Markulf Kohlweiss

Orcid: 0000-0002-8660-9663

Affiliations:
  • University of Edinburgh, UK
  • Microsoft Research Cambridge, UK (former)


According to our database1, Markulf Kohlweiss authored at least 108 papers between 2005 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Efficient Batch Opening Schemes for Merkle Tree Commitment with Applications to Trustless Cross-chain Bridge.
Proceedings of the 34th International Conference on Computer Communications and Networks, 2025

AGATE: Augmented Global Attested Trusted Execution in the Universal Composability Framework.
Proceedings of the 38th IEEE Computer Security Foundations Symposium, 2025

SyRA: Sybil-Resilient Anonymous Signatures with Applications to Decentralized Identity.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Olympic Privacy-Preserving Blueprints: Faster Communication, Highly Functional, Stronger Security.
IACR Cryptol. ePrint Arch., 2024

The Uber-Knowledge Assumption: A Bridge to the AGM.
IACR Commun. Cryptol., 2024

The Brave New World of Global Generic Groups and UC-Secure Zero-Overhead SNARKs.
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024

Foundations of Anonymous Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions.
Proceedings of the Financial Cryptography and Data Security, 2024

PARScoin: A Privacy-preserving, Auditable, and Regulation-friendly Stablecoin.
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024

Updatable Privacy-Preserving Blueprints.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
How to Compile Polynomial IOP into Simulation-Extractable SNARKs: A Modular Approach.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

From Polynomial IOP and Commitments to Non-malleable zkSNARKs.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Privacy-Preserving Blueprints.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

Threshold Structure-Preserving Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023

2022
Structure-Preserving Threshold Signatures.
IACR Cryptol. ePrint Arch., 2022

Zswap: zk-SNARK Based Non-Interactive Multi-Asset Swaps.
IACR Cryptol. ePrint Arch., 2022

What Makes Fiat-Shamir zkSNARKs (Updatable SRS) Simulation Extractable?
Proceedings of the Security and Cryptography for Networks - 13th International Conference, 2022

PEReDi: Privacy-Enhanced, Regulated and Distributed Central Bank Digital Currencies.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Bottom-Up Trust Registry in Self Sovereign Identity.
Proceedings of the Blockchain and Applications, 4th International Congress, 2022

Key-Schedule Security for the TLS 1.3 Standard.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
On Simulation-Extractability of Universal zkSNARKs.
IACR Cryptol. ePrint Arch., 2021

On the Anonymity Guarantees of Anonymous Proof-of-Stake Protocols.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Steel: Composable Hardware-Based Stateful and Randomised Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Mining for Privacy: How to Bootstrap a Snarky Blockchain.
Proceedings of the Financial Cryptography and Data Security, 2021

Another Look at Extraction and Randomization of Groth's zk-SNARK.
Proceedings of the Financial Cryptography and Data Security, 2021

KACHINA - Foundations of Private Smart Contracts.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Consistency for Functional Encryption.
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021

Composition with Knowledge Assumptions.
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021

Snarky Ceremonies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Groth16 SNARKs are Randomizable and (Weakly) Simulation Extractable.
IACR Cryptol. ePrint Arch., 2020

2019
Efficient Fully Structure-Preserving Signatures and Shrinking Commitments.
J. Cryptol., 2019

Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings.
IACR Cryptol. ePrint Arch., 2019

Ouroboros Crypsinous: Privacy-Preserving Proof-of-Stake.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Decentralizing Inner-Product Functional Encryption.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Privacy-preserving smart metering revisited.
Int. J. Inf. Sec., 2018

State-Separating Proofs: A Reduction Methodology for Real-World Protocols.
IACR Cryptol. ePrint Arch., 2018

Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

State Separation for Code-Based Game-Playing Proofs.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Multiparty Routing: Secure Routing for Mixnets.
CoRR, 2017

Implementing and Proving the TLS 1.3 Record Layer.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017


2016
miTLS: Verifying Protocol Implementations against Real-World Attacks.
IEEE Secur. Priv., 2016

Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Downgrade Resilience in Key-Exchange Protocols.
Proceedings of the IEEE Symposium on Security and Privacy, 2016

Light at the middle of the tunnel: middleboxes for selective disclosure of network monitoring to distrusted parties.
Proceedings of the ACM SIGCOMM Workshop on Hot topics in Middleboxes and Network Function Virtualization, 2016

Dependent types and multi-monadic effects in F.
Proceedings of the 43rd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2016

Hash First, Argue Later: Adaptive Verifiable Computations on Outsourced Data.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

2015
Accountable Metadata-Hiding Escrow: A Group Signature Case Study.
Proc. Priv. Enhancing Technol., 2015

Composable & Modular Anonymous Credentials: Definitions and Practical Constructions.
IACR Cryptol. ePrint Arch., 2015

Geppetto: Versatile Verifiable Computation.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

A Messy State of the Union: Taming the Composite State Machines of TLS.
Proceedings of the 2015 IEEE Symposium on Security and Privacy, 2015

Anonymous Transferable E-Cash.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

(De-)Constructing TLS 1.3.
Proceedings of the Progress in Cryptology - INDOCRYPT 2015, 2015

One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Fully Structure-Preserving Signatures and Shrinking Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2015, 2015

Observing and Preventing Leakage in MapReduce.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Composable and Modular Anonymous Credentials: Definitions and Practical Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015

2014
(De-)Constructing TLS.
IACR Cryptol. ePrint Arch., 2014

Accountable Tracing Signatures.
IACR Cryptol. ePrint Arch., 2014

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Proving the TLS Handshake Secure (As It Is).
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Square Span Programs with Applications to Succinct NIZK Arguments.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Optimally private access control.
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013

ZQL: A Compiler for Privacy-Preserving Data Processing.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Succinct Malleable NIZKs and an Application to Compact Shuffles.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Selective Disclosure in Datalog-Based Trust Management.
Proceedings of the Security and Trust Management - 9th International Workshop, 2013

Implementing TLS with Verified Cryptographic Security.
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013

Verifiable Elections That Scale for Free.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Tagged One-Time Signatures: Tight Security and Optimal Tag Size.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Anonymity-Preserving Public-Key Encryption: A Constructive Approach.
Proceedings of the Privacy Enhancing Technologies - 13th International Symposium, 2013

Pinocchio coin: building zerocoin from a succinct pairing-based proof system.
Proceedings of the PETShop'13, 2013

Smart meter aggregation via secret-sharing.
Proceedings of the SEGS'13, 2013

2012
A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Private Client-Side Profiling with Random Forests and Hidden Markov Models.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

On the Non-malleability of the Fiat-Shamir Transform.
Proceedings of the Progress in Cryptology, 2012

Malleable Proof Systems and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Further Privacy Mechanisms.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

Pseudonyms and Private Credentials.
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011

A Domain Transformation for Structure-Preserving Signatures on Group Elements.
IACR Cryptol. ePrint Arch., 2011

Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.
IACR Cryptol. ePrint Arch., 2011

Privacy-Friendly Aggregation for the Smart-Grid.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Scramble! Your Social Network Data.
Proceedings of the Privacy Enhancing Technologies - 11th International Symposium, 2011

Differentially Private Billing with Rebates.
Proceedings of the Information Hiding - 13th International Conference, 2011

Analysis of Revocation Strategies for Anonymous Idemix Credentials.
Proceedings of the Communications and Multimedia Security, 2011

Modular code-based cryptographic verification.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Structure Preserving CCA Secure Encryption and Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

Cryptographic Mechanisms for Privacy.
Proceedings of the Privacy and Identity Management for Life, 2011

2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
J. Comput. Secur., 2010

Performance Analysis of Accumulator-Based Revocation Mechanisms.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Solving Revocation with Efficient Update of Anonymous Credentials.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

2009
Threshold things that think: usable authorization for resharing.
Proceedings of the 5th Symposium on Usable Privacy and Security, 2009

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
Proceedings of the Public Key Cryptography, 2009

Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data.
Proceedings of the Public Key Cryptography, 2009

Universally Composable Adaptive Priced Oblivious Transfer.
Proceedings of the Pairing-Based Cryptography, 2009

Compact E-Cash and Simulatable VRFs Revisited.
Proceedings of the Pairing-Based Cryptography, 2009

Threshold Things That Think: Authorisation for Resharing.
Proceedings of the iNetSec 2009 - Open Research Problems in Network Security, 2009

Randomizable Proofs and Delegatable Anonymous Credentials.
Proceedings of the Advances in Cryptology, 2009

2008
Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2008

A Self-certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup.
Proceedings of the Information Security Theory and Practices. Smart Devices, 2008

Self-certified Sybil-free pseudonyms.
Proceedings of the First ACM Conference on Wireless Network Security, 2008

P-signatures and Noninteractive Anonymous Credentials.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

2007
Non-Interactive Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2007

Efficient Oblivious Augmented Maps: Location-Based Services with a Payment Broker.
Proceedings of the Privacy Enhancing Technologies, 7th International Symposium, 2007

2006
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication.
IACR Cryptol. ePrint Arch., 2006

How to win the clonewars: efficient periodic n-times anonymous authentication.
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006

2005
Privacy for Profitable Location Based Services.
Proceedings of the Security in Pervasive Computing, Second International Conference, 2005


  Loading...