Institute of Theoretical Informatics


PhD Theses
Hartung, G. R.
Advanced Cryptographic Techniques for Protecting Log Data. PhD dissertation.
2020, March 12. Karlsruhe. doi:10.5445/IR/1000117650
Nagel, M.
Anonymous Point Collection - Improved Models and Security Definitions. PhD dissertation.
2020, October 22. KIT Scientific Publishing, Karlsruhe. doi:10.5445/KSP/1000117751
Journal Articles
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection.
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices.
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Conference Papers
Agrikola, T.; Couteau, G.; Hofheinz, D.
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO.
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer, Cham. doi:10.1007/978-3-030-45374-9_7
Agrikola, T.; Hofheinz, D.; Kastner, J.
On Instantiating the Algebraic Group Model from Falsifiable Assumptions.
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer, Cham. doi:10.1007/978-3-030-45724-2_4
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study.
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, ACM, New York (NY). doi:10.1145/3396851.3398320
Koch, A.; Walzer, S.
Foundations for actively secure card-based cryptography.
2020. 10th International Conference on Fun with Algorithms (FUN 2021). Ed.: M. Farach-Colton, Art.-Nr.: 17, Schloss Dagstuhl - Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.FUN.2021.17
Book Chapters
Achenbach, D.; Gröll, R.; Hackenjos, T.; Koch, A.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Rill, J.
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing, Cham. doi:10.1007/978-3-030-32101-7_16
Klooß, M.; Lehmann, A.; Rupp, A.
(R)CCA Secure Updatable Encryption with Integrity Protection.
2019. Advances in Cryptology – EUROCRYPT 2019 – 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I. Ed.: Y. Ishai, 68–99, Springer International Publishing, Cham. doi:10.1007/978-3-030-17653-2_3
PhD Theses
Journal Articles
Müller-Quade, J.; Beyerer, J.; Broadnax, B.
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation.
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Conference Papers
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik, Bonn
Hoffmann, M.; Klooß, M.; Rupp, A.
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited.
2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2093–2110, ACM, New York, NY. doi:10.1145/3319535.3354251
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification.
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer, Cham. doi:10.1007/978-3-030-34578-5_18
Tiepelt, M.; Szepieniec, A.
Quantum LLL with an application to mersenne number cryptosystems.
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer, Cham. doi:10.1007/978-3-030-30530-7_1
Book Chapters
Mechler, J.; Müller-Quade, J.; Nilges, T.
Reusing Tamper-Proof Hardware in UC-Secure Protocols.
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing, Cham. doi:10.1007/978-3-319-76578-5_16
Journal Articles
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware.
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Hackenjos, T.; Mechler, J.; Rill, J.
IT-Sicherheit - ein rechtsfreier Raum?.
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
On the (Im-)Possibility of Extending Coin Toss.
2018. Journal of cryptology, 31 (4), 1120–1163. doi:10.1007/s00145-018-9296-x
Conference Papers
Agrikola, T.; Hofheinz, D.
Interactively Secure Groups from Obfuscation.
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer, Cham. doi:10.1007/978-3-319-76581-5_12
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
Non-malleability vs. CCA-Security: The Case of Commitments.
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing, Cham. doi:10.1007/978-3-319-76581-5_11
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker.
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware.
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Journal Articles
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
Sicherheit relativ definieren.
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Dowsley, R.; Michalas, A.; Nagel, M.; Paladi, N.
A survey on design and implementation of protected searchable data in the cloud.
2017. Computer science review, 26, 17–30. doi:10.1016/j.cosrev.2017.08.001
Conference Papers
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
Towards Realising Oblivious Voting.
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer, Cham. doi:10.1007/978-3-319-67876-4_11
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
A Non-Invasive Cyberrisk in Cooperative Driving.
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Broadnax, B.; Döttling, N.; Hartung, G.; Müller-Quade, J.; Nagel, M.
Concurrently composable security with shielded super-polynomial simulators.
2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017; Paris; France; 30 April 2017 through 4 May 2017. Ed.: J. B. Nielsen, 351–381, Springer, Cham. doi:10.1007/978-3-319-56620-7_13
Gabel, M.; Mechler, J.
Secure Database Outsourcing to the Cloud : Side-Channels, Counter-Measures and Trusted Execution.
2017. Proceedings of the 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), Thessaloniki, Greece, 22nd - 24th June 2017, 799–804, IEEE, Piscataway (NJ). doi:10.1109/CBMS.2017.141
Hartung, G.
Attacks on Secure Logging Schemes.
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer, Cham. doi:10.1007/978-3-319-70972-7_14
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, ACM, New York. doi:10.1145/3133956.3134071
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures.
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer, Cham. doi:10.1007/978-3-319-68637-0_6
Herold, G.; Hoffmann, M.; Klooß, M.; Ràfols, C.; Rupp, A.
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs.
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1547–1564, ACM, New York. doi:10.1145/3133956.3134068
Kastner, J.; Koch, A.; Walzer, S.; Miyahara, D.; Hayashi, Y.- ichi; Mizuki, T.; Sone, H.
The Minimum Number of Cards in Practical Card-Based Protocols.
2017. Advances in Cryptology - ASIACRYPT 2017 : Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Part III, Hong Kong, China, 3rd - 7th December 2017. Ed.: T. Takagi, 126–155, Springer, Cham. doi:10.1007/978-3-319-70700-6_5
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction.
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer, Cham. doi:10.1007/978-3-319-61176-1_23
Papatheocharous, E.; Mantzouratos, S.; Gouvas, P.; Schiefer, G.; Schork, S. T.; Abdelraheem, M. A.; Mechler, J.; Gabel, M.; Moldovan, G.; Yurchenko, K.; Carnehult, T.
PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications - Technical and Scientific Contributions.
2017. European Space Projects: Developments, Implementations and Impacts in a Changing World (EPS), 2017, 3-27, Porto, Portugal. Vol.: 1, 3–27, SCITEPRESS. doi:10.5220/0007901500030027
Schiefer, G.; Gabel, M.; Mechler, J.; Schoknecht, A.; Citak, M.
Security in a Distributed Key Management Approach.
2017. Proceedings of the 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), Thessaloniki, Greece, 22nd - 24th June 2017, 816–821, IEEE, Piscataway (NJ). doi:10.1109/CBMS.2017.151
Conference Papers
Achenbach, D.; Huber, M.; Müller-Quade, J.; Rill, J.
Closing the Gap : A Universal Privacy Framework for Outsourced Data.
2016. 2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015, Koper, Slovenia, 3rd - 4th September 2015. Ed.: E. Pasalic, 134–151, Springer International Publishing, Cham. doi:10.1007/978-3-319-29172-7_9
Achenbach, D.; Löwe, B.; Müller-Quade, J.; Rill, J.
Oblivious Voting - Hiding Votes from the Voting Machine in Bingo Voting.
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SCITEPRESS, Setúbal. doi:10.5220/0005964300850096
Achenbach, D.; Müller-Quade, J.; Rill, J.
Synchronous Universally Composable Computer Networks.
2016. 2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015; Koper; Slovenia; 3 September 2015 through 4 September 2015. Ed.: E. Pasalic, 95–111, Springer International Publishing, Cham. doi:10.1007/978-3-319-29172-7_7
Broadnax, B.; Birnstill, P.; Müller-Quade, J.; Beyerer, J.
Eliciting and refining requirements for comprehensible security.
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verl., Stuttgart
Dörre, F.; Klebanov, V.
Practical Detection of Entropy Loss in Pseudo-Random Number Generators.
2016. CCS ’16 Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 678–689, ACM, New York (NY). doi:10.1145/2976749.2978369
Dörre, F.; Klebanov, V.
Pseudo-Random Number Generator Verification: A Case Study.
2016. Proceedings, Verified Software: Theories, Tools, and Experiments (VSTTE) : 7th International Conference, VSTTE 2015, San Francisco, CA, USA, July 18-19, 2015. Hrsg.: A. Gurfinkel, 61–72, Springer International Publishing, Cham. doi:10.1007/978-3-319-29613-5_4
Dowsley, R.; Gabel, M.; Hübsch, G.; Schiefer, G.; Schwichtenberg, A.
A Distributed Key Management Approach.
2016. IEEE International Conference on Cloud Computing Technology and Science (CloudCom), Luxembourg, Luxembourg, 12–15 December 2016, 509–514, IEEE, Piscataway (NJ). doi:10.1109/CloudCom.2016.0089
Fetzer, V.; Müller-Quade, J.; Nilges, T.
A Formal Treatment of Privacy in Video Data.
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing, Cham. doi:10.1007/978-3-319-45741-3_21
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, IEEE, Piscataway, NJ. doi:10.1109/EuroSP.2016.35
Hartung, G.
Secure Audit Logs with Verifiable Excerpts.
2016. Topics in Cryptology - CT-RSA 2016 : The Cryptographers’ Track at the RSA Conference 2016, San Francisco, California, USA, 29th February - 4th March 2016. Ed.: K. Sako, 183–199, Springer International Publishing, Switzerland. doi:10.1007/978-3-319-29485-8_11
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Rupp, A.
Fault-Tolerant Aggregate Signatures.
2016. 19th IACR International Conference on Practice and Theory in Public-Key Cryptography, PKC 2016; Taipei; Taiwan; 6 March 2016 through 9 March 2016. Ed.: C.-M. Cheng, 331–356, Springer-Verlag, Berlin / Heidelberg. doi:10.1007/978-3-662-49384-7_13
Book Chapters
Müller-Quade, J.
KASTEL: Informationssicherheit Recht Machen.
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 49–61, KIT Scientific Publishing, Karlsruhe
Journal Articles
Müller-Quade, J.; Huber, M.; Nilges, T.
Daten verschlüsselt speichern und verarbeiten in der Cloud.
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Tonicelli, R.; Nascimento, A. C. A.; Dowsley, R.; Müller-Quade, J.; Imai, H.; Hanaoka, G.; Otsuka, A.
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8