Gregory Neven

According to our database1, Gregory Neven authored at least 76 papers between 2000 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Forward-Secure Multi-Signatures.
IACR Cryptology ePrint Archive, 2019

Pixel: Multi-signatures for Consensus.
IACR Cryptology ePrint Archive, 2019

Password-Authenticated Public-Key Encryption.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures.
IACR Cryptology ePrint Archive, 2018

Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.
Proceedings of the Information Security - 21st International Conference, 2018

The Wonderful World of Global Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Compact Multi-signatures for Smaller Blockchains.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Floppy-Sized Group Signatures from Lattices.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
Privacy-preserving attribute-based credentials in cooperative intelligent transport systems.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

One-Shot Verifiable Encryption from Lattices.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

UC-Secure Non-interactive Public-Key Encryption.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Practical Quantum-Safe Voting from Lattices.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

2016
POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

Virtual Smart Cards: How to Sign with a Password and a Server.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
A Single Password for Everything?
ERCIM News, 2015

Formal Treatment of Privacy-Enhancing Credential Systems.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Optimal Distributed Password Verification.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

Cryptographic Protocols Underlying Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Concepts and languages for privacy-preserving attribute-based authentication.
J. Inf. Sec. Appl., 2014

Privacy-Preserving Auditing for Attribute-Based Credentials.
Proceedings of the Computer Security - ESORICS 2014, 2014

Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Anonymously sharing Flickr pictures with facebook friends.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.
Proceedings of the Policies and Research in Identity Management, 2013

2012
Electronic Identities Need Private Credentials.
IEEE Security & Privacy, 2012

Fully Anonymous Attribute Tokens from Lattices.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Practical yet universally composable two-server password-authenticated secret sharing.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Wildcarded Identity-Based Encryption.
J. Cryptology, 2011

Oblivious Transfer with Hidden Access Control Policies.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Cryptographic Mechanisms for Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage.
Proceedings of the Privacy and Identity Management for Life, 2011

Advances in Access Control Policies.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
Journal of Computer Security, 2010

Robust Encryption.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

Get Shorty via Group Signatures without Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

A card requirements language enabling privacy-preserving access control.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Downstream Usage Control.
Proceedings of the POLICY 2010, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Unlinkable Priced Oblivious Transfer with Rechargeable Wallets.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Privacy-enhanced access control in primelife.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Identity-Based Signatures.
Proceedings of the Identity-Based Cryptography, 2009

Hash function requirements for Schnorr signatures.
J. Mathematical Cryptology, 2009

Saving On-Line Privacy.
Proceedings of the Privacy and Identity Management for Life, 2009

Oblivious transfer with access control.
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009

2008
A simple transitive signature scheme for directed trees.
Theor. Comput. Sci., 2008

Generalised key delegation for hierarchical identity-based encryption.
IET Information Security, 2008

Efficient Sequential Aggregate Signed Data.
Proceedings of the Advances in Cryptology, 2008

2007
A Study of Blind Message Authentication Codes.
IEICE Transactions, 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Information Security, 2007

Identity-Based Traitor Tracing.
Proceedings of the Public Key Cryptography, 2007

Unrestricted Aggregate Signatures.
Proceedings of the Automata, Languages and Programming, 34th International Colloquium, 2007

Simulatable Adaptive Oblivious Transfer.
Proceedings of the Advances in Cryptology, 2007

Generalized Key Delegation for Hierarchical Identity-Based Encryption.
Proceedings of the Computer Security, 2007

Identity-Based Multi-signatures from RSA.
Proceedings of the Topics in Cryptology, 2007

Seven-Property-Preserving Iterated Hashing: ROX.
Proceedings of the Advances in Cryptology, 2007

Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Identity-Based Encryption Gone Wild.
Proceedings of the Automata, Languages and Programming, 33rd International Colloquium, 2006

Private Policy Negotiation.
Proceedings of the Financial Cryptography and Data Security, 2006

On the (Im)possibility of Blind Message Authentication Codes.
Proceedings of the Topics in Cryptology, 2006

Multi-signatures in the plain public-Key model and a general forking lemma.
Proceedings of the 13th ACM Conference on Computer and Communications Security, CCS 2006, Alexandria, VA, USA, Ioctober 30, 2006

2005
Transitive signatures: new schemes and proofs.
IEEE Trans. Information Theory, 2005

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
Proceedings of the Advances in Cryptology, 2005

2004
Transitive Signatures: New Schemes and Proofs.
IACR Cryptology ePrint Archive, 2004

Security Proofs for Identity-Based Identification and Signature Schemes.
Proceedings of the Advances in Cryptology, 2004

2003
Secure Vickrey Auctions without a Trusted Third Party.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Transitive Signatures Based on Factoring and RSA.
Proceedings of the Advances in Cryptology, 2002

2001
On Securely Scheduling a Meeting.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Second Price Auctions - A Case Study of Secure Distributed Computating.
Proceedings of the New Developments in Distributed Applications and Interoperable Systems, 2001

2000
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations.
Proceedings of the Mobile Agents for Telecommunication Applications, 2000


  Loading...