from weaker assumptions. SCN: Security and Cryptography for Networks, LNCS, vol. 9841, 391–408.
View | Files available | DOI | Download Submitted Version (ext.)
 
[16]
2016 | Conference Paper | IST-REx-ID: 1229 | OA
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 285–303.
View | Files available | DOI
 
[15]
2016 | Conference Paper | IST-REx-ID: 1233 | OA
Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. 2016. Standard security does imply security against selective opening for markov distributions. TCC: Theory of Cryptography Conference, LNCS, vol. 9562, 282–305.
View | DOI | Download Submitted Version (ext.)
 
[14]
2016 | Conference Paper | IST-REx-ID: 1235 | OA
Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 445–463.
View | Files available | DOI | Download Submitted Version (ext.)
 
[13]
2016 | Conference Paper | IST-REx-ID: 1236 | OA
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610, 413–428.
View | Files available | DOI
 
[12]
2015 | Conference Paper | IST-REx-ID: 1474 | OA
Ferrara A, Fuchsbauer G, Liu B, Warinschi B. 2015. Policy privacy in cryptographic access control. CSF: Computer Security Foundations, 46–60.
View | DOI | Download Submitted Version (ext.)
 
[11]
2015 | Conference Paper | IST-REx-ID: 1646 | OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 9015, 31–60.
View | Files available | DOI
 
[10]
2015 | Conference Paper | IST-REx-ID: 1647 | OA
Fuchsbauer G, Hanser C, Slamanig D. 2015. Practical round-optimal blind signatures in the standard model. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 233–253.
View | Files available | DOI | Download Submitted Version (ext.)
 
[9]
2015 | Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
View | Files available | DOI
 
[8]
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
View | DOI
 
[7]
2014 | Conference Paper | IST-REx-ID: 1927 | OA
Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. 2014. Adaptive security of constrained PRFs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8874, 173–192.
View | DOI | Download (ext.)
 
[6]
2014 | Conference Paper | IST-REx-ID: 2045 | OA
Dachman Soled D, Fuchsbauer G, Mohassel P, O’Neill A. 2014. Enhanced chosen-ciphertext security and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 329–344.
View | DOI | Download Submitted Version (ext.)
 
[5]
2014 | Conference Paper | IST-REx-ID: 2046 | OA
Bellare M, Fuchsbauer G. 2014. Policy-based signatures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 520–537.
View | DOI | Download Submitted Version (ext.)
 
[4]
2014 | Conference Paper | IST-REx-ID: 1643 | OA
Fuchsbauer G. 2014. Constrained Verifiable Random Functions . SCN 2014. SCN: Security and Cryptography for Networks, LNCS, vol. 8642, 95–114.
View | DOI | Download Submitted Version (ext.)
 
[3]
2013 | Conference Paper | IST-REx-ID: 2260 | OA
Bernhard D, Fuchsbauer G, Ghadafi E. 2013. Efficient signatures of knowledge and DAA in the standard model. 7954, 518–533.
View | DOI | Download Submitted Version (ext.)
 
[2]
2013 | Conference Paper | IST-REx-ID: 2291 | OA
Ferrara A, Fuchsbauer G, Warinschi B. 2013. Cryptographically enforced RBAC. CSF: Computer Security Foundations, 115–129.
View | DOI | Download Submitted Version (ext.)
 
[1]
2013 | Journal Article | IST-REx-ID: 502
Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D. 2013. Short blind signatures. Journal of Computer Security. 21(5), 627–661.
View | DOI
 

Search

Filter Publications

20 Publications

Mark all

[20]
2019 | Conference Paper | IST-REx-ID: 6430 | OA
Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. 2019. Adaptively secure proxy re-encryption. PKC: Public-Key Cryptograhy, LNCS, vol. 11443, 317–346.
View | DOI | Download Preprint (ext.)
 
[19]
2018 | Conference Paper | IST-REx-ID: 6941 | OA
Park S, Kwon A, Fuchsbauer G, Gazi P, Alwen JF, Pietrzak KZ. 2018. SpaceMint: A cryptocurrency based on proofs of space. 22nd International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 10957, 480–499.
View | DOI | Download Submitted Version (ext.)
 
[18]
2016 | Journal Article | IST-REx-ID: 1592
Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M. 2016. Structure preserving signatures and commitments to group elements. Journal of Cryptology. 29(2), 363–421.
View | DOI
 
[17]
2016 | Conference Paper | IST-REx-ID: 1225 | OA
Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. 2016. Practical round-optimal blind signatures in the standard model from weaker assumptions. SCN: Security and Cryptography for Networks, LNCS, vol. 9841, 391–408.
View | Files available | DOI | Download Submitted Version (ext.)
 
[16]
2016 | Conference Paper | IST-REx-ID: 1229 | OA
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 285–303.
View | Files available | DOI
 
[15]
2016 | Conference Paper | IST-REx-ID: 1233 | OA
Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. 2016. Standard security does imply security against selective opening for markov distributions. TCC: Theory of Cryptography Conference, LNCS, vol. 9562, 282–305.
View | DOI | Download Submitted Version (ext.)
 
[14]
2016 | Conference Paper | IST-REx-ID: 1235 | OA
Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696, 445–463.
View | Files available | DOI | Download Submitted Version (ext.)
 
[13]
2016 | Conference Paper | IST-REx-ID: 1236 | OA
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610, 413–428.
View | Files available | DOI
 
[12]
2015 | Conference Paper | IST-REx-ID: 1474 | OA
Ferrara A, Fuchsbauer G, Liu B, Warinschi B. 2015. Policy privacy in cryptographic access control. CSF: Computer Security Foundations, 46–60.
View | DOI | Download Submitted Version (ext.)
 
[11]
2015 | Conference Paper | IST-REx-ID: 1646 | OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 9015, 31–60.
View | Files available | DOI
 
[10]
2015 | Conference Paper | IST-REx-ID: 1647 | OA
Fuchsbauer G, Hanser C, Slamanig D. 2015. Practical round-optimal blind signatures in the standard model. CRYPTO: International Cryptology Conference, LNCS, vol. 9216, 233–253.
View | Files available | DOI | Download Submitted Version (ext.)
 
[9]
2015 | Conference Paper | IST-REx-ID: 1648 | OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215, 601–620.
View | Files available | DOI
 
[8]
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. PKC: Public Key Crypography, LNCS, vol. 9020, 101–124.
View | DOI
 
[7]
2014 | Conference Paper | IST-REx-ID: 1927 | OA
Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. 2014. Adaptive security of constrained PRFs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8874, 173–192.
View | DOI | Download (ext.)
 
[6]
2014 | Conference Paper | IST-REx-ID: 2045 | OA
Dachman Soled D, Fuchsbauer G, Mohassel P, O’Neill A. 2014. Enhanced chosen-ciphertext security and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 329–344.
View | DOI | Download Submitted Version (ext.)
 
[5]
2014 | Conference Paper | IST-REx-ID: 2046 | OA
Bellare M, Fuchsbauer G. 2014. Policy-based signatures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383, 520–537.
View | DOI | Download Submitted Version (ext.)
 
[4]
2014 | Conference Paper | IST-REx-ID: 1643 | OA
Fuchsbauer G. 2014. Constrained Verifiable Random Functions . SCN 2014. SCN: Security and Cryptography for Networks, LNCS, vol. 8642, 95–114.
View | DOI | Download Submitted Version (ext.)
 
[3]
2013 | Conference Paper | IST-REx-ID: 2260 | OA
Bernhard D, Fuchsbauer G, Ghadafi E. 2013. Efficient signatures of knowledge and DAA in the standard model. 7954, 518–533.
View | DOI | Download Submitted Version (ext.)
 
[2]
2013 | Conference Paper | IST-REx-ID: 2291 | OA
Ferrara A, Fuchsbauer G, Warinschi B. 2013. Cryptographically enforced RBAC. CSF: Computer Security Foundations, 115–129.
View | DOI | Download Submitted Version (ext.)
 
[1]
2013 | Journal Article | IST-REx-ID: 502
Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D. 2013. Short blind signatures. Journal of Computer Security. 21(5), 627–661.
View | DOI
 

Search

Filter Publications