Lehrstuhl für Informatik 13 (Angewandte Kryptographie)

Fürther Straße 246 c
90429 Nürnberg

Subordinate Organisational Units

Juniorprofessur für Kryptographische Protokolle

Research Fields

Cryptographic Protocols

Related Project(s)

(PeRsOnal MedIcal SafE):
PROMISE: Development of the underlying cryptographic algorithms and of the cloud application
Prof. Dr. Dominique Schröder
(01/07/2017 - 31/10/2019)

(SFB 1223: Methods and Tools for Understanding and Controlling Privacy):
SFB 1223: Privacy-Preserving Cloud Storage (B04)
Prof. Dr. Dominique Schröder

Publications (Download BibTeX)

Go to first page Go to previous page 1 of 4 Go to next page Go to last page

Deuber, D., Magri, B., & Thyagarajan, S.A.K. (2019). Redactable Blockchain in the Permissionless Setting. In Proceedings of the 40th IEEE Symposium on Security and Privacy. SAN FRANCISCO, CA, US.
Choi, S.G., Katz, J., Schröder, D., Yerukhimovich, A., & Zhou, H.-S. (2019). (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens. Journal of Cryptology, 32(2), 459-497. https://dx.doi.org/10.1007/s00145-018-9288-x
Fleischhacker, N., Jager, T., & Schröder, D. (2019). On Tight Security Proofs for Schnorr Signatures. Journal of Cryptology, 32(2), 566-599. https://dx.doi.org/10.1007/s00145-019-09311-5
Deuber, D., Egger, C., Fech, K., Malavolta, G., Schröder, D., Thyagarajan, S.A.K.,... Durand, C. (2019). My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data. Proceedings on Privacy Enhancing Technologies, 2019(1), 108-132. https://dx.doi.org/10.2478/popets-2019-0007
Döttling, N., Lai, R.W.F., & Malavolta, G. (2019). Incremental proofs of sequential work. In Yuval Ishai, Vincent Rijmen (Eds.), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (pp. 292-323). Darmstadt, DE: Springer Verlag.
Bultel, X., Lafourcade, P., Lai, R.W.F., Malavolta, G., Schröder, D., & Thyagarajan, S.A.K. (2019). Efficient Invisible and Unlinkable Sanitizable Signatures. In Dongdai Lin, Kazue Sako (Eds.), Public-Key Cryptography – PKC 2019 - 22nd IACR International Conference on Practice and Theory of Public-Key Cryptography, Proceedings. (pp. 159-189). Springer Verlag.
Lai, R.W.F., Egger, C., Reinert, M., Chow, S.S., Maffei, M., & Schröder, D. (2018). Simple Password-Hardened Encryption Services. In USENIX Association (Eds.), 27th USENIX Security Symposium (USENIX Security 18). Baltimore, MD, US: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Deuber, D., Maffei, M., Malavolta, G., Rabkin, M., Schröder, D., & Simkin, M. (2018). Functional Credentials. Proceedings on Privacy Enhancing Technologies, 2, 64-84.
Fleischhacker, N., Krupp, J., Malavolta, G., Schneider, J., Schröder, D., & Simkin, M. (2018). Efficient unlinkable sanitizable signatures from signatures with re-randomizable keys. IET Information Security, 12(3), 166-183.
Meiser, S., & Schröder, D. (2018). Delegatable functional signatures. IET Information Security, 12(3), 194-206.
Lai, R.W.F., Egger, C., Schröder, D., & Chow, S.S. (2017). Phoenix: Rebirth of a Cryptographic Password-Hardening Service. In 26th USENIX Security Symposium (USENIX Security 17) (pp. 899--916). Vancouver, BC, CA: 2560 Ninth Street, Suite 215 Berkeley, CA 94710 USA: USENIX Association.
Katz, J., Maffei, M., Malavolta, G., & Schröder, D. (2017). Subset Predicate Encryption and its Applications. In Proceedings of the 16th International Conference on Cryptology and Network Security (CANS). Hong Kong: Hong Kong.
Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). SilentWhispers: Enforcing Security and Privacy in Decentralized Credit Networks. In Proceedings of the 24th Annual Network & Distributed System Security Symposium (NDSS). San Diego, USA.
Ruffing, T., & Malavolta, G. (2017). Switch Commitments: A Safety Switch for Confidential Transactions. In Proceedings of the 4th Workshop on Bitcoin and Blockchain Research (BITCOIN). Malta.
Maffei, M., Malavolta, G., Reinert, M., & Schröder, D. (2017). Maliciously Secure Multi-Client ORAM. In International Conference on Applied Cryptography and Network Security (ACNS). Kanazawa, Japan.
Ateniese, G., Magri, B., Venturi, D., & Andrade, E. (2017). Redactable Blockchain -- or -- Rewriting History in Bitcoin and Friends. In IEEE European Symposium on Security and Privacy 2017 (EuroS&P). Paris, France.
Schröder, D., & Unruh, D. (2017). Security of Blind Signatures Revisited. Journal of Cryptology, 30(2), 470-494. https://dx.doi.org/10.1007/s00145-015-9225-1
Malavolta, G., Moreno-Sanchez, P., Kate, A., & Maffei, M. (2017). Concurrency and Privacy with Payment-Channel Networks. In Proceedings of the 24th ACM Conference on Computer and Communications Security (CCS). Dallas, USA: Dallas, USA.
Malavolta, G., & Schröder, D. (2017). Efficient Ring Signatures in the Standard Model. In Proceedings of the 23rd Annual International Conference on the Theory and Applications of Cryptology and Information Security (ASIACRYPT). Hong Kong.
Hausmann, D., Schröder, L., & Egger, C. (2016). Global Caching for the Alternation-free Coalgebraic mu-calculus. In Proceedings of the 27th International Conference on Concurrency Theory, CONCUR 2016 (pp. 34:1-34:15). Québec City, Canada: Dagstuhl: Schloss Dagstuhl - Leibniz-Zentrum für Informatik.

Last updated on 2019-24-04 at 10:23