Jörn Müller-Quade

Affiliations:
  • Karlsruhe Institute of Technology, Germany


According to our database1, Jörn Müller-Quade authored at least 119 papers between 1998 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Chosen-Ciphertext Secure Dual-Receiver Encryption in the Standard Model Based on Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2024

Hidden Δ-fairness: A Novel Notion for Fair Secure Two-Party Computation.
IACR Cryptol. ePrint Arch., 2024

2023
Sender-binding Key Encapsulation.
IACR Cryptol. ePrint Arch., 2023

Universally Composable Auditable Surveillance.
IACR Cryptol. ePrint Arch., 2023

Composable Long-Term Security with Rewinding.
IACR Cryptol. ePrint Arch., 2023

Protection Against Subversion Corruptions via Reverse Firewalls in the plain Universal Composability Framework.
IACR Cryptol. ePrint Arch., 2023

On the Correlation Complexity of MPC with Cheater Identification.
Proceedings of the Financial Cryptography and Data Security, 2023

Practically Efficient Private Set Intersection from Trusted Hardware with Side-Channels.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability.
IACR Cryptol. ePrint Arch., 2022

Hardening the Security of Server-Aided MPC Using Remotely Unhackable Hardware Modules.
Proceedings of the Sicherheit, 2022

Recent Developments in the Context of Online Elections and Digital Polls in Germany.
Proceedings of the Sicherheit, 2022

2021
Fortified Multi-Party Computation: Taking Advantage of Simple Secure Hardware Modules.
Proc. Priv. Enhancing Technol., 2021

And Paper-Based is Better? Towards Comparability of Classic and Cryptographic Voting Schemes.
IACR Cryptol. ePrint Arch., 2021

Environmentally Friendly Composable Multi-Party Computation in the Plain Model from Standard (Timed) Assumptions.
IACR Cryptol. ePrint Arch., 2021

A New Security Notion for PKC in the Standard Model: Weaker, Simpler, and Still Realizing Secure Channels.
IACR Cryptol. ePrint Arch., 2021

ETHTID: Deployable Threshold Information Disclosure on Ethereum.
Proceedings of the Third International Conference on Blockchain Computing and Applications, 2021

2020
Constructing Secure Multi-Party Computation with Identifiable Abort.
IACR Cryptol. ePrint Arch., 2020

ConTra Corona: Contact Tracing against the Coronavirus by Bridging the Centralized - Decentralized Divide for Stronger Privacy.
IACR Cryptol. ePrint Arch., 2020

On the Composability of Statistically Secure Random Oblivious Transfer.
Entropy, 2020

SES-14: Sichere und zuverlässliche Systeme: Datensouveränität.
Proceedings of the 50. Jahrestagung der Gesellschaft für Informatik, INFORMATIK 2020 - Back to the Future, Karlsruhe, Germany, 28. September, 2020

2019
Your Money or Your Life - Modeling and Analyzing the Security of Electronic Payment in the UC Framework.
IACR Cryptol. ePrint Arch., 2019

Editorial.
Autom., 2019

2018
On the (Im-)Possibility of Extending Coin Toss.
J. Cryptol., 2018

Fortified Universal Composability: Taking Advantage of Simple Secure Hardware Modules.
IACR Cryptol. ePrint Arch., 2018

Sicherheit auf festem Fundament.
Datenschutz und Datensicherheit, 2018

Karlsruher Thesen zur Digitalen Souveränität Europas.
Datenschutz und Datensicherheit, 2018

Reusing Tamper-Proof Hardware in UC-Secure Protocols.
Proceedings of the Public-Key Cryptography - PKC 2018, 2018

Towards Efficient Software Protection Obeying Kerckhoffs's Principle using Tamper-proof Hardware.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

Encrypted Multisensor Information Filtering.
Proceedings of the 21st International Conference on Information Fusion, 2018

2017
A Novel Cryptographic Framework for Cloud File Systems and CryFS, a Provably-Secure Construction.
IACR Cryptol. ePrint Arch., 2017

Non-Malleability vs. CCA-Security: The Case of Commitments.
IACR Cryptol. ePrint Arch., 2017

Sicherheit relativ definieren.
Datenschutz und Datensicherheit, 2017

2016
Universally Composable (Non-Interactive) Two-Party Computation from Untrusted Reusable Hardware Tokens.
IACR Cryptol. ePrint Arch., 2016

From Stateful Hardware to Resettable Hardware Using Symmetric Assumptions.
IACR Cryptol. ePrint Arch., 2016

Concurrently Composable Security With Shielded Super-polynomial Simulators.
IACR Cryptol. ePrint Arch., 2016

Oblivious Voting: Hiding Votes from the Voting Machine in Bingo Voting.
Proceedings of the 13th International Joint Conference on e-Business and Telecommunications (ICETE 2016), 2016

Towards Realising Oblivious Voting.
Proceedings of the E-Business and Telecommunications - 13th International Joint Conference, 2016

ZeTA-Zero-Trust Authentication: Relying on Innate Human Ability, Not Technology.
Proceedings of the IEEE European Symposium on Security and Privacy, 2016

A Formal Treatment of Privacy in Video Data.
Proceedings of the Computer Security - ESORICS 2016, 2016

2015
Information-theoretically secure oblivious polynomial evaluation in the commodity-based model.
Int. J. Inf. Sec., 2015

Weakening the Isolation Assumption of Tamper-proof Hardware Tokens.
IACR Cryptol. ePrint Arch., 2015

Universally Composable Firewall Architectures using Trusted Hardware.
IACR Cryptol. ePrint Arch., 2015

Daten verschlüsselt speichern und verarbeiten in der Cloud.
Datenschutz und Datensicherheit, 2015

Synchronous Universally Composable Computer Networks.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

Closing the Gap: A Universal Privacy Framework for Outsourced Data.
Proceedings of the Cryptography and Information Security in the Balkans, 2015

2014
General Statistically Secure Computation with Bounded-Resettable Hardware Tokens.
IACR Cryptol. ePrint Arch., 2014

Wireless Key Exchange Using Frequency Impairments.
Proceedings of the Information Security Applications - 15th International Workshop, 2014

A Provably Privacy Preserving Video Surveillance Architecture for an Assisted Living Community.
Proceedings of the 44. Jahrestagung der Gesellschaft für Informatik, Big Data, 2014

2013
Polynomial Runtime and Composability.
J. Cryptol., 2013

Das Kryptologikum.
Datenschutz und Datensicherheit, 2013

Implementing Resettable UC-Functionalities with Untrusted Tamper-Proof Hardware-Tokens.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Structural Composition Attacks on Anonymized Data.
Proceedings of the Sicherheit 2014: Sicherheit, 2013

Symmetric Searchable Encryption for Exact Pattern Matching using Directed Acyclic Word Graphs.
Proceedings of the SECRYPT 2013, 2013

Lossy Codes and a New Variant of the Learning-With-Errors Problem.
Proceedings of the Advances in Cryptology, 2013

Defining Privacy Based on Distributions of Privacy Breaches.
Proceedings of the Number Theory and Cryptography, 2013

2012
A CCA2 Secure Variant of the McEliece Cryptosystem.
IEEE Trans. Inf. Theory, 2012

Oblivious Transfer Based on the McEliece Assumptions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

David & Goliath Oblivious Affine Function Evaluation - Asymptotically Optimal Building Blocks for Universally Composable Two-Party Computation from a Single Untrusted Stateful Tamper-Proof Hardware Token.
IACR Cryptol. ePrint Arch., 2012

Statistically Secure Linear-Rate Dimension Extension for Oblivious Affine Function Evaluation.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

Universally Composable Oblivious Transfer from Lossy Encryption and the McEliece Assumptions.
Proceedings of the Information Theoretic Security - 6th International Conference, 2012

IND-CCA Secure Cryptography Based on a Variant of the LPN Problem.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
KASTEL - An Application-Driven Center of Excellence for IT Security.
it Inf. Technol., 2011

Software Security in Virtualized Infrastructures - The Smart Meter Example.
it Inf. Technol., 2011

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Basing Obfuscation on Simple Tamper-Proof Hardware Assumptions.
IACR Cryptol. ePrint Arch., 2011

Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Unconditional and Composable Security Using a Single Stateful Tamper-Proof Hardware Token.
Proceedings of the Theory of Cryptography - 8th Theory of Cryptography Conference, 2011

Methods to Secure Services in an Untrusted Environment.
Proceedings of the Software Engineering 2011: Fachtagung des GI-Fachbereichs Softwaretechnik, 2011

Efficient Reductions for Non-signaling Cryptographic Primitives.
Proceedings of the Information Theoretic Security - 5th International Conference, 2011

Towards secure cloud computing through a separation of duties.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Social key exchange network - from ad-hoc key exchange to a dense key network.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

2010
Long-Term Security and Universal Composability.
J. Cryptol., 2010

Completeness Theorems with Constructive Proofs for Finite Deterministic 2-Party Functions (full version).
IACR Cryptol. ePrint Arch., 2010

Composability in quantum cryptography
CoRR, 2010

Vulnerabilities of Wireless Key Exchange Based on Channel Reciprocity.
Proceedings of the Information Security Applications - 11th International Workshop, 2010

Privacy-Aware Folksonomies.
Proceedings of the Research and Advanced Technology for Digital Libraries, 2010

2009
Enhancing electronic voting machines on the example of Bingo voting.
IEEE Trans. Inf. Forensics Secur., 2009

Polynomial runtime in simulatability definitions.
J. Comput. Secur., 2009

Universally Composable Incoercibility.
IACR Cryptol. ePrint Arch., 2009

Bingo Voting - Sichere Wahlen mit Wahlcomputern.
Datenschutz und Datensicherheit, 2009

Brief Announcement: Towards Secure Cloud Computing.
Proceedings of the Stabilization, 2009

2008
Secure Computability of Functions in the IT setting with Dishonest Majority and Applications to Long-Term Security.
IACR Cryptol. ePrint Arch., 2008

A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.
IACR Cryptol. ePrint Arch., 2008

On the Composability of Statistically Secure Bit Commitments.
IACR Cryptol. ePrint Arch., 2008

2007
Bingo Voting: Secure and coercion-free voting using a trusted random number generator.
IACR Cryptol. ePrint Arch., 2007

2006
Computing restrictions of ideals in finitely generated <i>k</i>-algebras by means of Buchberger's algorithm.
J. Symb. Comput., 2006

Quantum cryptography beyond key exchange.
Inform. Forsch. Entwickl., 2006

Guest editorial.
Inform. Forsch. Entwickl., 2006

On the Necessity of Rewinding in Secure Multiparty Computation.
IACR Cryptol. ePrint Arch., 2006

2005
An information theoretical model for quantum secret sharing.
Quantum Inf. Comput., 2005

Cryptanalysis of a practical quantum key distribution with polarization-entangled photons.
Quantum Inf. Comput., 2005

On Fairness in Simulatability-based Cryptographic Systems.
IACR Cryptol. ePrint Arch., 2005

Fairness and Correctness in Case of a Premature Abort.
Proceedings of the Progress in Cryptology, 2005

Temporary assumptions - quantum and classical.
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005

2004
On the Security and Composability of the One Time Pad.
IACR Cryptol. ePrint Arch., 2004

A Synchronous Model for Multi-Party Computation and the Incompleteness of Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2004

Universally Composable Commitments Using Random Oracles.
Proceedings of the Theory of Cryptography, First Theory of Cryptography Conference, 2004

Rates for bit commitment and coin tossing from noisy correlation.
Proceedings of the 2004 IEEE International Symposium on Information Theory, 2004

Bit String Commitment Reductions with a Non-zero Rate.
Proceedings of the Topics in Cryptology, 2004

Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model.
Proceedings of the Applied Cryptography and Network Security, 2004

Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
On the problem of authentication in a quantum protocol to detect traffic analysis.
Quantum Inf. Comput., 2003

Initiator-Resilient Universally Composable Key Exchange.
IACR Cryptol. ePrint Arch., 2003

On Modeling IND-CCA Security in Cryptographic Protocols.
IACR Cryptol. ePrint Arch., 2003

Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations.
Proceedings of the Information Security, 6th International Conference, 2003

Unconditionally Secure Homomorphic Pre-distributed Commitments.
Proceedings of the Applied Algebra, 2003

2002
On "A New Representation of Elements of Finite Fields GF (2<sup>m</sup>) Yielding Small Complexity Arithmetic Circuits".
IEEE Trans. Computers, 2002

Über Quantencomputer und Quantenkryptographie.
Datenschutz und Datensicherheit, 2002

2001
Quantum Identification Protocol with Technologically Bounded Parties.
Electron. Notes Discret. Math., 2001

More Robust Multiparty Protocols with Oblivious Transfer
CoRR, 2001

2000
Gröbner Bases Applied to Finitely Generated Field Extensions.
J. Symb. Comput., 2000

Anonymous Oblivious Transfer
CoRR, 2000

Separation of Orbits under Group Actions with an Application to Quantum Systems.
Appl. Algebra Eng. Commun. Comput., 2000

Recognizing Simple Subextensions of Purely Transcendental Field Extensions.
Appl. Algebra Eng. Commun. Comput., 2000

1999
Basic Algorithms for Rational Function Fields.
J. Symb. Comput., 1999

Calculating Generators for Invariant Fields of Linear Algebraic Groups.
Proceedings of the Applied Algebra, 1999

1998
Computing the Intersection of finitely generated fields.
SIGSAM Bull., 1998

Deciding Linear Disjointness of Finitely Generated Fields.
Proceedings of the 1998 International Symposium on Symbolic and Algebraic Computation, 1998

Algorithmen zur Dekomposition rationaler Abbildungen.
PhD thesis, 1998


  Loading...