David Derler

Orcid: 0000-0002-5345-3906

According to our database1, David Derler authored at least 33 papers between 2011 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications.
Proceedings of the Financial Cryptography and Data Security, 2021

2020
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

2019
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
IACR Cryptol. ePrint Arch., 2019

Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge.
Des. Codes Cryptogr., 2019

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
IACR Cryptol. ePrint Arch., 2018

Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs.
Des. Codes Cryptogr., 2018

Generic Double-Authentication Preventing Signatures and a Post-quantum Instantiation.
Proceedings of the Provable Security, 2018

Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Revisiting Proxy Re-encryption: Forward Secrecy, Improved Security, and Applications.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Short Double- and N-Times-Authentication-Preventing Signatures from ECDSA and More.
Proceedings of the 2018 IEEE European Symposium on Security and Privacy, 2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Highly-Efficient Fully-Anonymous Dynamic Group Signatures.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

2017
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation.
Proceedings of the Financial Cryptography and Data Security, 2017

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
Key-Homomorphic Signatures and Applications to Multiparty Signatures.
IACR Cryptol. ePrint Arch., 2016

Fully-Anonymous Short Dynamic Group Signatures Without Encryption.
IACR Cryptol. ePrint Arch., 2016

Digital Signatures from Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2016

Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
Proceedings of the Topics in Cryptology - CT-RSA 2016 - The Cryptographers' Track at the RSA Conference 2016, San Francisco, CA, USA, February 29, 2016

Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

2015
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower.
IACR Cryptol. ePrint Arch., 2015

Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes.
Proceedings of the Provable Security, 2015

Towards Authenticity and Privacy Preserving Accountable Workflows.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015

A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials.
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015

A General Framework for Redactable Signatures and New Constructions.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives.
Proceedings of the Topics in Cryptology, 2015

2014
Open Source für europäische Signaturen.
Datenschutz und Datensicherheit, 2014

Blank Digital Signatures: Optimization and Practical Experiences.
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014

Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

2011
Anonymous Ticketing for NFC-Enabled Mobile Phones.
Proceedings of the Trusted Systems - Third International Conference, 2011


  Loading...