Gregory Neven

According to our database1, Gregory Neven authored at least 79 papers between 2000 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
vetKeys: How a Blockchain Can Keep Many Secrets.
IACR Cryptol. ePrint Arch., 2023

2020
Zone Encryption with Anonymous Authentication for V2V Communication.
IACR Cryptol. ePrint Arch., 2020

Short Threshold Dynamic Group Signatures.
IACR Cryptol. ePrint Arch., 2020

2019
Forward-Secure Multi-Signatures.
IACR Cryptol. ePrint Arch., 2019

Pixel: Multi-signatures for Consensus.
IACR Cryptol. ePrint Arch., 2019

Password-Authenticated Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

On the Security of Two-Round Multi-Signatures.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
Robust Encryption.
J. Cryptol., 2018

Okamoto Beats Schnorr: On the Provable Security of Multi-Signatures.
IACR Cryptol. ePrint Arch., 2018

The Wonderful World of Global Random Oracles.
IACR Cryptol. ePrint Arch., 2018

Floppy-Sized Group Signatures from Lattices.
IACR Cryptol. ePrint Arch., 2018

Compact Multi-Signatures for Smaller Blockchains.
IACR Cryptol. ePrint Arch., 2018

2017
Practical Quantum-Safe Voting from Lattices.
IACR Cryptol. ePrint Arch., 2017

One-Shot Verifiable Encryption from Lattices.
IACR Cryptol. ePrint Arch., 2017

Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs.
IACR Cryptol. ePrint Arch., 2017

Privacy-preserving attribute-based credentials in cooperative intelligent transport systems.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017

UC-Secure Non-interactive Public-Key Encryption.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
POSTER: Toward a Secure and Scalable Attestation.
Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2016

SANA: Secure and Scalable Aggregate Network Attestation.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Virtual Smart Cards: How to Sign with a Password and a Server.
IACR Cryptol. ePrint Arch., 2015

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
IACR Cryptol. ePrint Arch., 2015

A Single Password for Everything?
ERCIM News, 2015

Optimal Distributed Password Verification.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

Cryptographic Protocols Underlying Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Concepts and languages for privacy-preserving attribute-based authentication.
J. Inf. Secur. Appl., 2014

Privacy-Preserving Auditing for Attribute-Based Credentials.
IACR Cryptol. ePrint Arch., 2014

Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment.
IACR Cryptol. ePrint Arch., 2014

Formal Treatment of Privacy-Enhancing Credential Systems.
IACR Cryptol. ePrint Arch., 2014

Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Anonymously sharing Flickr pictures with facebook friends.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.
Proceedings of the Policies and Research in Identity Management, 2013

2012
Electronic Identities Need Private Credentials.
IEEE Secur. Priv., 2012

Fully Anonymous Attribute Tokens from Lattices.
IACR Cryptol. ePrint Arch., 2012

Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing.
IACR Cryptol. ePrint Arch., 2012

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2012

2011
Efficient Sequential Aggregate Signed Data.
IEEE Trans. Inf. Theory, 2011

Wildcarded Identity-Based Encryption.
J. Cryptol., 2011

Oblivious Transfer with Hidden Access Control Policies.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Cryptographic Mechanisms for Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

Matching Privacy Policies and Preferences: Access Control, Obligations, Authorisations, and Downstream Usage.
Proceedings of the Privacy and Identity Management for Life, 2011

Advances in Access Control Policies.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
J. Comput. Secur., 2010

Get Shorty via Group Signatures without Encryption.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

A card requirements language enabling privacy-preserving access control.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Downstream Usage Control.
Proceedings of the POLICY 2010, 2010

Fine-Grained Disclosure of Access Policies.
Proceedings of the Information and Communications Security - 12th International Conference, 2010

Unlinkable Priced Oblivious Transfer with Rechargeable Wallets.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

Privacy-enhanced access control in primelife.
Proceedings of the 6th Workshop on Digital Identity Management, 2010

Enabling Privacy-preserving Credential-based Access Control with XACML and SAML.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Identity-Based Signatures.
Proceedings of the Identity-Based Cryptography, 2009

Security Proofs for Identity-Based Identification and Signature Schemes.
J. Cryptol., 2009

Hash function requirements for Schnorr signatures.
J. Math. Cryptol., 2009

Oblivious Transfer with Access Control.
IACR Cryptol. ePrint Arch., 2009

Saving On-Line Privacy.
Proceedings of the Privacy and Identity Management for Life, 2009

2008
A simple transitive signature scheme for directed trees.
Theor. Comput. Sci., 2008

Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions.
J. Cryptol., 2008

Generalised key delegation for hierarchical identity-based encryption.
IET Inf. Secur., 2008

Simulatable Adaptive Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2008

2007
A Study of Blind Message Authentication Codes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Seven-Property-Preserving Iterated Hashing: ROX.
IACR Cryptol. ePrint Arch., 2007

Generalized Key Delegation for Hierarchical Identity-Based Encryption.
IACR Cryptol. ePrint Arch., 2007

Protection and Retrieval of Encrypted Multimedia Content: When Cryptography Meets Signal Processing.
EURASIP J. Inf. Secur., 2007

Identity-Based Traitor Tracing.
Proceedings of the Public Key Cryptography, 2007

Identity-Based Multi-signatures from RSA.
Proceedings of the Topics in Cryptology, 2007

2006
Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.
IACR Cryptol. ePrint Arch., 2006

Unrestricted Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2006

Identity-Based Encryption Gone Wild.
IACR Cryptol. ePrint Arch., 2006

Private Policy Negotiation.
Proceedings of the Financial Cryptography and Data Security, 2006

On the (Im)possibility of Blind Message Authentication Codes.
Proceedings of the Topics in Cryptology, 2006

Multi-signatures in the plain public-Key model and a general forking lemma.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Transitive signatures: new schemes and proofs.
IEEE Trans. Inf. Theory, 2005

2003
Secure Vickrey Auctions without a Trusted Third Party.
Proceedings of the Security and Privacy in the Age of Uncertainty, 2003

2002
Transitive Signatures Based on Factoring and RSA.
Proceedings of the Advances in Cryptology, 2002

2001
On Securely Scheduling a Meeting.
Proceedings of the Trusted Information: The New Decade Challenge, 2001

Second Price Auctions - A Case Study of Secure Distributed Computating.
Proceedings of the New Developments in Distributed Applications and Interoperable Systems, 2001

2000
On the Practical Feasibiltiy of Secure Distributed Computing: A Case Study.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Semi-trusted Hosts and Mobile Agents: Enabling Secure Distributed Computations.
Proceedings of the Mobile Agents for Telecommunication Applications, 2000


  Loading...