Kristian Gjøsteen

Orcid: 0000-0001-7317-8625

According to our database1, Kristian Gjøsteen authored at least 64 papers between 2003 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Honest Users Make Honest Mistakes: A Framework for Analysing eID Protocols.
IACR Cryptol. ePrint Arch., 2025

2024
Depth Optimized Circuits for Lattice Based Voting with Large Candidate Sets.
IACR Cryptol. ePrint Arch., 2024

Password-authenticated Key Exchange and Applications.
IACR Cryptol. ePrint Arch., 2024

Token-Based Key Exchange - Non-Interactive Key Exchange meets Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2024

2023
Security Model for Privacy-Preserving Blockchain-Based Cryptocurrency Systems.
Proceedings of the Network and System Security - 17th International Conference, 2023

Hybrid Group Key Exchange with Application to Constrained Networks.
Proceedings of the Information Security - 26th International Conference, 2023

Coercion Mitigation for Voting Systems with Trackers: A Selene Case Study.
Proceedings of the Electronic Voting: 8th International Joint Conference, 2023

Machine-Checked Proofs of Accountability: How to sElect Who is to Blame.
Proceedings of the Computer Security - ESORICS 2023, 2023

On Optimal Tightness for Key Exchange with Full Forward Secrecy via Key Confirmation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

Verifiable Mix-Nets and Distributed Decryption for Voting from Lattice-Based Assumptions.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

Modeling Noise-Accepting Key Exchange.
Proceedings of the Code-Based Cryptography - 11th International Workshop, 2023

2022
PriBank: Confidential Blockchain Scaling Using Short Commit-and-Proof NIZK Argument.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

Machine-Checked Proofs of Privacy Against Malicious Boards for Selene & Co.
Proceedings of the 35th IEEE Computer Security Foundations Symposium, 2022

Verifiable Decryption in the Head.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Towards Verifiable Remote Voting with Paper Assurance.
CoRR, 2021

Lattice-Based Proof of Shuffle and Applications to Electronic Voting.
Proceedings of the Topics in Cryptology - CT-RSA 2021, 2021

2020
Practical Isogeny-Based Key-Exchange with Optimal Tightness.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

Efficient Mixing of Arbitrary Ballots with Everlasting Privacy: How to Verifiably Mix the PPATC Scheme.
Proceedings of the Secure IT Systems - 25th Nordic Conference, NordSec 2020, Virtual Event, 2020

Revisiting Practical and Usable Coercion-Resistant Remote E-Voting.
Proceedings of the Electronic Voting - 5th International Joint Conference, 2020

Fast and Secure Updatable Encryption.
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020

A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract.
Proceedings of the 2nd Workshop on Formal Methods for Blockchains, 2020

Cloud-Assisted Asynchronous Key Transport with Post-Quantum Security.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Subliminal channels in post-quantum digital signature schemes.
IACR Cryptol. ePrint Arch., 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness - Enabling real-world deployments with theoretically sound parameters.
IACR Cryptol. ePrint Arch., 2019

RISE and SHINE: Fast and Secure Updatable Encryption.
IACR Cryptol. ePrint Arch., 2019

Coercion-Resistant Voting in Linear Time via Fully Homomorphic Encryption: Towards a Quantum-Safe Scheme.
CoRR, 2019

A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Highly Efficient Key Exchange Protocols with Optimal Tightness.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Zero-Knowledge Proof of Decryption for FHE Ciphertexts.
IACR Cryptol. ePrint Arch., 2018

Adversaries monitoring Tor traffic crossing their jurisdictional border and reconstructing Tor circuits.
CoRR, 2018

On the Construction of Quasi-Binary and Quasi-Orthogonal Matrices over Finite Fields.
CoRR, 2018

Security Notions for Cloud Storage and Deduplication.
Proceedings of the Provable Security, 2018

Offline Assisted Group Key Exchange.
Proceedings of the Information Security - 21st International Conference, 2018

Practical and Tightly-Secure Digital Signatures and Authenticated Key Exchange.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

Definitions for Plaintext-Existence Hiding in Cloud Storage.
Proceedings of the 13th International Conference on Availability, Reliability and Security, 2018

2017
Malware encryption schemes - rerandomizable ciphertexts encrypted using environmental keys.
IACR Cryptol. ePrint Arch., 2017

A Roadmap to Fully Homomorphic Elections: Stronger Security, Better Verifiability.
Proceedings of the Financial Cryptography and Data Security, 2017

Side Channels in Deduplication: Trade-offs between Leakage and Efficiency.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

2016
Fully homomorphic encryption must be fat or ugly?
IACR Cryptol. ePrint Arch., 2016

Using Cryptography to Control Your Data at a Distance.
ERCIM News, 2016

An experiment on the security of the Norwegian electronic voting protocol.
Ann. des Télécommunications, 2016

Malware, Encryption, and Rerandomization - Everything Is Under Attack.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

2015
The Norwegian Internet Voting Protocol: A new Instantiation.
IACR Cryptol. ePrint Arch., 2015

A Guide to Fully Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2015

2013
Partially blind password-based signatures using elliptic curves.
IACR Cryptol. ePrint Arch., 2013

Protocol Variants and Electronic Identification.
IACR Cryptol. ePrint Arch., 2013

Towards Privacy Preserving Mobile Internet Communications - How Close Can We Get?
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2011
The Norwegian Internet Voting Protocol.
Proceedings of the E-Voting and Identity - Third International Conference, 2011

A Novel Framework for Protocol Analysis.
Proceedings of the Provable Security - 5th International Conference, 2011

Password-Based Signatures.
Proceedings of the Public Key Infrastructures, Services and Applications, 2011

2010
Analysis of an internet voting protocol.
IACR Cryptol. ePrint Arch., 2010

2008
A framework for compositional verification of security protocols.
Inf. Comput., 2008

Round-Optimal Blind Signatures from Waters Signatures.
Proceedings of the Provable Security, Second International Conference, 2008

Weaknesses in BankID, a PKI-Substitute Deployed by Norwegian Banks.
Proceedings of the Public Key Infrastructure, 2008

A Latency-Free Election Scheme.
Proceedings of the Topics in Cryptology, 2008

2007
Universally Composable Signcryption.
Proceedings of the Public Key Infrastructure, 2007

A Security Analysis of the NIST SP 800-90 Elliptic Curve Random Number Generator.
Proceedings of the Advances in Cryptology, 2007

2006
Universally Composable Blind Signatures in the Plain Model.
IACR Cryptol. ePrint Arch., 2006

A New Security Proof for Damgård's ElGamal.
Proceedings of the Topics in Cryptology, 2006

2005
Symmetric Subgroup Membership Problems.
Proceedings of the Public Key Cryptography, 2005

Homomorphic Cryptosystems Based on Subgroup Membership Problems.
Proceedings of the Progress in Cryptology, 2005

Security Notions for Disk Encryption.
Proceedings of the Computer Security, 2005

Spreading Alerts Quietly and the Subgroup Escape Problem.
Proceedings of the Advances in Cryptology, 2005

2003
Homomorphic public-key systems based on subgroup membership problems.
IACR Cryptol. ePrint Arch., 2003


  Loading...