Prof. Dr. Jörn Müller-Quade

Prof. Dr. Jörn Müller-Quade
Prof. Dr. Jörn Müller-Quade

Professor Dr. rer. nat. Jörn Müller-Quade studied computer science in Erlangen and Karlsruhe from 1987 to 1993. He earned his doctorate in the field of computer algebra under Professor Dr.-Ing. Dr. rer. nat. Thomas Beth at the Institute for Algorithms and Cognitive Systems (IAKS) at the University of Karlsruhe (TH). His research was motivated by applications in system decomposition and the design of diffractive optical systems. Between 1993 and 1999 he headed the research group for diffractive optics at the IAKS.

From 1999 to 2001 he lived as a post-doc fellow with his family in Tokyo, where he worked in the field of cryptography at the Imai Laboratory of the Institute of Industrial Science at the University of Tokyo, where he founded and led the research group for quantum cryptography. There he discovered his enthusiasm for cryptography. In 2001 he returned to Karlsruhe to take over a BMBF project on quantum cryptography.

From 2003 to 2007, Jörn Müller-Quade was head of a junior research group on long-term security in cryptography (CrySTALS) within the Emmy Noether Programme and coordinated the EU project ProSecCo at the European Institute for System Security of the IAKS for three years.

At the beginning of 2008, Jörn Müller-Quade took over the chair "IT Security" at the Institute for Algorithms and Cognitive Systems at the Universität Karlsruhe (TH). At the end of 2008, he was offered the professorship for IT security, combined with the leadership of the Institute for Cryptography and Security (IKS) at the Universität Karlsruhe (TH), now Karlsruhe Institute of Technology. Due to restructuring, the chair was integrated into the Institute for Theoretical Computer Science (ITI) in early 2014.

Consultation hours

Consultation hours on Tuesdays 11:30 h - 12:30 h or by appointment. Please contact the office beforehand at crypto-info∂, Tel. 0721-608 44205.

Publikations (Excerpt)

Broadnax, B.; Mechler, J.; Müller-Quade, J.
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions.
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
Broadnax, B.; Koch, A.; Mechler, J.; Müller, T.; Müller-Quade, J.; Nagel, M.
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules.
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
Beckert, B.; Budurushi, J.; Grunwald, A.; Krimmer, R.; Kulyk, O.; Küsters, R.; Mayer, A.; Müller-Quade, J.; Neumann, S.; Volkamer, M.
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen.
2021. doi:10.5445/IR/1000137300
Stengele, O.; Raiber, M.; Müller-Quade, J.; Hartenstein, H.
ETHTID: Deployable Threshold Information Disclosure on Ethereum.
Dowsley, R.; Müller-Quade, J.; Nascimento, A. C. A.
On the Composability of Statistically Secure Random Oblivious Transfer.
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
Achenbach, D.; Gröll, R.; Hackenjos, T.; Koch, A.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Rill, J.
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Müller-Quade, J.; Beyerer, J.; Broadnax, B.
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
Beckert, B.; Brelle, A.; Grimm, R.; Huber, N.; Kirsten, M.; Küsters, R.; Müller-Quade, J.; Noppel, M.; Reinhard, K.; Schwab, J.; Schwerdt, R.; Truderung, T.; Volkamer, M.; Winter, C.
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections.
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik e.V.  (GI)
Mechler, J.; Müller-Quade, J.; Nilges, T.
Reusing Tamper-Proof Hardware in UC-Secure Protocols.
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
Hofheinz, D.; Müller-Quade, J.; Unruh, D.
On the (Im-)Possibility of Extending Coin Toss.
2018. Journal of cryptology, 31 (4), 1120–1163. doi:10.1007/s00145-018-9296-x
Broadnax, B.; Löwe, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware.
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Broadnax, B.; Fetzer, V.; Müller-Quade, J.; Rupp, A.
Non-malleability vs. CCA-Security: The Case of Commitments.
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Broadnax, B.; Mechler, J.; Müller-Quade, J.; Nagel, M.; Rill, J.
Sicherheit relativ definieren.
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
Bapp, F.; Becker, J.; Beyerer, J.; Doll, J.; Filsinger, M.; Frese, C.; Hubschneider, C.; Lauber, A.; Müller-Quade, J.; Pauli, M.; Roschani, M.; Salscheider, O.; Rosenhahn, B.; Ruf, M.; Stiller, C.; Willersinn, D.; Ziehn, J. R.
A Non-Invasive Cyberrisk in Cooperative Driving.
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Achenbach, D.; Borcherding, A.; Löwe, B.; Müller-Quade, J.; Rill, J.
Towards Realising Oblivious Voting.
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
Messmer, S.; Rill, J.; Achenbach, D.; Müller-Quade, J.
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction.
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Achenbach, D.; Müller-Quade, J.; Rill, J.
Synchronous Universally Composable Computer Networks.
2016. 2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015; Koper; Slovenia; 3 September 2015 through 4 September 2015. Ed.: E. Pasalic, 95–111, Springer International Publishing. doi:10.1007/978-3-319-29172-7_7
Achenbach, D.; Huber, M.; Müller-Quade, J.; Rill, J.
Closing the Gap : A Universal Privacy Framework for Outsourced Data.
2016. 2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015, Koper, Slovenia, 3rd - 4th September 2015. Ed.: E. Pasalic, 134–151, Springer International Publishing. doi:10.1007/978-3-319-29172-7_9
Gutmann, A.; Renaud, K.; Maguire, J.; Mayer, P.; Volkamer, M.; Matsuura, K.; Müller-Quade, J.
ZeTA-zero-trust authentication: Relying on innate human ability, not technology.
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
Achenbach, D.; Löwe, B.; Müller-Quade, J.; Rill, J.
Oblivious Voting - Hiding Votes from the Voting Machine in Bingo Voting.
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SciTePress. doi:10.5220/0005964300850096
Fetzer, V.; Müller-Quade, J.; Nilges, T.
A Formal Treatment of Privacy in Video Data.
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing. doi:10.1007/978-3-319-45741-3_21
Broadnax, B.; Birnstill, P.; Müller-Quade, J.; Beyerer, J.
Eliciting and refining requirements for comprehensible security.
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verlag
Müller-Quade, J.
KASTEL: Informationssicherheit Recht Machen.
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 49–61, KIT Scientific Publishing
Tonicelli, R.; Nascimento, A. C. A.; Dowsley, R.; Müller-Quade, J.; Imai, H.; Hanaoka, G.; Otsuka, A.
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8
Müller-Quade, J.; Huber, M.; Nilges, T.
Daten verschlüsselt speichern und verarbeiten in der Cloud.
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Eckhardt, J.; Grafenstein, M. von; Hilber, M.; Huber, M.; Lenk, A.; Müller-Quade, J.; Raabe, O.; Rill, J.; Schlisske, A.; Wagner, M.
Smart Data – Smart Privacy? Impulse für eine interdisziplinär rechtlich-technische Evaluation Technical Report des BMWi-Technologieprogramms „Smart Data – Innovationen aus Daten“.
2015. Forschungszentrum Informatik (FZI)
Nilges, T.; Müller-Quade, J.; Huber, M.
Structural Composition Attacks on Anonymized Data.
2013. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien, 443–460, Ges. für Informatik
Huber, M.; Müller-Quade, J.; Nilges, T.
Defining Privacy Based on Distributions of Privacy Breaches.
2013. Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Ed.: M. Fischlin, 211–225, Springer Verlag. doi:10.1007/978-3-642-42001-6_15
Döttling, N.; Mie, T.; Müller-Quade, J.; Nilges, T.
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Token.
2013. Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Ed.: A. Sahai, 642–661, Springer Verlag. doi:10.1007/978-3-642-36594-2_36
Döttling, N.; Müller-Quade, J.
Lossy Codes and a New Variant of the Learning-With-Errors Problem.
2013. Advances in cryptology : proceedings, EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26 - 30, 2013. Ed.: Th. Johansson, 18–34, Springer Verlag. doi:10.1007/978-3-642-38348-9_2
Dowsley, R.; Graaf, J. van de; Müller-Quade, J.; Nascimento, A. C. A.
Oblivious Transfer Based on the McEliece Assumptions.
2012. IEICE transactions / E / A, E95.A (2), 567–575
Döttling, N.; Müller-Quade, J.; Nascimento, A. C. A.
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
2012. ASIACRYPT 2012: Advances in Cryptology - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2 - 6, 2012. Ed.: X. Wang, 485–503, Springer Verlag. doi:10.1007/978-3-642-34961-4_30
Bernardo Machado, D.; Anderson, C. A. N.; Müller-Quade, J.
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions.
2012. International Conference on Information Theoretic Security (ICITS) : Montreal, QC, Canada, 15-17 August 2012. Ed.: A. Smith, 80–99, Springer Verlag. doi:10.1007/978-3-642-32284-6_5
Müller-Quade, J.
KASTEL - An Application-Driven Center of Excellence for IT Security.
2011. Information technology, 53 (5), 250–255. doi:10.1524/itit.2011.0650
Dowsley, R.; Müller-Quade, J.; Otsuka, A.; Hanaoka, G.; Imai, H.; Nascimento, A. C. A.
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
2011. IEICE transactions / E / A, E94.A (2), 725–734. doi:10.1587/transfun.E94.A.725
Beckert, B.; Hofheinz, D.; Müller-Quade, J.; Pretschner, A.; Snelting, G.
Software Security in Virtualized Infrastructures - The Smart Meter Example.
2011. it - Information Technology, 53 (3), 142–151. doi:10.1524/itit.2011.0636
Beckert, B.; Hofheinz, D.; Müller-Quade, J.; Pretschner, A.; Snelting, G.
Software Security in Virtualized Infrastructures. The Smart Meter Example.
2010. doi:10.5445/IR/1000020452