Daniel Slamanig

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Threshold structure-preserving signatures: strong and adaptive security under standard assumptions2024-11-12Paper
Bringing order to chaos: the case of collision-resistant chameleon-hashes
Journal of Cryptology
2024-08-30Paper
Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective2024-08-02Paper
Threshold structure-preserving signatures2024-06-26Paper
(Inner-product) functional encryption with updatable ciphertexts
Journal of Cryptology
2024-01-23Paper
Unique-path identity based encryption with applications to strongly secure messaging
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
CRS-updatable asymmetric quasi-adaptive NIZK arguments
Lecture Notes in Computer Science
2023-08-14Paper
Logarithmic-size (linkable) threshold ring signatures in the plain model
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Protean Signature Schemes
Cryptology and Network Security
2023-06-28Paper
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More2023-04-13Paper
CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors2023-03-21Paper
Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions2022-12-16Paper
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
Lecture Notes in Computer Science
2022-10-13Paper
Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs2022-06-29Paper
Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)2022-06-24Paper
Fine-grained forward secrecy: allow-list/deny-list encryption and applications2022-06-22Paper
Updatable signatures and message authentication codes2021-12-21Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Journal of Cryptology
2021-06-28Paper
Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation
Financial Cryptography and Data Security
2021-03-17Paper
Policy-based sanitizable signatures2020-08-05Paper
Structure-preserving signatures on equivalence classes from standard assumptions2020-05-11Paper
A framework for UC-secure commitments from publicly computable smooth projective hashing2020-05-06Paper
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
Journal of Cryptology
2019-06-20Paper
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
Designs, Codes and Cryptography
2019-05-24Paper
Generic double-authentication preventing signatures and a post-quantum instantiation2018-11-07Paper
Signer-anonymous designated-verifier redactable signatures for cloud-based data sharing2018-10-26Paper
Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs
Designs, Codes and Cryptography
2018-10-10Paper
Chameleon-hashes with dual long-term trapdoors and their applications2018-07-17Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Advances in Cryptology – EUROCRYPT 2018
2018-07-17Paper
Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives2018-06-22Paper
Revisiting proxy re-encryption: forward secrecy, improved security, and applications2018-05-16Paper
Linking-based revocation for group signatures: a pragmatic approach for efficient revocation checks2017-10-23Paper
Practical strongly invisible and strongly accountable sanitizable signatures2017-08-25Paper
Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
Lecture Notes in Computer Science
2017-06-13Paper
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Lecture Notes in Computer Science
2016-10-21Paper
A general framework for redactable signatures and new constructions
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Non-interactive plaintext (in-)equality proofs and group signatures with verifiable controllable linkability
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
Lecture Notes in Computer Science
2016-03-02Paper
Rethinking privacy for extended sanitizable signatures and a black-box construction of strongly private schemes
Provable Security
2016-01-27Paper
A new approach to efficient revocable attribute-based anonymous credentials
Cryptography and Coding
2016-01-12Paper
Practical Round-Optimal Blind Signatures in the Standard Model
Lecture Notes in Computer Science
2015-12-10Paper
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
Lecture Notes in Computer Science
2015-01-16Paper
Warrant-hiding delegation-by-certificate proxy signature schemes
Lecture Notes in Computer Science
2014-01-14Paper
Efficient schemes for anonymous yet authorized and bounded use of cloud resources
Selected Areas in Cryptography
2012-06-08Paper


Research outcomes over time


This page was built for person: Daniel Slamanig