Kai Samelin

According to our database1, Kai Samelin authored at least 37 papers between 2011 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Foundations of Dynamic Group Signatures: The Case of Malicious Openers and Issuers.
IACR Cryptol. ePrint Arch., 2025

2021
Issuer-Hiding Attribute-Based Credentials.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-quantum Assumptions.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes.
Proceedings of the Public-Key Cryptography - PKC 2020, 2020

Policy-Based Sanitizable Signatures.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

2019
Fully Invisible Protean Signatures Schemes.
IACR Cryptol. ePrint Arch., 2019

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Practical Group-Signatures with Privacy-Friendly Openings.
Proceedings of the 14th International Conference on Availability, Reliability and Security, 2019

2018
Personal and Password-Based Cryptography.
PhD thesis, 2018

Protean Signature Schemes.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.
Proceedings of the Public-Key Cryptography - PKC 2017, 2017

Accumulators with Applications to Anonymity-Preserving Revocation.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

UC-Secure Non-interactive Public-Key Encryption.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Position Paper: The Past, Present, and Future of Sanitizable and Redactable Signatures.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Practical Signing-Right Revocation.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Virtual Smart Cards: How to Sign with a Password and a Server.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Resilient allocation of service Function chains.
Proceedings of the 2016 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2016

Integrity and Authenticity Protection with Selective Disclosure Control in the Cloud & IoT.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Cryptographically Enforced Four-Eyes Principle.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
A General Framework for Redactable Signatures and New Constructions.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015

Stronger Security for Sanitizable Signatures.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Accountable Redactable Signatures.
Proceedings of the 10th International Conference on Availability, Reliability and Security, 2015

2014
On the Relation between Redactable and Sanitizable Signature Schemes.
Proceedings of the Engineering Secure Software and Systems - 6th International Symposium, 2014

On Updatable Redactable Signatures.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Malleable Signatures for Resource Constrained Platforms.
Proceedings of the Information Security Theory and Practice. Security of Mobile and Cyber-Physical Systems, 2013

Efficient and Perfectly Unlinkable Sanitizable Signatures without Group Signatures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2013

Scope of Security Properties of Sanitizable Signatures Revisited.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Rechtsfolgen editierbarer Signaturen.
Datenschutz und Datensicherheit, 2012

Flexible Redactable Signature Schemes for Trees - Extended Security Model and Construction.
Proceedings of the SECRYPT 2012, 2012

Redactable Signatures for Independent Removal of Structure and Content.
Proceedings of the Information Security Practice and Experience, 2012

Redactable Signature Schemes for Trees with Signer-Controlled Non-Leaf-Redactions.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2012

Non-interactive Public Accountability for Sanitizable Signatures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

On Structural Signatures for Tree Data Structures.
Proceedings of the Applied Cryptography and Network Security, 2012

2011
Sanitizable signed privacy preferences for social networks.
Proceedings of the 41. Jahrestagung der Gesellschaft für Informatik, 2011

Sanitizable Signatures in XML Signature - Performance, Mixing Properties, and Revisiting the Property of Transparency.
Proceedings of the Applied Cryptography and Network Security, 2011


  Loading...