Maria Dubovitskaya

According to our database1, Maria Dubovitskaya authored at least 23 papers between 2009 and 2021.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2021
Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

2019
On the Impossibility of Structure-Preserving Deterministic Primitives.
J. Cryptol., 2019

Efficient Fully Secure Leakage-Deterring Encryption.
IACR Cryptol. ePrint Arch., 2019

Privacy-preserving auditable token payments in a permissioned blockchain system.
IACR Cryptol. ePrint Arch., 2019

UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019

Managing Security Objects and -Processes Using an Extended BPM Approach and -System.
Proceedings of the 23rd IEEE International Enterprise Distributed Object Computing Conference, 2019

2017
Accumulators with Applications to Anonymity-Preserving Revocation.
IACR Cryptol. ePrint Arch., 2017

Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.
IACR Cryptol. ePrint Arch., 2016

2015
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions.
IACR Cryptol. ePrint Arch., 2015

Composable and Modular Anonymous Credentials: Definitions and Practical Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

Cryptographic Protocols Underlying Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Concepts and languages for privacy-preserving attribute-based authentication.
J. Inf. Secur. Appl., 2014

2013
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.
Proceedings of the Policies and Research in Identity Management, 2013

Universally composable adaptive oblivious transfer (with access control) from standard assumptions.
Proceedings of the DIM'13, 2013

2012
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2012

Efficient Structure-Preserving Signature Scheme from Standard Assumptions.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

2011
Oblivious Transfer with Hidden Access Control Policies.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Cryptographic Mechanisms for Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware.
IACR Cryptol. ePrint Arch., 2010

Unlinkable Priced Oblivious Transfer with Rechargeable Wallets.
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010

2009
Oblivious Transfer with Access Control.
IACR Cryptol. ePrint Arch., 2009


  Loading...