Mark Manulis

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Fully homomorphic encryption beyond IND-CCA1 security: integrity through verifiability2024-11-12Paper
Generalised asynchronous remote key generation for pairing-based cryptosystems2023-11-09Paper
Hierarchical Attribute-Based Signatures
Cryptology and Network Security
2023-06-28Paper
Revocable hierarchical attribute-based signatures from lattices2022-11-09Paper
Biometric-authenticated searchable encryption2021-02-23Paper
Hierarchical attribute-based signatures: short keys and optimal signature length2020-01-30Paper
Blind password registration for two-server password authenticated key exchange and secret sharing protocols2018-10-18Paper
Universally composable two-server PAKE2018-10-18Paper
Oblivious PAKE: efficient handling of password trials2018-10-18Paper
Distributed smooth projective hashing and its application to two-server password authenticated key exchange
Applied Cryptography and Network Security
2014-07-07Paper
Relations among Privacy Notions for Signcryption and Key Invisible “Sign-then-Encrypt”
Information Security and Privacy
2013-06-28Paper
Forward-secure hierarchical predicate encryption
Pairing-Based Cryptography – Pairing 2012
2013-04-04Paper
Publicly verifiable ciphertexts
Lecture Notes in Computer Science
2012-09-25Paper
Fully private revocable predicate encryption
Information Security and Privacy
2012-09-07Paper
Sufficient Condition for Ephemeral Key-Leakage Resilient Tripartite Key Exchange
Information Security and Privacy
2012-09-07Paper
Non-interactive and re-usable universally composable string commitments with adaptive security
Lecture Notes in Computer Science
2011-12-02Paper
Affiliation-hiding authentication with minimal bandwidth consumption
Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication
2011-10-14Paper
Private discovery of common social contacts
Applied Cryptography and Network Security
2011-06-28Paper
Taming Big Brother Ambitions: More Privacy for Secret Handshakes
Privacy Enhancing Technologies
2010-08-10Paper
Generic one round group key exchange in the standard model
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Modeling leakage of ephemeral secrets in tripartite/group key exchange
Information, Security and Cryptology – ICISC 2009
2010-07-16Paper
Redactable signatures for tree-structured data: definitions and constructions
Applied Cryptography and Network Security
2010-07-06Paper
Privacy-preserving group discovery with linear complexity
Applied Cryptography and Network Security
2010-07-06Paper
Affiliation-hiding key exchange with untrusted group authorities
Applied Cryptography and Network Security
2010-07-06Paper
Confidential Signatures and Deterministic Signcryption
Public Key Cryptography – PKC 2010
2010-05-28Paper
Public-key encryption with non-interactive opening: new constructions and stronger definitions
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Flexible group key exchange with on-demand computation of subgroup keys
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Fully Robust Tree-Diffie-Hellman Group Key Exchange
Cryptology and Network Security
2009-11-26Paper
User-aware provably secure protocols for browser-based mutual authentication
International Journal of Applied Cryptography
2009-10-12Paper
Securing group key exchange against strong corruptions and key registration attacks
International Journal of Applied Cryptography
2009-02-24Paper
Universally Composable Security Analysis of TLS
Provable Security
2009-01-27Paper
Property-Based Attestation without a Trusted Third Party
Lecture Notes in Computer Science
2008-11-20Paper
Enforcing User-Aware Browser-Based Mutual Authentication with Strong Locked Same Origin Policy
Information Security and Privacy
2008-07-08Paper
A Privacy-Protecting Multi-Coupon Scheme with Stronger Protection Against Splitting
Financial Cryptography and Data Security
2008-03-07Paper


Research outcomes over time


This page was built for person: Mark Manulis