Prof. Dr. Jörn Müller-Quade
Professor Dr. rer. nat. Jörn Müller-Quade studied computer science in Erlangen and Karlsruhe from 1987 to 1993. He earned his doctorate in the field of computer algebra under Professor Dr.-Ing. Dr. rer. nat. Thomas Beth at the Institute for Algorithms and Cognitive Systems (IAKS) at the University of Karlsruhe (TH). His research was motivated by applications in system decomposition and the design of diffractive optical systems. Between 1993 and 1999 he headed the research group for diffractive optics at the IAKS.
From 1999 to 2001 he lived as a post-doc fellow with his family in Tokyo, where he worked in the field of cryptography at the Imai Laboratory of the Institute of Industrial Science at the University of Tokyo, where he founded and led the research group for quantum cryptography. There he discovered his enthusiasm for cryptography. In 2001 he returned to Karlsruhe to take over a BMBF project on quantum cryptography.
From 2003 to 2007, Jörn Müller-Quade was head of a junior research group on long-term security in cryptography (CrySTALS) within the Emmy Noether Programme and coordinated the EU project ProSecCo at the European Institute for System Security of the IAKS for three years.
At the beginning of 2008, Jörn Müller-Quade took over the chair "IT Security" at the Institute for Algorithms and Cognitive Systems at the Universität Karlsruhe (TH). At the end of 2008, he was offered the professorship for IT security, combined with the leadership of the Institute for Cryptography and Security (IKS) at the Universität Karlsruhe (TH), now Karlsruhe Institute of Technology. Due to restructuring, the chair was integrated into the Institute for Theoretical Computer Science (ITI) in early 2014.
Consultation hours
Consultation hours on Tuesdays 11:30 h - 12:30 h or by appointment. Please contact the office beforehand at crypto-info∂iti.kit.edu, Tel. 0721-608 44205.
Publications (Excerpt)
On the Correlation Complexity of MPC with Cheater Identification
2024. Financial Cryptography and Data Security – 27th International Conference, FC 2023, Bol, Brač, Croatia, May 1–5, 2023, Revised Selected Papers, Part I. Ed.: F. Baldimtsi, 129 – 146, Springer Nature Switzerland. doi:10.1007/978-3-031-47754-6_8
HiddenΔ-Fairness: A Novel Notion for Fair Secure Two-Party Computation
2024. Information Security and Privacy. Ed.: T. Zhu. Pt. 2, 330–349, Springer Nature Singapore. doi:10.1007/978-981-97-5028-3_17
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-quantum Assumptions
2024. Public-Key Cryptography – PKC 2024 : 27th IACR International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15–17, 2024, Proceedings. Part IV. Ed.: Q. Tang, 257–288, Springer Nature Switzerland. doi:10.1007/978-3-031-57728-4_9
Hidden ∆-fairness: A Novel Notion for Fair Secure: Two-Party Computation
2024. 36. Kryptotag, 2 S., Gesellschaft für Informatik (GI). doi:10.18420/cdm-2024-36-32
Hidden
2024. Cryptology ePrint Archive
Online-Wahlen und digitale Abstimmungen – eine Einordnung aktueller Entwicklungen
2023. DGRI Jahrbuch 2021/2022, 141–160, Verlag Dr. Otto Schmidt. doi:10.9785/9783504387914-010
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography – 21st International Conference, TCC 2023, Taipei, Taiwan, November 29–December 2, 2023, Proceedings, Part IV. Ed.: G. Rothblum, 510 – 541, Springer Nature Switzerland. doi:10.1007/978-3-031-48624-1_19
Universally Composable Auditable Surveillance
2023. Advances in Cryptology – ASIACRYPT 2023 – 29th International Conference on the Theory and Application of Cryptology and Information Security, Guangzhou, China, December 4–8, 2023, Proceedings, Part II. Ed.: J. Guo, 453 – 487, Springer Nature Singapore. doi:10.1007/978-981-99-8724-5_14
Practically Efficient Private Set Intersection From Trusted Hardware with Side-Channels
2023. Advances in Cryptology - ASIACRYPT 2023 - 29th International Conference on the Theory and Application of Cryptology and Information Security, Springer-Verlag. doi:10.1007/978-981-99-8730-6_9
Composable Long-Term Security with Rewinding
2023. Theory of Cryptography. 21th International Conference, TCC 2023. Proceedings, Part 1. Ed.: G. Rothblum, Springer-Verlag
Sender-binding Key Encapsulation
2023. Public-Key Cryptography – PKC 2023 – 26th IACR International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7–10, 2023, Proceedings, Part I. Ed.: A. Boldyreva, 744 – 773, Springer Nature Switzerland. doi:10.1007/978-3-031-31368-4_26
Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules
2022. GI SICHERHEIT 2022, Ed.: C. Wressnegger, 83–99, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_05
A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels
2022. Public-Key Cryptography – PKC 2022. Ed.: G. Hanaoka. Vol. 2, 316–344, Springer International Publishing. doi:10.1007/978-3-030-97131-1_11
Recent Developments in the Context of Online Elections and Digital Polls in Germany
2022. Sicherheit 2022 : Sicherheit, Schutz und Zuverlässigkeit : Konferenzband der 11. Jahrestagung des Fachbereichs Sicherheit der Gesellschaft für Informatik e.V. (GI), 5.-8. April 2022 in Karlsruhe. Hrsg.: C. Wressnegger, Gesellschaft für Informatik (GI). doi:10.18420/sicherheit2022_16
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules
2021. Proceedings on privacy enhancing technologies, 2021 (4), 312–338. doi:10.2478/popets-2021-0072
ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Advances in Cryptology – ASIACRYPT 2021: 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6–10, 2021, Proceedings, Part II. Ed.: M. Tibouchi, 665–695, Springer-Verlag. doi:10.1007/978-3-030-92075-3_23
Environmentally Friendly Composable Multi-party Computation in the Plain Model from Standard (Timed) Assumptions
2021. Theory of Cryptography – 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part I. Ed.: K. Nissim, 750–781, Springer International Publishing. doi:10.1007/978-3-030-90459-3_25
ConTra Corona : Contact Tracing against the Coronavirus by Bridging the Centralized–Decentralized Divide for Stronger Privacy
2021. Karlsruher Institut für Technologie (KIT). doi:10.5445/IR/1000139714
Aktuelle Entwicklungen im Kontext von Online-Wahlen und digitalen Abstimmungen
2021. doi:10.5445/IR/1000137300
ETHTID: Deployable Threshold Information Disclosure on Ethereum
2021
On the Composability of Statistically Secure Random Oblivious Transfer
2020. Entropy, 22 (1), 107. doi:10.3390/e22010107
Your Money or Your Life—Modeling and Analyzing the Security of Electronic Payment in the UC Framework
2019. Financial Cryptography and Data Security – 23rd International Conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019, Revised Selected Papers. Ed.: I. Goldberg, 243–261, Springer International Publishing. doi:10.1007/978-3-030-32101-7_16
Editorial
2019. Automatisierungstechnik, 67 (5), 359–360. doi:10.1515/auto-2019-0044
GI Elections with POLYAS: a Road to End-to-End Verifiable Elections
2019. Fourth International Joint Conference on Electronic Voting (E-Vote-ID 2019), 1-4 October 2019, Lochau / Bregenz, Austria - Proceedings. Ed.: M. Volkamer; B. Beckert, 293–294, Gesellschaft für Informatik (GI)
Reusing Tamper-Proof Hardware in UC-Secure Protocols
2018. Public-Key Cryptography – PKC 2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25–29, 2018. Proceedings, Part I. Ed.: M. Abdalla, 463–493, Springer International Publishing. doi:10.1007/978-3-319-76578-5_16
On the (Im-)Possibility of Extending Coin Toss
2018. Journal of cryptology, 31 (4), 1120–1163. doi:10.1007/s00145-018-9296-x
Sicherheit auf festem Fundament – Starke Sicherheit durch vertrauenswürdige Hardware
2018. Datenschutz und Datensicherheit, 42 (2), 74–78. doi:10.1007/s11623-018-0897-1
Non-malleability vs. CCA-Security: The Case of Commitments
2018. 21st IACR International Conference on Practice and Theory of Public-Key Cryptography (PKC 2018), Rio De Janeiro, BR, March 25-29, 2018. Ed.: M. Abdalla, 312–337, Springer International Publishing. doi:10.1007/978-3-319-76581-5_11
Sicherheit relativ definieren
2017. Datenschutz und Datensicherheit. doi:10.1007/s11623-017-0720-4
A Non-Invasive Cyberrisk in Cooperative Driving
2017. TÜV-Tagung Fahrerassistenz, 2017, München, 8 S
Towards Realising Oblivious Voting
2017. E-Business and Telecommunications, 13th International Joint Conference, ICETE 2016, Revised Selected Papers, Lisbon, Portugal, 26th - 28th July 2016. Ed.: M. S. Obaidat, 216–240, Springer. doi:10.1007/978-3-319-67876-4_11
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction
2017. Data and Applications Security and Privacy XXXI : Proceedings of the 31st Annual IFIP WG 11.3 Conference, DBSec 2017, Philadelphia, Pennsylvania, USA, 19th - 21st July 2017. Ed. G. Livraga, 409–429, Springer. doi:10.1007/978-3-319-61176-1_23
Synchronous Universally Composable Computer Networks
2016. 2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015; Koper; Slovenia; 3 September 2015 through 4 September 2015. Ed.: E. Pasalic, 95–111, Springer International Publishing. doi:10.1007/978-3-319-29172-7_7
Closing the Gap : A Universal Privacy Framework for Outsourced Data
2016. 2nd International Conference on Cryptography and Information Security in the Balkans, BalkanCryptSec 2015, Koper, Slovenia, 3rd - 4th September 2015. Ed.: E. Pasalic, 134–151, Springer International Publishing. doi:10.1007/978-3-319-29172-7_9
ZeTA-zero-trust authentication: Relying on innate human ability, not technology
2016. 1st IEEE European Symposium on Security and Privacy, EURO S and P 2016, Saarbrücken, 21 - 24 March, 2016, 357–371, Institute of Electrical and Electronics Engineers (IEEE). doi:10.1109/EuroSP.2016.35
Oblivious Voting - Hiding Votes from the Voting Machine in Bingo Voting
2016. International Conference on Security and Cryptography, Lisbon, Portugal, 26–28 July 2016, 85–96, SciTePress. doi:10.5220/0005964300850096
A Formal Treatment of Privacy in Video Data
2016. Computer Security – ESORICS 2016. Ed.: I. Askoxylakis, 406–424, Springer International Publishing. doi:10.1007/978-3-319-45741-3_21
Eliciting and refining requirements for comprehensible security
2016. Security Research Conference : 11th Future Security, Berlin, September 13-14, 2016. Ed.: O. Ambacher, 323–329, Fraunhofer Verlag
KASTEL: Informationssicherheit Recht Machen
2015. Informationsrecht@KIT - 15 Jahre Zentrum für Angewandte Rechtswissenschaft. Hrsg.: Th. Dreier, 49–61, KIT Scientific Publishing
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model
2015. International journal of information security, 14 (1), 73–84. doi:10.1007/s10207-014-0247-8
Daten verschlüsselt speichern und verarbeiten in der Cloud
2015. Datenschutz und Datensicherheit, 39 (8), 531–535. doi:10.1007/s116230150465x
Smart Data – Smart Privacy? Impulse für eine interdisziplinär rechtlich-technische Evaluation Technical Report des BMWi-Technologieprogramms „Smart Data – Innovationen aus Daten“
2015. Forschungszentrum Informatik (FZI)
Schlussbericht zum Teilvorhaben des Verbundprojektes: CLOUDwerker, Teilvorhaben: Konzepte für sichere Kollaboration und Integration : Trusted SaaS im Handwerk: flexibel - integriert - kooperativ = Final report: CLOUDwerker, part: Concepts for secure collaboration and integration
2015. Karlsruher Institut für Technologie (KIT). doi:10.2314/GBV:863140726
Structural Composition Attacks on Anonymized Data
2013. Sicherheit 2014 - Sicherheit, Schutz und Zuverlässigkeit, [Beiträge der 7. Jahrestagung des Fachbereichs Sicherheit in der Gesellschaft für Informatik e. V. (GI);] 19. - 21. März 2014 in Wien, 443–460, Ges. für Informatik
Defining Privacy Based on Distributions of Privacy Breaches
2013. Number Theory and Cryptography : Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday. Ed.: M. Fischlin, 211–225, Springer-Verlag. doi:10.1007/978-3-642-42001-6_15
Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Token
2013. Theory of Cryptography : 10th Theory of Cryptography Conference, TCC 2013, Tokyo, Japan, March 3-6, 2013. Proceedings. Ed.: A. Sahai, 642–661, Springer-Verlag. doi:10.1007/978-3-642-36594-2_36
Lossy Codes and a New Variant of the Learning-With-Errors Problem
2013. Advances in cryptology : proceedings, EUROCRYPT 2013, 32nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Athens, Greece, May 26 - 30, 2013. Ed.: Th. Johansson, 18–34, Springer-Verlag. doi:10.1007/978-3-642-38348-9_2
Oblivious Transfer Based on the McEliece Assumptions
2012. IEICE transactions / E / A, E95.A (2), 567–575
David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token
2012. IACR Cryptology ePrint Archive
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem
2012. ASIACRYPT 2012: Advances in Cryptology - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2 - 6, 2012. Ed.: X. Wang, 485–503, Springer-Verlag. doi:10.1007/978-3-642-34961-4_30
Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions
2012. International Conference on Information Theoretic Security (ICITS) : Montreal, QC, Canada, 15-17 August 2012. Ed.: A. Smith, 80–99, Springer-Verlag. doi:10.1007/978-3-642-32284-6_5
KASTEL - An Application-Driven Center of Excellence for IT Security
2011. Information technology, 53 (5), 250–255. doi:10.1524/itit.2011.0650
Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
2011. IEICE transactions / E / A, E94.A (2), 725–734. doi:10.1587/transfun.E94.A.725
Software Security in Virtualized Infrastructures - The Smart Meter Example
2011. it - Information Technology, 53 (3), 142–151. doi:10.1524/itit.2011.0636
Software Security in Virtualized Infrastructures. The Smart Meter Example
2010. doi:10.5445/IR/1000020452