20 Publications

Mark all

[20]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. 2019. Adaptively secure proxy re-encryption. PKC: Public-Key Cryptograhy, LNCS, vol. 11443. 317–346.
View | DOI
 
[19]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park S, Kwon A, Fuchsbauer G, Gazi P, Alwen JF, Pietrzak KZ. 2018. SpaceMint: A cryptocurrency based on proofs of space. 22nd International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 10957. 480–499.
View | DOI | Download (ext.)
 
[18]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696. 285–303.
View | Files available | DOI
 
[17]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610. 413–428.
View | Files available | DOI
 
[16]
2016 | Journal Article | IST-REx-ID: 1592
Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M. 2016. Structure preserving signatures and commitments to group elements. Journal of Cryptology. 29(2), 363–421.
View | DOI
 
[15]
2016 | Conference Paper | IST-REx-ID: 1225
Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. 2016. Practical round-optimal blind signatures in the standard model from weaker assumptions. SCN: Security and Cryptography for Networks, LNCS, vol. 9841. 391–408.
View | Files available | DOI | Download (ext.)
 
[14]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. 2016. Standard security does imply security against selective opening for markov distributions. TCC: Theory of Cryptography Conference, LNCS, vol. 9562. 282–305.
View | DOI | Download (ext.)
 
[13]
2016 | Conference Paper | IST-REx-ID: 1235
Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696. 445–463.
View | Files available | DOI | Download (ext.)
 
[12]
2015 | Conference Paper | IST-REx-ID: 1647   OA
Fuchsbauer G, Hanser C, Slamanig D. 2015. Practical round-optimal blind signatures in the standard model. CRYPTO: International Cryptology Conference, LNCS, vol. 9216. 233–253.
View | Files available | DOI | Download (ext.)
 
[11]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215. 601–620.
View | Files available | DOI
 
[10]
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. PKC: Public Key Crypography, LNCS, vol. 9020. 101–124.
View | DOI
 
[9]
2015 | Conference Paper | IST-REx-ID: 1474   OA
Ferrara A, Fuchsbauer G, Liu B, Warinschi B. 2015. Policy privacy in cryptographic access control. CSF: Computer Security Foundations 46–60.
View | DOI | Download (ext.)
 
[8]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 9015, 31–60.
View | Files available | DOI
 
[7]
2014 | Conference Paper | IST-REx-ID: 1643   OA
Fuchsbauer G. 2014. Constrained Verifiable Random Functions . SCN 2014. SCN: Security and Cryptography for Networks, LNCS, vol. 8642. 95–114.
View | DOI | Download (ext.)
 
[6]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. 2014. Adaptive security of constrained PRFs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8874. 173–192.
View | DOI | Download (ext.)
 
[5]
2014 | Conference Paper | IST-REx-ID: 2045   OA
Dachman Soled D, Fuchsbauer G, Mohassel P, O’Neill A. 2014. Enhanced chosen-ciphertext security and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383. 329–344.
View | DOI | Download (ext.)
 
[4]
2014 | Conference Paper | IST-REx-ID: 2046   OA
Bellare M, Fuchsbauer G. 2014. Policy-based signatures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383. 520–537.
View | DOI | Download (ext.)
 
[3]
2013 | Conference Paper | IST-REx-ID: 2291   OA
Ferrara A, Fuchsbauer G, Warinschi B. 2013. Cryptographically enforced RBAC. CSF: Computer Security Foundations 115–129.
View | DOI | Download (ext.)
 
[2]
2013 | Conference Paper | IST-REx-ID: 2260   OA
Bernhard D, Fuchsbauer G, Ghadafi E. 2013. Efficient signatures of knowledge and DAA in the standard model. 7954, 518–533.
View | DOI | Download (ext.)
 
[1]
2013 | Journal Article | IST-REx-ID: 502
Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D. 2013. Short blind signatures. Journal of Computer Security. 21(5), 627–661.
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: IST Annual Report

Export / Embed

20 Publications

Mark all

[20]
2019 | Conference Paper | IST-REx-ID: 6430
Fuchsbauer G, Kamath Hosdurg C, Klein K, Pietrzak KZ. 2019. Adaptively secure proxy re-encryption. PKC: Public-Key Cryptograhy, LNCS, vol. 11443. 317–346.
View | DOI
 
[19]
2018 | Conference Paper | IST-REx-ID: 6941   OA
Park S, Kwon A, Fuchsbauer G, Gazi P, Alwen JF, Pietrzak KZ. 2018. SpaceMint: A cryptocurrency based on proofs of space. 22nd International Conference on Financial Cryptography and Data Security. FC: Financial Cryptography and Data Security, LNCS, vol. 10957. 480–499.
View | DOI | Download (ext.)
 
[18]
2016 | Conference Paper | IST-REx-ID: 1229
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Offline witness encryption. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696. 285–303.
View | Files available | DOI
 
[17]
2016 | Conference Paper | IST-REx-ID: 1236
Abusalah HM, Fuchsbauer G, Pietrzak KZ. 2016. Constrained PRFs for unbounded inputs. CT-RSA: Topics in Cryptology, LNCS, vol. 9610. 413–428.
View | Files available | DOI
 
[16]
2016 | Journal Article | IST-REx-ID: 1592
Abe M, Fuchsbauer G, Groth J, Haralambiev K, Ohkubo M. 2016. Structure preserving signatures and commitments to group elements. Journal of Cryptology. 29(2), 363–421.
View | DOI
 
[15]
2016 | Conference Paper | IST-REx-ID: 1225
Fuchsbauer G, Hanser C, Kamath Hosdurg C, Slamanig D. 2016. Practical round-optimal blind signatures in the standard model from weaker assumptions. SCN: Security and Cryptography for Networks, LNCS, vol. 9841. 391–408.
View | Files available | DOI | Download (ext.)
 
[14]
2016 | Conference Paper | IST-REx-ID: 1233   OA
Fuchsbauer G, Heuer F, Kiltz E, Pietrzak KZ. 2016. Standard security does imply security against selective opening for markov distributions. TCC: Theory of Cryptography Conference, LNCS, vol. 9562. 282–305.
View | DOI | Download (ext.)
 
[13]
2016 | Conference Paper | IST-REx-ID: 1235
Abusalah HM, Fuchsbauer G. 2016. Constrained PRFs for unbounded inputs with short keys. ACNS: Applied Cryptography and Network Security, LNCS, vol. 9696. 445–463.
View | Files available | DOI | Download (ext.)
 
[12]
2015 | Conference Paper | IST-REx-ID: 1647   OA
Fuchsbauer G, Hanser C, Slamanig D. 2015. Practical round-optimal blind signatures in the standard model. CRYPTO: International Cryptology Conference, LNCS, vol. 9216. 233–253.
View | Files available | DOI | Download (ext.)
 
[11]
2015 | Conference Paper | IST-REx-ID: 1648   OA
Fuchsbauer G, Jafargholi Z, Pietrzak KZ. 2015. A quasipolynomial reduction for generalized selective decryption on trees. CRYPTO: International Cryptology Conference, LNCS, vol. 9215. 601–620.
View | Files available | DOI
 
[10]
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi F, Chase M, Fuchsbauer G, Kohlweiss M. 2015. Anonymous transferable e-cash. PKC: Public Key Crypography, LNCS, vol. 9020. 101–124.
View | DOI
 
[9]
2015 | Conference Paper | IST-REx-ID: 1474   OA
Ferrara A, Fuchsbauer G, Liu B, Warinschi B. 2015. Policy privacy in cryptographic access control. CSF: Computer Security Foundations 46–60.
View | DOI | Download (ext.)
 
[8]
2015 | Conference Paper | IST-REx-ID: 1646   OA
Banerjee A, Fuchsbauer G, Peikert C, Pietrzak KZ, Stevens S. 2015. Key-homomorphic constrained pseudorandom functions. 9015, 31–60.
View | Files available | DOI
 
[7]
2014 | Conference Paper | IST-REx-ID: 1643   OA
Fuchsbauer G. 2014. Constrained Verifiable Random Functions . SCN 2014. SCN: Security and Cryptography for Networks, LNCS, vol. 8642. 95–114.
View | DOI | Download (ext.)
 
[6]
2014 | Conference Paper | IST-REx-ID: 1927   OA
Fuchsbauer G, Konstantinov M, Pietrzak KZ, Rao V. 2014. Adaptive security of constrained PRFs. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) vol. 8874. 173–192.
View | DOI | Download (ext.)
 
[5]
2014 | Conference Paper | IST-REx-ID: 2045   OA
Dachman Soled D, Fuchsbauer G, Mohassel P, O’Neill A. 2014. Enhanced chosen-ciphertext security and applications. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383. 329–344.
View | DOI | Download (ext.)
 
[4]
2014 | Conference Paper | IST-REx-ID: 2046   OA
Bellare M, Fuchsbauer G. 2014. Policy-based signatures. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). PKC: Public Key Crypography, LNCS, vol. 8383. 520–537.
View | DOI | Download (ext.)
 
[3]
2013 | Conference Paper | IST-REx-ID: 2291   OA
Ferrara A, Fuchsbauer G, Warinschi B. 2013. Cryptographically enforced RBAC. CSF: Computer Security Foundations 115–129.
View | DOI | Download (ext.)
 
[2]
2013 | Conference Paper | IST-REx-ID: 2260   OA
Bernhard D, Fuchsbauer G, Ghadafi E. 2013. Efficient signatures of knowledge and DAA in the standard model. 7954, 518–533.
View | DOI | Download (ext.)
 
[1]
2013 | Journal Article | IST-REx-ID: 502
Blazy O, Fuchsbauer G, Pointcheval D, Vergnaud D. 2013. Short blind signatures. Journal of Computer Security. 21(5), 627–661.
View | DOI
 

Search

Filter Publications

Display / Sort

Citation Style: IST Annual Report

Export / Embed