Dominique Schröder

From MaRDI portal
Person:1703918


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Foundations of adaptor signatures
 
2024-11-12Paper
SoK: Descriptive Statistics Under Local Differential Privacy -- Raw Results
 
2024-09-25Dataset
Practical Schnorr threshold signatures without the algebraic group model
Advances in Cryptology – CRYPTO 2023
2024-02-02Paper
On the security of frequency-hiding order-preserving encryption
Cryptology and Network Security
2023-08-02Paper
Subset predicate encryption and its applications
Cryptology and Network Security
2023-08-02Paper
Inner product functional commitments with constant-size public parameters and openings
Lecture Notes in Computer Science
2023-07-25Paper
Arithmetic garbling from bilinear maps
 
2022-08-25Paper
Verifiably encrypted signatures: security revisited and a new construction
Computer Security -- ESORICS 2015
2022-08-19Paper
Everlasting UC commitments from fully malicious PUFs
Journal of Cryptology
2022-07-15Paper
Maliciously secure multi-client ORAM
 
2022-07-01Paper
Feasibility and infeasibility of secure computation with malicious PUFs
Journal of Cryptology
2020-04-28Paper
Efficient invisible and unlinkable sanitizable signatures
 
2020-01-28Paper
On tight security proofs for Schnorr signatures
Journal of Cryptology
2019-06-20Paper
(Efficient) universally composable oblivious transfer using a minimal number of stateless tokens
Journal of Cryptology
2019-06-20Paper
Homomorphic secret sharing for low degree polynomials
 
2019-01-23Paper
Efficient ring signatures in the standard model
 
2018-03-08Paper
Security of blind signatures revisited
Journal of Cryptology
2017-05-22Paper
Two-message, oblivious evaluation of cryptographic functionalities
Advances in Cryptology – CRYPTO 2016
2016-11-09Paper
Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Delegatable functional signatures
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Nearly optimal verifiable data streaming
Public-Key Cryptography – PKC 2016
2016-04-13Paper
Foundations of reconfigurable PUFs
Applied Cryptography and Network Security
2016-03-10Paper
Efficient pseudorandom functions via on-the-fly adaptation
Lecture Notes in Computer Science
2015-12-10Paper
On tight security proofs for Schnorr signatures
Lecture Notes in Computer Science
2015-01-16Paper
Feasibility and infeasibility of secure computation with malicious PUFs
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Webtrust -- a comprehensive authenticity and integrity framework for HTTP
Applied Cryptography and Network Security
2014-07-07Paper
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Theory of Cryptography
2014-02-18Paper
History-free sequential aggregate signatures
Lecture Notes in Computer Science
2012-09-25Paper
Security of blind signatures revisited
Public Key Cryptography – PKC 2012
2012-07-20Paper
Uniqueness is a different story: impossibility of verifiable random functions from trapdoor permutations
Theory of Cryptography
2012-06-15Paper
How to aggregate the CL signature scheme
Computer Security – ESORICS 2011
2011-11-22Paper
Security of blind signatures under aborts and applications to adaptive oblivious transfer
Journal of Mathematical Cryptology
2011-11-15Paper
Round optimal blind signatures
Advances in Cryptology – CRYPTO 2011
2011-08-12Paper
Impossibility of blind signatures from one-way permutations
Theory of Cryptography
2011-05-19Paper
Expedient Non-malleability Notions for Hash Functions
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
History-Free Aggregate Message Authentication Codes
Lecture Notes in Computer Science
2010-09-10Paper
Generic constructions for verifiably encrypted signatures without random oracles or NIZKs
Applied Cryptography and Network Security
2010-07-06Paper
Redactable signatures for tree-structured data: definitions and constructions
Applied Cryptography and Network Security
2010-07-06Paper
On the impossibility of three-move blind signature schemes
Advances in Cryptology – EUROCRYPT 2010
2010-06-01Paper
Confidential Signatures and Deterministic Signcryption
Public Key Cryptography – PKC 2010
2010-05-28Paper
Unlinkability of sanitizable signatures
Public Key Cryptography – PKC 2010
2010-05-28Paper
Public-key encryption with non-interactive opening: new constructions and stronger definitions
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Fair partially blind signatures
Progress in cryptology -- AFRICACRYPT 2010. Third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3--6, 2010. Proceedings
2010-05-04Paper
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
Pairing-Based Cryptography – Pairing 2009
2009-08-18Paper
Security of Blind Signatures under Aborts
Public Key Cryptography – PKC 2009
2009-03-24Paper
Security of Sanitizable Signatures Revisited
Public Key Cryptography – PKC 2009
2009-03-24Paper


Research outcomes over time


This page was built for person: Dominique Schröder