Georg Fuchsbauer
Pietrzak Group
20 Publications
2019 | Conference Paper | IST-REx-ID: 6430 |

Fuchsbauer, Georg, et al. Adaptively Secure Proxy Re-Encryption. Vol. 11443, Springer Nature, 2019, pp. 317–46, doi:10.1007/978-3-030-17259-6_11.
View
| DOI
| Download Preprint (ext.)
2018 | Conference Paper | IST-REx-ID: 6941 |

Park, Sunoo, et al. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” 22nd International Conference on Financial Cryptography and Data Security, vol. 10957, Springer Nature, 2018, pp. 480–99, doi:10.1007/978-3-662-58387-6_26.
View
| DOI
| Download Submitted Version (ext.)
2016 | Journal Article | IST-REx-ID: 1592
Abe, Masayuki, et al. “Structure Preserving Signatures and Commitments to Group Elements.” Journal of Cryptology, vol. 29, no. 2, Springer, 2016, pp. 363–421, doi:10.1007/s00145-014-9196-7.
View
| DOI
2016 | Conference Paper | IST-REx-ID: 1225 |

Fuchsbauer, Georg, et al. Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. Vol. 9841, Springer, 2016, pp. 391–408, doi:10.1007/978-3-319-44618-9_21.
View
| Files available
| DOI
| Download Submitted Version (ext.)
2016 | Conference Paper | IST-REx-ID: 1229 |

Abusalah, Hamza M., et al. Offline Witness Encryption. Vol. 9696, Springer, 2016, pp. 285–303, doi:10.1007/978-3-319-39555-5_16.
View
| Files available
| DOI
2016 | Conference Paper | IST-REx-ID: 1233 |

Fuchsbauer, Georg, et al. Standard Security Does Imply Security against Selective Opening for Markov Distributions. Vol. 9562, Springer, 2016, pp. 282–305, doi:10.1007/978-3-662-49096-9_12.
View
| DOI
| Download Submitted Version (ext.)
2016 | Conference Paper | IST-REx-ID: 1235 |

Abusalah, Hamza M., and Georg Fuchsbauer. Constrained PRFs for Unbounded Inputs with Short Keys. Vol. 9696, Springer, 2016, pp. 445–63, doi:10.1007/978-3-319-39555-5_24.
View
| Files available
| DOI
| Download Submitted Version (ext.)
2016 | Conference Paper | IST-REx-ID: 1236 |

Abusalah, Hamza M., et al. Constrained PRFs for Unbounded Inputs. Vol. 9610, Springer, 2016, pp. 413–28, doi:10.1007/978-3-319-29485-8_24.
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1474 |

Ferrara, Anna, et al. Policy Privacy in Cryptographic Access Control. IEEE, 2015, pp. 46–60, doi:10.1109/CSF.2015.11.
View
| DOI
| Download Submitted Version (ext.)
2015 | Conference Paper | IST-REx-ID: 1646 |

Banerjee, Abishek, et al. Key-Homomorphic Constrained Pseudorandom Functions. Vol. 9015, Springer, 2015, pp. 31–60, doi:10.1007/978-3-662-46497-7_2.
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1647 |

Fuchsbauer, Georg, et al. Practical Round-Optimal Blind Signatures in the Standard Model. Vol. 9216, Springer, 2015, pp. 233–53, doi:10.1007/978-3-662-48000-7_12.
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 | Conference Paper | IST-REx-ID: 1648 |

Fuchsbauer, Georg, et al. A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. Vol. 9215, Springer, 2015, pp. 601–20, doi:10.1007/978-3-662-47989-6_29.
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi, Foteini, et al. Anonymous Transferable E-Cash. Vol. 9020, Springer, 2015, pp. 101–24, doi:10.1007/978-3-662-46447-2_5.
View
| DOI
2014 | Conference Paper | IST-REx-ID: 1927 |

Fuchsbauer, Georg, et al. Adaptive Security of Constrained PRFs. Vol. 8874, Springer, 2014, pp. 173–92, doi:10.1145/2591796.2591825.
View
| DOI
| Download (ext.)
2014 | Conference Paper | IST-REx-ID: 2045 |

Dachman Soled, Dana, et al. “Enhanced Chosen-Ciphertext Security and Applications.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, vol. 8383, Springer, 2014, pp. 329–44, doi:10.1007/978-3-642-54631-0_19.
View
| DOI
| Download Submitted Version (ext.)
2014 | Conference Paper | IST-REx-ID: 2046 |

Bellare, Mihir, and Georg Fuchsbauer. “Policy-Based Signatures.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, vol. 8383, Springer, 2014, pp. 520–37, doi:10.1007/978-3-642-54631-0_30.
View
| DOI
| Download Submitted Version (ext.)
2014 | Conference Paper | IST-REx-ID: 1643 |

Fuchsbauer, Georg. “Constrained Verifiable Random Functions .” SCN 2014, edited by Michel Abdalla and Roberto De Prisco, vol. 8642, Springer, 2014, pp. 95–114, doi:10.1007/978-3-319-10879-7_7.
View
| DOI
| Download Submitted Version (ext.)
2013 | Conference Paper | IST-REx-ID: 2260 |

Bernhard, David, et al. Efficient Signatures of Knowledge and DAA in the Standard Model. Vol. 7954, Springer, 2013, pp. 518–33, doi:10.1007/978-3-642-38980-1_33.
View
| DOI
| Download Submitted Version (ext.)
2013 | Conference Paper | IST-REx-ID: 2291 |

Ferrara, Anna, et al. Cryptographically Enforced RBAC. IEEE, 2013, pp. 115–29, doi:10.1109/CSF.2013.15.
View
| DOI
| Download Submitted Version (ext.)
2013 | Journal Article | IST-REx-ID: 502
Blazy, Olivier, et al. “Short Blind Signatures.” Journal of Computer Security, vol. 21, no. 5, IOS Press, 2013, pp. 627–61, doi:10.3233/JCS-130477.
View
| DOI
20 Publications
2019 | Conference Paper | IST-REx-ID: 6430 |

Fuchsbauer, Georg, et al. Adaptively Secure Proxy Re-Encryption. Vol. 11443, Springer Nature, 2019, pp. 317–46, doi:10.1007/978-3-030-17259-6_11.
View
| DOI
| Download Preprint (ext.)
2018 | Conference Paper | IST-REx-ID: 6941 |

Park, Sunoo, et al. “SpaceMint: A Cryptocurrency Based on Proofs of Space.” 22nd International Conference on Financial Cryptography and Data Security, vol. 10957, Springer Nature, 2018, pp. 480–99, doi:10.1007/978-3-662-58387-6_26.
View
| DOI
| Download Submitted Version (ext.)
2016 | Journal Article | IST-REx-ID: 1592
Abe, Masayuki, et al. “Structure Preserving Signatures and Commitments to Group Elements.” Journal of Cryptology, vol. 29, no. 2, Springer, 2016, pp. 363–421, doi:10.1007/s00145-014-9196-7.
View
| DOI
2016 | Conference Paper | IST-REx-ID: 1225 |

Fuchsbauer, Georg, et al. Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions. Vol. 9841, Springer, 2016, pp. 391–408, doi:10.1007/978-3-319-44618-9_21.
View
| Files available
| DOI
| Download Submitted Version (ext.)
2016 | Conference Paper | IST-REx-ID: 1229 |

Abusalah, Hamza M., et al. Offline Witness Encryption. Vol. 9696, Springer, 2016, pp. 285–303, doi:10.1007/978-3-319-39555-5_16.
View
| Files available
| DOI
2016 | Conference Paper | IST-REx-ID: 1233 |

Fuchsbauer, Georg, et al. Standard Security Does Imply Security against Selective Opening for Markov Distributions. Vol. 9562, Springer, 2016, pp. 282–305, doi:10.1007/978-3-662-49096-9_12.
View
| DOI
| Download Submitted Version (ext.)
2016 | Conference Paper | IST-REx-ID: 1235 |

Abusalah, Hamza M., and Georg Fuchsbauer. Constrained PRFs for Unbounded Inputs with Short Keys. Vol. 9696, Springer, 2016, pp. 445–63, doi:10.1007/978-3-319-39555-5_24.
View
| Files available
| DOI
| Download Submitted Version (ext.)
2016 | Conference Paper | IST-REx-ID: 1236 |

Abusalah, Hamza M., et al. Constrained PRFs for Unbounded Inputs. Vol. 9610, Springer, 2016, pp. 413–28, doi:10.1007/978-3-319-29485-8_24.
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1474 |

Ferrara, Anna, et al. Policy Privacy in Cryptographic Access Control. IEEE, 2015, pp. 46–60, doi:10.1109/CSF.2015.11.
View
| DOI
| Download Submitted Version (ext.)
2015 | Conference Paper | IST-REx-ID: 1646 |

Banerjee, Abishek, et al. Key-Homomorphic Constrained Pseudorandom Functions. Vol. 9015, Springer, 2015, pp. 31–60, doi:10.1007/978-3-662-46497-7_2.
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1647 |

Fuchsbauer, Georg, et al. Practical Round-Optimal Blind Signatures in the Standard Model. Vol. 9216, Springer, 2015, pp. 233–53, doi:10.1007/978-3-662-48000-7_12.
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 | Conference Paper | IST-REx-ID: 1648 |

Fuchsbauer, Georg, et al. A Quasipolynomial Reduction for Generalized Selective Decryption on Trees. Vol. 9215, Springer, 2015, pp. 601–20, doi:10.1007/978-3-662-47989-6_29.
View
| Files available
| DOI
2015 | Conference Paper | IST-REx-ID: 1651
Baldimtsi, Foteini, et al. Anonymous Transferable E-Cash. Vol. 9020, Springer, 2015, pp. 101–24, doi:10.1007/978-3-662-46447-2_5.
View
| DOI
2014 | Conference Paper | IST-REx-ID: 1927 |

Fuchsbauer, Georg, et al. Adaptive Security of Constrained PRFs. Vol. 8874, Springer, 2014, pp. 173–92, doi:10.1145/2591796.2591825.
View
| DOI
| Download (ext.)
2014 | Conference Paper | IST-REx-ID: 2045 |

Dachman Soled, Dana, et al. “Enhanced Chosen-Ciphertext Security and Applications.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, vol. 8383, Springer, 2014, pp. 329–44, doi:10.1007/978-3-642-54631-0_19.
View
| DOI
| Download Submitted Version (ext.)
2014 | Conference Paper | IST-REx-ID: 2046 |

Bellare, Mihir, and Georg Fuchsbauer. “Policy-Based Signatures.” Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), edited by Hugo Krawczyk, vol. 8383, Springer, 2014, pp. 520–37, doi:10.1007/978-3-642-54631-0_30.
View
| DOI
| Download Submitted Version (ext.)
2014 | Conference Paper | IST-REx-ID: 1643 |

Fuchsbauer, Georg. “Constrained Verifiable Random Functions .” SCN 2014, edited by Michel Abdalla and Roberto De Prisco, vol. 8642, Springer, 2014, pp. 95–114, doi:10.1007/978-3-319-10879-7_7.
View
| DOI
| Download Submitted Version (ext.)
2013 | Conference Paper | IST-REx-ID: 2260 |

Bernhard, David, et al. Efficient Signatures of Knowledge and DAA in the Standard Model. Vol. 7954, Springer, 2013, pp. 518–33, doi:10.1007/978-3-642-38980-1_33.
View
| DOI
| Download Submitted Version (ext.)
2013 | Conference Paper | IST-REx-ID: 2291 |

Ferrara, Anna, et al. Cryptographically Enforced RBAC. IEEE, 2013, pp. 115–29, doi:10.1109/CSF.2013.15.
View
| DOI
| Download Submitted Version (ext.)
2013 | Journal Article | IST-REx-ID: 502
Blazy, Olivier, et al. “Short Blind Signatures.” Journal of Computer Security, vol. 21, no. 5, IOS Press, 2013, pp. 627–61, doi:10.3233/JCS-130477.
View
| DOI