Publications


2022
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Recent Developments in the Context of Online Elections and Digital Polls in Germany [in press]
2022. Fachtagung Sicherheit 2022
Beskorovajnov, W.; Gröll, R.; Müller-Quade, J.; Ottenhues, A.; Schwerdt, R.
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
Fetzer, V.; Keller, M.; Maier, S.; Raiber, M.; Rupp, A.; Schwerdt, R.
PUBA: Privacy-Preserving User-Data Bookkeeping and Analytics
2022. Proceedings on Privacy Enhancing Technologies, 2022 (2), 447–516. doi:10.2478/popets-2022-0054
2021
Agrikola, T.
On Foundations of Protecting Computations. PhD dissertation
2021, June 17. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000133798
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
2021. doi:10.5445/IR/1000137300
Berger, R. M.; Tiepelt, M.
On Forging SPHINCS-Haraka Signatures on a Fault-Tolerant Quantum Computer
2021. Progress in Cryptology – LATINCRYPT 2021 – 7th International Conference on Cryptology and Information Security in Latin America, Bogotá, Colombia, October 6–8, 2021, Proceedings. Ed.: P. Longa, 44–63, Springer International Publishing. doi:10.1007/978-3-030-88238-9_3
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer Verlag. doi:10.1007/978-3-030-92075-3_23
Beskorovajnov, W.; Dörre, F.; Hartung, G.; Koch, A.; Müller-Quade, J.; Strufe, T.
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714
Boenisch, F.; Munz, R.; Tiepelt, M.; Hanisch, S.; Kuhn, C.; Francis, P.
Side-Channel Attacks on Query-Based Data Anonymization
2021. CCS ’21: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security, November 2021, 1254–1265, Association for Computing Machinery (ACM). doi:10.1145/3460120.3484751
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Broadnax, B.; Mechler, J.; Müller-Quade, J.
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Couteau, G.; Klooß, M.; Lin, H.; Reichle, M.
Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments
2021. Advances in Cryptology – EUROCRYPT 2021. Ed.: A. Canteaut, 247–277, Springer International Publishing. doi:10.1007/978-3-030-77883-5_9
Faller, S. H.; Baumer, P.; Klooß, M.; Koch, A.; Ottenhues, A.; Raiber, M.
Black-Box Accumulation Based on Lattices
2021. Cryptography and Coding : 18th IMA International Conference, IMACC 2021, Virtual Event, December 14–15, 2021, Proceedings. Ed.: M. B. Paterson, 220–246, Springer. doi:10.1007/978-3-030-92641-0_11
Klooß, M.
On Expected Polynomial Runtime in Cryptography
2021. Theory of Cryptography : 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 558–590, Springer International Publishing. doi:10.1007/978-3-030-90459-3_19
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2021. New generation computing, 39, 115–158. doi:10.1007/s00354-020-00120-0
Maurer, N.; Graupl, T.; Gentsch, C.; Guggemos, T.; Tiepelt, M.; Schmitt, C.; Rodosek, G. D.
A Secure Cell-Attachment Procedure of LDACS
2021. Proceedings 2021 IEEE European Symposium on Security and Privacy Workshops, EuroS&PW 2021: Virtual Conference, 6-10 September 2021, 113–122, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSPW54576.2021.00019
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021. 3rd IEEE International Conference on Blockchain Computing and Applications (BCCA), Tartu, EST, November 15-16, 2021, 127–134, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/BCCA53669.2021.9657019
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021
2020
Agrikola, T.; Couteau, G.; Hofheinz, D.
The Usefulness of Sparsifiable Inputs: How to Avoid Subexponential iO
2020. Public-Key Cryptography - PKC 2020 - 23rd IACR International Conference on Practice and Theory of Public-Key Cryptography, Edinburgh, UK, May 4-7, 2020, Proceedings, Part I Hrsg.: Kiayias, Aggelos; Kohlweiss, Markulf; Wallden, Petros; Zikas, Vassilis, 187–219, Springer. doi:10.1007/978-3-030-45374-9_7
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. doi:10.5445/IR/1000129644
Agrikola, T.; Couteau, G.; Ishai, Y.; Jarecki, S.; Sahai, A.
On Pseudorandom Encodings
2020. Theory of Cryptography – 18th International Conference, TCC 2020, Durham, NC, USA, November 16–19, 2020, Proceedings, Part III. Ed.: R. Pass, 639–669, Springer International Publishing. doi:10.1007/978-3-030-64381-2_23
Agrikola, T.; Hofheinz, D.; Kastner, J.
On Instantiating the Algebraic Group Model from Falsifiable Assumptions
2020. Advances in cryptology - EUROCRYPT 2020 : 39th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, May 10-14, 2020 : proceedings. Part 2., 96–126, Springer. doi:10.1007/978-3-030-45724-2_4
Arzamasov, V.; Schwerdt, R.; Karrari, S.; Böhm, K.; Nguyen, T. B.
Privacy Measures and Storage Technologies for Battery-Based Load Hiding - an Overview and Experimental Study
2020. e-Energy ’20: Proceedings of the Eleventh ACM International Conference on Future Energy Systems, Melbourne, Australia, 22 - 26 June 2020, 178–195, Association for Computing Machinery (ACM). doi:10.1145/3396851.3398320
Dowsley, R.; Müller-Quade, J.; Nascimento, A. C. A.
On the Composability of Statistically Secure Random Oblivious Transfer
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
Fetzer, V.; Hoffmann, M.; Nagel, M.; Rupp, A.; Schwerdt, R.
P4TC - Provably-Secure yet Practical Privacy-Preserving Toll Collection
2020. Proceedings on privacy enhancing technologies, 2020 (3), 62–152. doi:10.2478/popets-2020-0046
Hartung, G. R.
Advanced Cryptographic Techniques for Protecting Log Data. PhD dissertation
2020, March 12. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000117650
Hoffmann, M.; Klooß, M.; Raiber, M.; Rupp, A.
Black-Box Wallets: Fast Anonymous Two-Way Payments for Constrained Devices
2020. Proceedings on privacy enhancing technologies, 2020 (1), 165–194. doi:10.2478/popets-2020-0010
Koch, A.; Walzer, S.
Foundations for actively secure card-based cryptography
2020. 10th International Conference on Fun with Algorithms (FUN 2021). Ed.: M. Farach-Colton, Art.-Nr.: 17, Schloss Dagstuhl - Leibniz-Zentrum für Informatik GmbH (LZI). doi:10.4230/LIPIcs.FUN.2021.17
Nagel, M.
Anonymous Point Collection - Improved Models and Security Definitions. PhD dissertation
2020, October 22. KIT Scientific Publishing. doi:10.5445/KSP/1000117751
Rill, J.
Towards Applying Cryptographic Security Models to Real-World Systems. PhD dissertation
2020, April 27. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000118648
2019
Achenbach, D.; Gröll, R.; Hackenjos, T.; Koch, A.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Rill, J.
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik e.V.  (GI)
Broadnax, B.
New Frameworks for Concurrently Composable Multi-Party Computation. PhD dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000091915
D’Anvers, J.-P.; Tiepelt, M.; Vercauteren, F.; Verbauwhede, I.
Timing Attacks on Error Correcting Codes in Post-Quantum Schemes
2019. Proceedings of 3rd ACM Workshop on Theory of Implementation Security Workshop - TIS’19, 2–9, Association for Computing Machinery (ACM). doi:10.1145/3338467.3358948
Hoffmann, M.; Klooß, M.; Rupp, A.
Efficient Zero-Knowledge Arguments in the Discrete Log Setting, Revisited
2019. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2093–2110, Association for Computing Machinery (ACM). doi:10.1145/3319535.3354251
Klooß, M.; Lehmann, A.; Rupp, A.
(R)CCA Secure Updatable Encryption with Integrity Protection
2019. Advances in Cryptology – EUROCRYPT 2019 – 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I. Ed.: Y. Ishai, 68–99, Springer International Publishing. doi:10.1007/978-3-030-17653-2_3
Koch, A.
Cryptographic Protocols from Physical Assumptions. PhD dissertation
2019. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000097756
Koch, A.; Schrempp, M.; Kirsten, M.
Card-Based Cryptography Meets Formal Verification
2019. Advances in Cryptology – ASIACRYPT 2019 : 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings. Part I. Ed.: S.D. Galbraith, 488–517, Springer. doi:10.1007/978-3-030-34578-5_18
Müller-Quade, J.; Beyerer, J.; Broadnax, B.
Editorial
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Schwerdt, R.; Nagel, M.; Fetzer, V.; Gräf, T.; Rupp, A.
P6V2G: A Privacy-preserving V2G Scheme for Two-way Payments and Reputation
2019. Energy informatics, 2 (S1), Article number: 32. doi:10.1186/s42162-019-0075-1
Tiepelt, M.; Szepieniec, A.
Quantum LLL with an application to mersenne number cryptosystems
2019. Progress in Cryptology – LATINCRYPT 2019: 6th International Conference on Cryptology and Information Security in Latin America, Santiago de Chile, Chile, October 2–4, 2019, Proceedings. Ed.: P. Schwabe, 3–23, Springer. doi:10.1007/978-3-030-30530-7_1
2018
Agrikola, T.; Hofheinz, D.
Interactively Secure Groups from Obfuscation
2018. Public-Key Cryptography – PKC 2018. Ed.: M. Abdalla, 341–370, Springer. doi:10.1007/978-3-319-76581-5_12
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
Non-malleability vs. CCA-Security: The Case of Commitments
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Broadnax, B.; Huber, M.; Löwe, B.; Jörn Müller-Quade; Patrik Scheidecker
Towards Efficient Software Protection Obeying Kerckhoffs’s Principle using Tamper-proof Hardware
2018. Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018 - Volume 2: SECRYPT, Porto, P, July 26-28, 2018., 719–724, INSTICC. doi:10.5220/0006906107190724
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Hackenjos, T.; Mechler, J.; Rill, J.
IT-Sicherheit - ein rechtsfreier Raum?
2018. Datenschutz und Datensicherheit, 42 (5), 286–290. doi:10.1007/s11623-018-0942-0
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
On the (Im-)Possibility of Extending Coin Toss
2018. Journal of cryptology, 31 (4), 1120–1163. doi:10.1007/s00145-018-9296-x
Mechler, J.; Müller-Quade, J.; Nilges, T.
Reusing Tamper-Proof Hardware in UC-Secure Protocols
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
2017
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
Towards Realising Oblivious Voting
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
A Non-Invasive Cyberrisk in Cooperative Driving
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Broadnax, B.; Döttling, N.; Hartung, G.; Müller-Quade, J.; Nagel, M.
Concurrently composable security with shielded super-polynomial simulators
2017. 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017; Paris; France; 30 April 2017 through 4 May 2017. Ed.: J. B. Nielsen, 351–381, Springer. doi:10.1007/978-3-319-56620-7_13
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
Sicherheit relativ definieren
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Dowsley, R.; Michalas, A.; Nagel, M.; Paladi, N.
A survey on design and implementation of protected searchable data in the cloud
2017. Computer science review, 26, 17–30. doi:10.1016/j.cosrev.2017.08.001
Gabel, M.; Mechler, J.
Secure Database Outsourcing to the Cloud : Side-Channels, Counter-Measures and Trusted Execution
2017. Proceedings of the 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), Thessaloniki, Greece, 22nd - 24th June 2017, 799–804, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CBMS.2017.141
Hartung, G.
Attacks on Secure Logging Schemes
2017. Financial Cryptography and Data Security, 21st International Conference, FC 2017, Revised Selected Papers, Sliema, Malta, 3rd - 7th April 2017. Ed.: A. Kiayias, 268–284, Springer. doi:10.1007/978-3-319-70972-7_14
Hartung, G.; Hoffman, M.; Nagel, M.; Rupp, A.
BBA+: Improving the Security and Applicability of Privacy-Preserving Point Collection
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1925–1942, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134071
Hartung, G.; Kaidel, B.; Koch, A.; Koch, J.; Hartmann, D.
Practical and Robust Secure Logging from Fault-Tolerant Sequential Aggregate Signatures
2017. Provable Security, 11th International Conference, ProvSec 2017, Proceedings, Xi’an, China, 23rd - 25th October 2017. Ed.: T. Okamoto, 87–106, Springer. doi:10.1007/978-3-319-68637-0_6
Herold, G.; Hoffmann, M.; Klooß, M.; Ràfols, C.; Rupp, A.
New Techniques for Structural Batch Verification in Bilinear Groups with Applications to Groth-Sahai Proofs
2017. 24th ACM Conference on Computer and Communications Security (ACM CCS 2017), Dallas, TX, October 30 - November 3, 2017, 1547–1564, Association for Computing Machinery (ACM). doi:10.1145/3133956.3134068
Kastner, J.; Koch, A.; Walzer, S.; Miyahara, D.; Hayashi, Y.- ichi; Mizuki, T.; Sone, H.
The Minimum Number of Cards in Practical Card-Based Protocols
2017. Advances in Cryptology - ASIACRYPT 2017 : Proceedings of the 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Part III, Hong Kong, China, 3rd - 7th December 2017. Ed.: T. Takagi, 126–155, Springer. doi:10.1007/978-3-319-70700-6_5
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Papatheocharous, E.; Mantzouratos, S.; Gouvas, P.; Schiefer, G.; Schork, S. T.; Abdelraheem, M. A.; Mechler, J.; Gabel, M.; Moldovan, G.; Yurchenko, K.; Carnehult, T.
PaaSword: A Data Privacy and Context-aware Security Framework for Developing Secure Cloud Applications - Technical and Scientific Contributions
2017. European Space Projects: Developments, Implementations and Impacts in a Changing World (EPS), 2017, 3-27, Porto, Portugal. Vol.: 1, 3–27, SciTePress. doi:10.5220/0007901500030027
Schiefer, G.; Gabel, M.; Mechler, J.; Schoknecht, A.; Citak, M.
Security in a Distributed Key Management Approach
2017. Proceedings of the 2017 IEEE 30th International Symposium on Computer-Based Medical Systems (CBMS), Thessaloniki, Greece, 22nd - 24th June 2017, 816–821, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/CBMS.2017.151