Georg Fuchsbauer
20 Publications
2019 | Published | Conference Paper | IST-REx-ID: 6430 |
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, and K. Z. Pietrzak, “Adaptively secure proxy re-encryption,” presented at the PKC: Public-Key Cryptograhy, Beijing, China, 2019, vol. 11443, pp. 317–346.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2018 | Published | Conference Paper | IST-REx-ID: 6941 |
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J. F. Alwen, and K. Z. Pietrzak, “SpaceMint: A cryptocurrency based on proofs of space,” in 22nd International Conference on Financial Cryptography and Data Security, Nieuwpoort, Curacao, 2018, vol. 10957, pp. 480–499.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1236 |
H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Constrained PRFs for unbounded inputs,” presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA, 2016, vol. 9610, pp. 413–428.
[Submitted Version]
View
| Files available
| DOI
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1235 |
H. M. Abusalah and G. Fuchsbauer, “Constrained PRFs for unbounded inputs with short keys,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 445–463.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1229 |
H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Offline witness encryption,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 285–303.
[Submitted Version]
View
| Files available
| DOI
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1233 |
G. Fuchsbauer, F. Heuer, E. Kiltz, and K. Z. Pietrzak, “Standard security does imply security against selective opening for markov distributions,” presented at the TCC: Theory of Cryptography Conference, Tel Aviv, Israel, 2016, vol. 9562, pp. 282–305.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1225 |
G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, and D. Slamanig, “Practical round-optimal blind signatures in the standard model from weaker assumptions,” presented at the SCN: Security and Cryptography for Networks, Amalfi, Italy, 2016, vol. 9841, pp. 391–408.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1646 |
A. Banerjee, G. Fuchsbauer, C. Peikert, K. Z. Pietrzak, and S. Stevens, “Key-homomorphic constrained pseudorandom functions,” in 12th Theory of Cryptography Conference, Warsaw, Poland, 2015, vol. 9015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1648 |
G. Fuchsbauer, Z. Jafargholi, and K. Z. Pietrzak, “A quasipolynomial reduction for generalized selective decryption on trees,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA, 2015, vol. 9215, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1651 |
F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” in Public-Key Cryptography - PKC 2015, Gaithersburg, MD, United States, 2015, vol. 9020, pp. 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1647 |
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Practical round-optimal blind signatures in the standard model,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 233–253.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1474 |
A. Ferrara, G. Fuchsbauer, B. Liu, and B. Warinschi, “Policy privacy in cryptographic access control,” presented at the CSF: Computer Security Foundations, Verona, Italy, 2015, pp. 46–60.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2014 | Published | Conference Paper | IST-REx-ID: 1643 |
G. Fuchsbauer, “Constrained Verifiable Random Functions ,” in SCN 2014, Amalfi, Italy, 2014, vol. 8642, pp. 95–114.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2045 |
D. Dachman Soled, G. Fuchsbauer, P. Mohassel, and A. O’Neill, “Enhanced chosen-ciphertext security and applications,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 329–344.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2046 |
M. Bellare and G. Fuchsbauer, “Policy-based signatures,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 520–537.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 1927 |
G. Fuchsbauer, M. Konstantinov, K. Z. Pietrzak, and V. Rao, “Adaptive security of constrained PRFs,” in 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, 2014, vol. 8874, pp. 82–101.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2013 | Published | Conference Paper | IST-REx-ID: 2260 |
D. Bernhard, G. Fuchsbauer, and E. Ghadafi, “Efficient signatures of knowledge and DAA in the standard model,” vol. 7954. Springer, pp. 518–533, 2013.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2013 | Published | Conference Paper | IST-REx-ID: 2291 |
A. Ferrara, G. Fuchsbauer, and B. Warinschi, “Cryptographically enforced RBAC,” presented at the CSF: Computer Security Foundations, New Orleans, LA, United States, 2013, pp. 115–129.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
Grants
20 Publications
2019 | Published | Conference Paper | IST-REx-ID: 6430 |
G. Fuchsbauer, C. Kamath Hosdurg, K. Klein, and K. Z. Pietrzak, “Adaptively secure proxy re-encryption,” presented at the PKC: Public-Key Cryptograhy, Beijing, China, 2019, vol. 11443, pp. 317–346.
[Preprint]
View
| Files available
| DOI
| Download Preprint (ext.)
| WoS
2018 | Published | Conference Paper | IST-REx-ID: 6941 |
S. Park, A. Kwon, G. Fuchsbauer, P. Gazi, J. F. Alwen, and K. Z. Pietrzak, “SpaceMint: A cryptocurrency based on proofs of space,” in 22nd International Conference on Financial Cryptography and Data Security, Nieuwpoort, Curacao, 2018, vol. 10957, pp. 480–499.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1236 |
H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Constrained PRFs for unbounded inputs,” presented at the CT-RSA: Topics in Cryptology, San Francisco, CA, USA, 2016, vol. 9610, pp. 413–428.
[Submitted Version]
View
| Files available
| DOI
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1235 |
H. M. Abusalah and G. Fuchsbauer, “Constrained PRFs for unbounded inputs with short keys,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 445–463.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1229 |
H. M. Abusalah, G. Fuchsbauer, and K. Z. Pietrzak, “Offline witness encryption,” presented at the ACNS: Applied Cryptography and Network Security, Guildford, UK, 2016, vol. 9696, pp. 285–303.
[Submitted Version]
View
| Files available
| DOI
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1233 |
G. Fuchsbauer, F. Heuer, E. Kiltz, and K. Z. Pietrzak, “Standard security does imply security against selective opening for markov distributions,” presented at the TCC: Theory of Cryptography Conference, Tel Aviv, Israel, 2016, vol. 9562, pp. 282–305.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2016 | Published | Conference Paper | IST-REx-ID: 1225 |
G. Fuchsbauer, C. Hanser, C. Kamath Hosdurg, and D. Slamanig, “Practical round-optimal blind signatures in the standard model from weaker assumptions,” presented at the SCN: Security and Cryptography for Networks, Amalfi, Italy, 2016, vol. 9841, pp. 391–408.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1646 |
A. Banerjee, G. Fuchsbauer, C. Peikert, K. Z. Pietrzak, and S. Stevens, “Key-homomorphic constrained pseudorandom functions,” in 12th Theory of Cryptography Conference, Warsaw, Poland, 2015, vol. 9015, pp. 31–60.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
2015 | Published | Conference Paper | IST-REx-ID: 1648 |
G. Fuchsbauer, Z. Jafargholi, and K. Z. Pietrzak, “A quasipolynomial reduction for generalized selective decryption on trees,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, USA, 2015, vol. 9215, pp. 601–620.
[Submitted Version]
View
| Files available
| DOI
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1651 |
F. Baldimtsi, M. Chase, G. Fuchsbauer, and M. Kohlweiss, “Anonymous transferable e-cash,” in Public-Key Cryptography - PKC 2015, Gaithersburg, MD, United States, 2015, vol. 9020, pp. 101–124.
[Published Version]
View
| DOI
| Download Published Version (ext.)
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1647 |
G. Fuchsbauer, C. Hanser, and D. Slamanig, “Practical round-optimal blind signatures in the standard model,” presented at the CRYPTO: International Cryptology Conference, Santa Barbara, CA, United States, 2015, vol. 9216, pp. 233–253.
[Submitted Version]
View
| Files available
| DOI
| Download Submitted Version (ext.)
| WoS
2015 | Published | Conference Paper | IST-REx-ID: 1474 |
A. Ferrara, G. Fuchsbauer, B. Liu, and B. Warinschi, “Policy privacy in cryptographic access control,” presented at the CSF: Computer Security Foundations, Verona, Italy, 2015, pp. 46–60.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS
2014 | Published | Conference Paper | IST-REx-ID: 1643 |
G. Fuchsbauer, “Constrained Verifiable Random Functions ,” in SCN 2014, Amalfi, Italy, 2014, vol. 8642, pp. 95–114.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2045 |
D. Dachman Soled, G. Fuchsbauer, P. Mohassel, and A. O’Neill, “Enhanced chosen-ciphertext security and applications,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 329–344.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 2046 |
M. Bellare and G. Fuchsbauer, “Policy-based signatures,” in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Buenos Aires, Argentina, 2014, vol. 8383, pp. 520–537.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2014 | Published | Conference Paper | IST-REx-ID: 1927 |
G. Fuchsbauer, M. Konstantinov, K. Z. Pietrzak, and V. Rao, “Adaptive security of constrained PRFs,” in 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, China, 2014, vol. 8874, pp. 82–101.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2013 | Published | Conference Paper | IST-REx-ID: 2260 |
D. Bernhard, G. Fuchsbauer, and E. Ghadafi, “Efficient signatures of knowledge and DAA in the standard model,” vol. 7954. Springer, pp. 518–533, 2013.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
2013 | Published | Conference Paper | IST-REx-ID: 2291 |
A. Ferrara, G. Fuchsbauer, and B. Warinschi, “Cryptographically enforced RBAC,” presented at the CSF: Computer Security Foundations, New Orleans, LA, United States, 2013, pp. 115–129.
[Submitted Version]
View
| DOI
| Download Submitted Version (ext.)
| WoS