Stephan Krenn

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Logarithmic-size (linkable) threshold ring signatures in the plain model
Public-Key Cryptography – PKC 2022
2023-08-10Paper
Towards attribute-based credentials in the cloud
Cryptology and Network Security
2023-08-02Paper
Protean Signature Schemes
Cryptology and Network Security
2023-06-28Paper
Fully collision-resistant chameleon-hashes from simpler and post-quantum assumptions2022-12-16Paper
Efficient Zero-Knowledge Proofs for Commitments from Learning with Errors over Rings
Computer Security -- ESORICS 2015
2022-08-19Paper
Issuer-hiding attribute-based credentials2022-06-29Paper
Breaking and fixing anonymous credentials for the cloud
Cryptology and Network Security
2020-07-20Paper
iUC: flexible universal composability made simple2020-05-11Paper
Signer-anonymous designated-verifier redactable signatures for cloud-based data sharing2018-10-26Paper
Chameleon-hashes with dual long-term trapdoors and their applications2018-07-17Paper
Revisiting proxy re-encryption: forward secrecy, improved security, and applications2018-05-16Paper
Practical strongly invisible and strongly accountable sanitizable signatures2017-08-25Paper
Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures
Lecture Notes in Computer Science
2017-06-13Paper
Universal composition with responsive environments
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
A counterexample to the chain rule for conditional HILL entropy
Computational Complexity
2016-10-28Paper
Formal treatment of privacy-enhancing credential systems
Lecture Notes in Computer Science
2016-05-19Paper
Recovering lost device-bound credentials
Applied Cryptography and Network Security
2016-03-10Paper
Better zero-knowledge proofs for lattice encryption and their application to group signatures
Lecture Notes in Computer Science
2015-01-16Paper
Learning with rounding, revisited. New reduction, properties and applications
Advances in Cryptology – CRYPTO 2013
2013-09-02Paper
Commitments and efficient zero-knowledge proofs from learning parity with noise
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
A counterexample to the chain rule for conditional HILL entropy. And what deniable encryption has to do with it
Theory of Cryptography
2013-03-18Paper
A framework for practical universally composable zero-knowledge protocols
Lecture Notes in Computer Science
2011-12-02Paper
Automatic generation of \(\Sigma\)-protocols
Public Key Infrastructures, Services and Applications
2011-02-04Paper
Efficiency limitations for \(\Sigma \)-protocols for group homomorphisms
Theory of Cryptography
2010-02-24Paper


Research outcomes over time


This page was built for person: Stephan Krenn