Georg Fuchsbauer

From MaRDI portal


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Updatable public-key encryption, revisited
 
2024-11-13Paper
On proving equivalence class signatures secure from non-interactive assumptions
 
2024-11-12Paper
Concurrently secure blind Schnorr signatures
 
2024-11-12Paper
SNACKs: leveraging proofs of sequential work for blockchain light clients
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Non-interactive Mimblewimble transactions, revisited
Advances in Cryptology – ASIACRYPT 2022
2023-08-25Paper
Approximate distance-comparison-preserving symmetric encryption
Lecture Notes in Computer Science
2023-07-25Paper
The One-More Discrete Logarithm Assumption in the Generic Group Model
Lecture Notes in Computer Science
2023-05-26Paper
Efficient signatures on randomizable ciphertexts
 
2022-12-16Paper
Double-authentication-preventing signatures in the standard model
 
2022-12-16Paper
A classification of computational assumptions in the algebraic group model
 
2022-11-09Paper
Simpler constructions of asymmetric primitives from obfuscation
 
2022-07-06Paper
Blind Schnorr signatures and signed ElGamal encryption in the algebraic group model
 
2022-03-23Paper
Transferable e-cash: a cleaner model and the first practical instantiation
 
2021-12-21Paper
Adaptively secure proxy re-encryption
 
2020-01-28Paper
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
Journal of Cryptology
2019-06-20Paper
The algebraic group model and its applications
 
2018-09-26Paper
Non-interactive zaps of knowledge
 
2018-08-10Paper
Weakly secure equivalence-class signatures from standard assumptions
 
2018-05-29Paper
Subversion-zero-knowledge SNARKs
 
2018-05-16Paper
Access Control Encryption for Equality, Comparison, and More
Lecture Notes in Computer Science
2017-06-13Paper
NIZKs with an untrusted CRS: security in the face of parameter subversion
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Lecture Notes in Computer Science
2016-10-21Paper
Offline witness encryption
Applied Cryptography and Network Security
2016-10-04Paper
Constrained PRFs for unbounded inputs with short keys
Applied Cryptography and Network Security
2016-10-04Paper
Structure-preserving signatures and commitments to group elements
Journal of Cryptology
2016-06-01Paper
Constrained PRFs for unbounded inputs
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Standard Security Does Imply Security Against Selective Opening for Markov Distributions
Theory of Cryptography
2016-03-23Paper
Practical Round-Optimal Blind Signatures in the Standard Model
Lecture Notes in Computer Science
2015-12-10Paper
A quasipolynomial reduction for generalized selective decryption on trees
Lecture Notes in Computer Science
2015-12-10Paper
Anonymous transferable e-cash
Lecture Notes in Computer Science
2015-08-27Paper
Key-homomorphic constrained pseudorandom functions
Theory of Cryptography
2015-07-06Paper
Adaptive Security of Constrained PRFs
Lecture Notes in Computer Science
2015-01-06Paper
Constrained verifiable random functions
Lecture Notes in Computer Science
2014-10-14Paper
Policy-Based Signatures
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Enhanced chosen-ciphertext security and applications
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Efficient signatures of knowledge and DAA in the standard model
Applied Cryptography and Network Security
2014-01-24Paper
Plaintext-checkable encryption
Lecture Notes in Computer Science
2012-06-08Paper
Achieving optimal anonymity in transferable e-cash with a judge
Lecture Notes in Computer Science
2011-06-29Paper
Commuting signatures and verifiable encryption
Advances in Cryptology – EUROCRYPT 2011
2011-05-27Paper
Signatures on randomizable ciphertexts
Public Key Cryptography – PKC 2011
2011-03-15Paper
Structure-preserving signatures and commitments to group elements
Advances in Cryptology – CRYPTO 2010
2010-08-24Paper
Batch Groth-Sahai
Applied Cryptography and Network Security
2010-07-06Paper
Public-key encryption with non-interactive opening: new constructions and stronger definitions
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Fair blind signatures without random oracles
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Strong cryptography from weak secrets. Building efficient PKE and IBE from distributed passwords
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Efficient rational secret sharing in standard communication networks
Theory of Cryptography
2010-02-24Paper
Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures
Formal to Practical Security
2009-06-09Paper
Anonymous Proxy Signatures
Lecture Notes in Computer Science
2008-11-20Paper


Research outcomes over time


This page was built for person: Georg Fuchsbauer