Sarah Meiklejohn

Orcid: 0000-0001-5671-1395

According to our database1, Sarah Meiklejohn authored at least 72 papers between 2010 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Privacy Reasoning in Ambiguous Contexts.
CoRR, June, 2025

Machine Learning Models Have a Supply Chain Problem.
CoRR, May, 2025

Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography.
CoRR, January, 2025

Founding Zero-Knowledge Proofs of Training on Optimum Vicinity.
IACR Cryptol. ePrint Arch., 2025

Supporting Human Raters with the Detection of Harmful Content Using Large Language Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Founding Zero-Knowledge Proof of Training on Optimum Vicinity.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

2024
Understanding Help-Seeking and Help-Giving on Social Media for Image-Based Sexual Abuse.
Proceedings of the 33rd USENIX Security Symposium, 2024

Give and Take: An End-To-End Investigation of Giveaway Scam Conversion Rates.
Proceedings of the 2024 ACM on Internet Measurement Conference, 2024

2023
Robust, privacy-preserving, transparent, and auditable on-device blocklisting.
CoRR, 2023

One Server for the Price of Two: Simple and Fast Single-Server Private Information Retrieval.
Proceedings of the 32nd USENIX Security Symposium, 2023

ACORN: Input Validation for Secure Aggregation.
Proceedings of the 32nd USENIX Security Symposium, 2023

Forsage: Anatomy of a Smart-Contract Pyramid Scheme.
Proceedings of the Financial Cryptography and Data Security, 2023

Bingo: Adaptivity and Asynchrony in Verifiable Secret Sharing and Distributed Key Generation.
Proceedings of the Advances in Cryptology - CRYPTO 2023, 2023

2022
SoK: SCT Auditing in Certificate Transparency.
Proc. Priv. Enhancing Technol., 2022

Bingo: Adaptively Secure Packed Asynchronous Verifiable Secret Sharing and Asynchronous Distributed Key Generation.
IACR Cryptol. ePrint Arch., 2022

How to Peel a Million: Validating and Expanding Bitcoin Clusters.
Proceedings of the 31st USENIX Security Symposium, 2022

2021
SoK: Hate, Harassment, and the Changing Landscape of Online Abuse.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Reaching Consensus for Asynchronous Distributed Key Generation.
Proceedings of the PODC '21: ACM Symposium on Principles of Distributed Computing, 2021

An Empirical Analysis of Privacy in the Lightning Network.
Proceedings of the Financial Cryptography and Data Security, 2021

Pay to Win: Cheap, Cross-Chain Bribing Attacks on PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

SoK: Algorithmic Incentive Manipulation Attacks on Permissionless PoW Cryptocurrencies.
Proceedings of the Financial Cryptography and Data Security. FC 2021 International Workshops, 2021

Aggregatable Distributed Key Generation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021

Problematising Transparency Through LARP And Deliberation.
Proceedings of the DIS '21: Designing Interactive Systems Conference 2021, 2021

2020
Reputable List Curation from Decentralized Voting.
IACR Cryptol. ePrint Arch., 2020

Think Global, Act Local: Gossip and Client Audits in Verifiable Data Structures.
CoRR, 2020

2019
Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updateable Structured Reference Strings.
IACR Cryptol. ePrint Arch., 2019

Pay-To-Win: Incentive Attacks on Proof-of-Work Cryptocurrencies.
IACR Cryptol. ePrint Arch., 2019

Tracing Transactions Across Cryptocurrency Ledgers.
Proceedings of the 28th USENIX Security Symposium, 2019

Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

Short Paper: An Exploration of Code Diversity in the Cryptocurrency Landscape.
Proceedings of the Financial Cryptography and Data Security, 2019

Sonic: Zero-Knowledge SNARKs from Linear-Size Universal and Updatable Structured Reference Strings.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

Quisquis: A New Design for Anonymous Cryptocurrencies.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

Pisa: Arbitration Outsourcing for State Channels.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

SoK: Consensus in the Age of Blockchains.
Proceedings of the 1st ACM Conference on Advances in Financial Technologies, 2019

2018
Top Ten Obstacles along Distributed Ledgers Path to Adoption.
IEEE Secur. Priv., 2018

Why is a Ravencoin Like a TokenDesk? An Exploration of Code Diversity in the Cryptocurrency Landscape.
CoRR, 2018

Betting on Blockchain Consensus with Fantomette.
CoRR, 2018

VAMS: Verifiable Auditing of Access to Confidential Data.
CoRR, 2018

Winning the Caucus Race: Continuous Leader Election via Public Randomness.
CoRR, 2018

An Empirical Analysis of Anonymity in Zcash.
Proceedings of the 27th USENIX Security Symposium, 2018

Smart Contracts for Bribing Miners.
Proceedings of the Financial Cryptography and Data Security, 2018

Egalitarian Society or Benevolent Dictatorship: The State of Cryptocurrency Governance.
Proceedings of the Financial Cryptography and Data Security, 2018

Contour: A Practical System for Binary Transparency.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2018

Updatable and Universal Common Reference Strings with Applications to zk-SNARKs.
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018

2017
Möbius: Trustless Tumbling for Transaction Privacy.
IACR Cryptol. ePrint Arch., 2017

Consensus in the Age of Blockchains.
CoRR, 2017

Who Am I? Secure Identity Registration on Distributed Ledgers.
Proceedings of the Data Privacy Management, Cryptocurrencies and Blockchain Technology, 2017

2016
Centrally Banked Cryptocurrencies.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

Transparency Overlays and Applications.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
A Profitable Sub-prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups.
Proceedings of the Public-Key Cryptography - PKC 2015 - 18th IACR International Conference on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD, USA, March 30, 2015

Privacy-Enhancing Overlays in Bitcoin.
Proceedings of the Financial Cryptography and Data Security, 2015

2014
Flexible Models for Secure Systems.
PhD thesis, 2014

Leveraging Gate-Level Properties to Identify Hardware Timing Channels.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2014

Botcoin: Monetizing Stolen Cycles.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

Déjà Q: Using Dual Systems to Revisit q-Type Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Key-Versatile Signatures and Applications: RKA, KDM and Joint Enc/Sig.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Malleable Signatures: New Definitions and Delegatable Anonymous Credentials.
Proceedings of the IEEE 27th Computer Security Foundations Symposium, 2014

Algebraic MACs and Keyed-Verification Anonymous Credentials.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

2013
New Trapdoor Projection Maps for Composite-Order Bilinear Groups.
IACR Cryptol. ePrint Arch., 2013

Malleable Signatures: Complex Unary Transformations and Delegatable Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2013

Succinct Malleable NIZKs and an Application to Compact Shuffles.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

Verifiable Elections That Scale for Free.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

A fistful of bitcoins: characterizing payments among men with no names.
Proceedings of the 2013 Internet Measurement Conference, 2013

A practical testing framework for isolating hardware timing channels.
Proceedings of the Design, Automation and Test in Europe, 2013

2012
Malleable Proof Systems and Applications.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

2011
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks.
Proceedings of the 5th USENIX Workshop on Offensive Technologies, 2011

The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion.
Proceedings of the 20th USENIX Security Symposium, 2011

2010
Review of an introduction to mathematical cryptography by Jeffrey Hoffstein, Jill Pipher, and Joseph Silverman Springer-Verlag, 2008.
SIGACT News, 2010

ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash.
Proceedings of the 19th USENIX Security Symposium, 2010

Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010


  Loading...