Publications


2022
Agrikola, T.; Couteau, G.; Maier, S.
Anonymous Whistleblowing over Authenticated Channels
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part II. Ed.: E. Kiltz, 685–714, Springer Nature Switzerland AG. doi:10.1007/978-3-031-22365-5_24
Attema, T.; Fehr, S.; Klooß, M.
Fiat-Shamir Transformation of Multi-round Interactive Proofs
2022. Theory of Cryptography – 20th International Conference, TCC 2022, Chicago, IL, USA, November 7–10, 2022, Proceedings, Part I. Ed.: E. Kiltz, 113–142, Springer Nature Switzerland AG. doi:10.1007/978-3-031-22318-1_5
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Recent Developments in the Context of Online Elections and Digital Polls in Germany
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI)
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
Couteau, G.; Goudarzi, D.; Klooß, M.; Reichle, M.
Sharp: Short Relaxed Range Proofs
2022. CCS ’22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. Ed.: H. Yin Conference: CCS ’22: 2022 ACM SIGSAC Conference on Computer and Communications Security Los Angeles CA USA November 7 - 11, 2022, 609–622, Association for Computing Machinery (ACM). doi:10.1145/3548606.3560628
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
Maier, S.
On Security Notions for Multi-Party Computation. PhD dissertation
2022, November 4. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000151951
Marquardt, K.; Happe, L.; Koch, A.; Wagner, I.
IT Mission: Interdisziplinäre Online Expeditionen
2022, July 12. easeCorona (2022), Würzburg, Germany, July 11–12, 2022
2021
Agrikola, T.
On Foundations of Protecting Computations. PhD dissertation
2021, June 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
2021. doi:10.5445/IR/1000137300
Berger, R. M.; Tiepelt, M.
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer Verlag. doi:10.1007/978-3-030-92075-3_23
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
Side-Channel Attacks on Query-Based Data Anonymization
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Broadnax, B.; Mechler, J.; Müller-Quade, J.
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
Ernst, J.; Koch, A.
Private Stream Aggregation with Labels in the Standard Model
2021. Proceedings on Privacy Enhancing Technologies, 2021 (4), 117–138. doi:10.2478/popets-2021-0063
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
Black-Box Accumulation Based on Lattices
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Klooß, M.
On Expected Polynomial Runtime in Cryptography
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, M.; Schmitt, C.; Rodosek, G. D.
A Secure Cell-Attachment Procedure of LDACS
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021
2020
Agrikola, T.; Couteau, G.; Hofheinz, D.
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. doi:10.5445/IR/1000129644
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Agrikola, T.; Hofheinz, D.; Kastner, J.
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Dowsley, R.; Müller-Quade, J.; Nascimento, A. C. A.
On the Composability of Statistically Secure Random Oblivious Transfer
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Hartung, G. R.
Advanced Cryptographic Techniques for Protecting Log Data. PhD dissertation
2020, March 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Koch, A.; Walzer, S.
Foundations for actively secure card-based cryptography
2020. 10th International Conference on Fun with Algorithms (FUN 2021). Ed.: M. Farach-Colton, Art.-Nr.: 17, Schloss Dagstuhl - Leibniz-Zentrum für Informatik GmbH (LZI). doi:10.4230/LIPIcs.FUN.2021.17
Nagel, M.
Anonymous Point Collection - Improved Models and Security Definitions. PhD dissertation
2020, October 22. KIT Scientific Publishing. doi:10.5445/KSP/1000117751
Rill, J.
Towards Applying Cryptographic Security Models to Real-World Systems. PhD dissertation
2020, April 27. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000118648
2019
Achenbach, D.; Gröll, R.; Hackenjos, T.; Koch, A.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Rill, J.
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Broadnax, B.
New Frameworks for Concurrently Composable Multi-Party Computation. PhD dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000091915
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
Hoffmann, M.; Klooß, M.; Rupp, A.
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2093–2110, Association for Computing Machinery (ACM). doi:10.1145/3319535.3354251
Klooß, M.; Lehmann, A.; Rupp, A.
(R)CCA Secure Updatable Encryption with Integrity Protection
2019. Advances in Cryptology – EUROCRYPT 2019 – 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I. Ed.: Y. Ishai, 68–99, Springer International Publishing. doi:10.1007/978-3-030-17653-2_3
Koch, A.
Cryptographic Protocols from Physical Assumptions. PhD dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
Müller-Quade, J.; Beyerer, J.; Broadnax, B.
Editorial
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Tiepelt, M.; Szepieniec, A.
Quantum LLL with an application to mersenne number cryptosystems
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
2018
Agrikola, T.; Hofheinz, D.
Interactively Secure Groups from Obfuscation
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
Non-malleability vs. CCA-Security: The Case of Commitments
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Hackenjos, T.; Mechler, J.; Rill, J.
IT-Sicherheit - ein rechtsfreier Raum?
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
On the (Im-)Possibility of Extending Coin Toss
2018. Journal of cryptology, 31 (4), 1120–1163. doi:10.1007/s00145-018-9296-x
Mechler, J.; Müller-Quade, J.; Nilges, T.
Reusing Tamper-Proof Hardware in UC-Secure Protocols
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16