Daniel Slamanig

From MaRDI portal
(Redirected from Person:785041)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Threshold structure-preserving signatures: strong and adaptive security under standard assumptions2024-11-12Paper
Bringing order to chaos: the case of collision-resistant chameleon-hashes
Journal of Cryptology
2024-08-30Paper
Revisiting updatable encryption: controlled forward security, constructions and a puncturable perspective2024-08-02Paper
Threshold structure-preserving signatures2024-06-26Paper
(Inner-product) functional encryption with updatable ciphertexts
Journal of Cryptology
2024-01-23Paper
Unique-path identity based encryption with applications to strongly secure messaging
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
CRS-updatable asymmetric quasi-adaptive NIZK arguments
Lecture Notes in Computer Science
2023-08-14Paper
Logarithmic-size (linkable) threshold ring signatures in the plain model
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Protean Signature Schemes
Cryptology and Network Security
2023-06-28Paper
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More2023-04-13Paper
CCA-secure (puncturable) KEMs from encryption with non-negligible decryption errors2023-03-21Paper
Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions2022-12-16Paper
Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes
Lecture Notes in Computer Science
2022-10-13Paper
Subversion-resistant quasi-adaptive NIZK and applications to modular zk-SNARKs2022-06-29Paper
Versatile and sustainable timed-release encryption and sequential time-lock puzzles (extended abstract)2022-06-24Paper
Fine-grained forward secrecy: allow-list/deny-list encryption and applications2022-06-22Paper
Updatable signatures and message authentication codes2021-12-21Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Journal of Cryptology
2021-06-28Paper
Homomorphic proxy re-authenticators and applications to verifiable multi-user data aggregation
Financial Cryptography and Data Security
2021-03-17Paper
Policy-based sanitizable signatures2020-08-05Paper
Structure-preserving signatures on equivalence classes from standard assumptions2020-05-11Paper
A framework for UC-secure commitments from publicly computable smooth projective hashing2020-05-06Paper
Structure-preserving signatures on equivalence classes and constant-size anonymous credentials
Journal of Cryptology
2019-06-20Paper
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge
Designs, Codes and Cryptography
2019-05-24Paper
Generic double-authentication preventing signatures and a post-quantum instantiation2018-11-07Paper
Signer-anonymous designated-verifier redactable signatures for cloud-based data sharing2018-10-26Paper
Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs
Designs, Codes and Cryptography
2018-10-10Paper
Chameleon-hashes with dual long-term trapdoors and their applications2018-07-17Paper
Bloom filter encryption and applications to efficient forward-secret 0-RTT key exchange
Advances in Cryptology – EUROCRYPT 2018
2018-07-17Paper
Post-quantum zero-knowledge proofs for accumulators with applications to ring signatures from symmetric-key primitives2018-06-22Paper
Revisiting proxy re-encryption: forward secrecy, improved security, and applications2018-05-16Paper
Linking-based revocation for group signatures: a pragmatic approach for efficient revocation checks2017-10-23Paper
Practical strongly invisible and strongly accountable sanitizable signatures2017-08-25Paper
Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
Lecture Notes in Computer Science
2017-06-13Paper
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions
Lecture Notes in Computer Science
2016-10-21Paper
A general framework for redactable signatures and new constructions
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Non-interactive plaintext (in-)equality proofs and group signatures with verifiable controllable linkability
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives
Lecture Notes in Computer Science
2016-03-02Paper
Rethinking privacy for extended sanitizable signatures and a black-box construction of strongly private schemes
Provable Security
2016-01-27Paper
A new approach to efficient revocable attribute-based anonymous credentials
Cryptography and Coding
2016-01-12Paper
Practical Round-Optimal Blind Signatures in the Standard Model
Lecture Notes in Computer Science
2015-12-10Paper
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials
Lecture Notes in Computer Science
2015-01-16Paper
Warrant-hiding delegation-by-certificate proxy signature schemes
Lecture Notes in Computer Science
2014-01-14Paper
Efficient schemes for anonymous yet authorized and bounded use of cloud resources
Selected Areas in Cryptography
2012-06-08Paper


Research outcomes over time


This page was built for person: Daniel Slamanig