Stephan Krenn

From MaRDI portal
(Redirected from Person:332265)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Logarithmic-size (linkable) threshold ring signatures in the plain model
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Towards attribute-based credentials in the cloud
Cryptology and Network Security
2023-08-02Paper
Protean Signature Schemes
Cryptology and Network Security
2023-06-28Paper
Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions2022-12-16Paper
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
Computer Security -- ESORICS 2015
2022-08-19Paper
Issuer-hiding attribute-based credentials2022-06-29Paper
Breaking and fixing anonymous credentials for the cloud
Cryptology and Network Security
2020-07-20Paper
iUC: flexible universal composability made simple2020-05-11Paper
Signer-anonymous designated-verifier redactable signatures for cloud-based data sharing2018-10-26Paper
Chameleon-hashes with dual long-term trapdoors and their applications2018-07-17Paper
Revisiting proxy re-encryption: forward secrecy, improved security, and applications2018-05-16Paper
Practical strongly invisible and strongly accountable sanitizable signatures2017-08-25Paper
Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
Lecture Notes in Computer Science
2017-06-13Paper
Universal composition with responsive environments
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
A counterexample to the chain rule for conditional HILL entropy
Computational Complexity
2016-10-28Paper
Formal treatment of privacy-enhancing credential systems
Lecture Notes in Computer Science
2016-05-19Paper
Recovering lost device-bound credentials
Applied Cryptography and Network Security
2016-03-10Paper
Better zero-knowledge proofs for lattice encryption and their application to group signatures
Lecture Notes in Computer Science
2015-01-16Paper
Learning with rounding, revisited. New reduction, properties and applications
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Commitments and efficient zero-knowledge proofs from learning parity with noise
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it
Theory of Cryptography
2013-03-18Paper
A framework for practical universally composable zero-knowledge protocols
Lecture Notes in Computer Science
2011-12-02Paper
Automatic generation of \(\Sigma\)-protocols
Public Key Infrastructures, Services and Applications
2011-02-04Paper
Efficiency limitations for \(\Sigma \)-protocols for group homomorphisms
Theory of Cryptography
2010-02-24Paper


Research outcomes over time


This page was built for person: Stephan Krenn