Daniel Slamanig

Orcid: 0000-0002-4181-2561

Affiliations:
  • Universität der Bundeswehr München, Germany
  • AIT Austrian Institute of Technology, Center for Digital Safety & Security, Vienna, Austria (former)
  • Graz University of Technology, Institute for Applied Information Processing and Communications, Austria (former)


According to our database1, Daniel Slamanig authored at least 116 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
(Inner-Product) Functional Encryption with Updatable Ciphertexts.
J. Cryptol., March, 2024

Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation.
IEEE Trans. Dependable Secur. Comput., 2024

Towards a single device for multiple security domains.
J. Univers. Comput. Sci., 2024

Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2024

2023
Practical Delegatable Anonymous Credentials From Equivalence Class Signatures.
Proc. Priv. Enhancing Technol., July, 2023

Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging.
IACR Cryptol. ePrint Arch., 2023

To Pass or Not to Pass: Privacy-Preserving Physical Access Control.
IACR Cryptol. ePrint Arch., 2023

Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023

SoK: Signatures With Randomizable Keys.
IACR Cryptol. ePrint Arch., 2023

Universally Composable NIZKs: Circuit-Succinct, Non-Malleable and CRS-Updatable.
IACR Cryptol. ePrint Arch., 2023

SD4MSD: Using a Single Device for Multiple Security Domains.
ERCIM News, 2023

Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Optimizing 0-RTT Key Exchange with Full Forward Security.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

Threshold Structure-Preserving Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Structure-Preserving Threshold Signatures.
IACR Cryptol. ePrint Arch., 2022

Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions.
IACR Cryptol. ePrint Arch., 2022

CRS-Updatable Asymmetric Quasi-Adaptive NIZK Arguments.
IACR Cryptol. ePrint Arch., 2022

2021
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
J. Cryptol., 2021

Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates.
IACR Cryptol. ePrint Arch., 2021

With a Little Help from My Friends: Constructing Practical Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2021

Updatable Signatures and Message Authentication Codes.
IACR Cryptol. ePrint Arch., 2021

Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.
IACR Cryptol. ePrint Arch., 2021

Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications.
Proceedings of the Financial Cryptography and Data Security, 2021

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2021, 2021

Subversion-Resistant Quasi-adaptive NIZK and Applications to Modular Zk-SNARKs.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Fully invisible protean signatures schemes.
IET Inf. Secur., 2020

Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.
IACR Cryptol. ePrint Arch., 2020

Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes.
IACR Cryptol. ePrint Arch., 2020

Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2020

CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors.
IACR Cryptol. ePrint Arch., 2020

Generic Constructions of Incremental and Homomorphic Timed-Release Encryption.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.
IACR Cryptol. ePrint Arch., 2020

Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020

Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
IACR Cryptol. ePrint Arch., 2020

2019
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials.
J. Cryptol., 2019

Policy-Based Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2019

Structure-Preserving Signatures on Equivalence Classes From Standard Assumptions.
IACR Cryptol. ePrint Arch., 2019

Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs.
IACR Cryptol. ePrint Arch., 2019

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
IACR Cryptol. ePrint Arch., 2019

I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
IACR Cryptol. ePrint Arch., 2019

A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.
IACR Cryptol. ePrint Arch., 2019

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge.
Des. Codes Cryptogr., 2019

2018
Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications.
IACR Cryptol. ePrint Arch., 2018

Protean Signature Schemes.
IACR Cryptol. ePrint Arch., 2018

Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation.
IACR Cryptol. ePrint Arch., 2018

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications.
IACR Cryptol. ePrint Arch., 2018

Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs.
Des. Codes Cryptogr., 2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Highly-Efficient Fully-Anonymous Dynamic Group Signatures.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More.
IACR Cryptol. ePrint Arch., 2017

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2017

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation.
IACR Cryptol. ePrint Arch., 2017

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2017

Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

2016
The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality.
J. Inf. Secur. Appl., 2016

Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks.
IACR Cryptol. ePrint Arch., 2016

Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2016

Key-Homomorphic Signatures and Applications to Multiparty Signatures.
IACR Cryptol. ePrint Arch., 2016

Fully-Anonymous Short Dynamic Group Signatures Without Encryption.
IACR Cryptol. ePrint Arch., 2016

Digital Signatures from Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2016

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
IACR Cryptol. ePrint Arch., 2016

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
IACR Cryptol. ePrint Arch., 2016

PRISMACLOUD - Privacy and Security Maintaining Services in the Cloud.
ERCIM News, 2016

A New Architecture for Developing Cryptographic Cloud Services.
ERCIM News, 2016

Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
On the Feasibility of (Practical) Commercial Anonymous Cloud Storage.
Trans. Data Priv., 2015

Privacy-Aware Authentication in the Internet of Things.
IACR Cryptol. ePrint Arch., 2015

Practical Round-Optimal Blind Signatures in the Standard Model.
IACR Cryptol. ePrint Arch., 2015

Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower.
IACR Cryptol. ePrint Arch., 2015

Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes.
IACR Cryptol. ePrint Arch., 2015

A General Framework for Redactable Signatures and New Constructions.
IACR Cryptol. ePrint Arch., 2015

Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives.
IACR Cryptol. ePrint Arch., 2015

Design strategies for a privacy-friendly Austrian eID system in the public cloud.
Comput. Secur., 2015

Towards Authenticity and Privacy Preserving Accountable Workflows.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

Cloud Security and Privacy by Design.
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015

Towards a New Paradigm for Privacy and Security in Cloud Services.
Proceedings of the Cyber Security and Privacy, 2015

ARCHISTAR: Towards Secure and Robust Cloud Based Data Sharing.
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015

2014
Adding Controllable Linkability to Pairing-Based Group Signatures For Free.
IACR Cryptol. ePrint Arch., 2014

EUF-CMA-Secure Structure-Preserving Signatures on Equivalence Classes.
IACR Cryptol. ePrint Arch., 2014

Privacy-Enhancing Proxy Signatures from Non-Interactive Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2014

User-centric identity as a service-architecture for eIDs with selective attribute disclosure.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Blank Digital Signatures: Optimization and Practical Experiences.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.
Proceedings of the Communications and Multimedia Security, 2014

Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Warrant-Hiding Delegation-by-Certificate Proxy Signature Schemes.
IACR Cryptol. ePrint Arch., 2013

Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013

Blank Digital Signatures.
IACR Cryptol. ePrint Arch., 2013

Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Privacy-preserving Realization of the STORK Framework in the Public Cloud.
Proceedings of the SECRYPT 2013, 2013

On Privacy-Preserving Ways to Porting the Austrian eID System to the Public Cloud.
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013

2012
Vollständigkeitsnachweis für Daten im Cloud Computing.
Datenschutz und Datensicherheit, 2012

A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Practical Privacy Preserving Cloud Resource-Payment for Constrained Clients.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

On cloud storage and the cloud of clouds approach.
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012

Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012

2011
Redigierbare Digitale Signaturen - Theorie und Praxis.
Datenschutz und Datensicherheit, 2011

Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Anonymous Authentication from Public-Key Encryption Revisited - (Extended Abstract).
Proceedings of the Communications and Multimedia Security, 2011

On Security and Privacy in Cloud Computing.
Proceedings of the CLOSER 2011, 2011

2010
Anonymous but Authorized Transactions Supporting Selective Traceability.
Proceedings of the SECRYPT 2010, 2010

Selectively Traceable Anonymous and Unlinkable Token-Based Transactions.
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010

Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.
Proceedings of the Communications and Multimedia Security, 2010

k-Anonymity in Context of Digitally Signed CDA Documents.
Proceedings of the HEALTHINF 2010, 2010

2009
Practical Traceable Anonymous Identification.
Proceedings of the SECRYPT 2009, 2009

Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy.
Proceedings of the Biomedical Engineering Systems and Technologies, 2009

How to Preserve Patient's Privacy and Anonymity in Web-based Electronic Health Records.
Proceedings of the Second International Conference on Health Informatics, 2009

2008
Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks.
Int. J. Bus. Intell. Data Min., 2008

Anonymity and Application Privacy in Context of Mobile Computing in eHealth.
Proceedings of the Mobile Response, 2008

Investigating Anonymity in Group Based Anonymous Authentication.
Proceedings of the Future of Identity in the Information Society, 2008

Privacy Aspects of eHealth.
Proceedings of the The Third International Conference on Availability, 2008


  Loading...