Stephan Krenn

Orcid: 0000-0003-2835-9093

According to our database1, Stephan Krenn authored at least 68 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
On the Security of Offloading Post-Processing for Quantum Key Distribution.
Entropy, February, 2023

To Pass or Not to Pass: Privacy-Preserving Physical Access Control.
IACR Cryptol. ePrint Arch., 2023

Outsourced Computations Maintaining Confidentiality and Authenticity.
ERCIM News, 2023

RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023

2022
Issuer-Hiding Attribute-Based Credentials.
IACR Cryptol. ePrint Arch., 2022

A Verifiable Multiparty Computation Solver for the Assignment Problem and Applications to Air Traffic Management.
CoRR, 2022

From Research to Privacy-Preserving Industry Applications - Workshop Summary.
Proceedings of the Privacy and Identity Management - 17th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Privacy and Identity 2022, Virtual Event, August 30, 2022

A Privacy-Preserving Auction Platform with Public Verifiability for Smart Manufacturing.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

KRAKEN: a privacy-preserving data market for authentic data.
Proceedings of the 1st International Workshop on Data Economy, 2022

A Verifiable Multiparty Computation Solver for the Linear Assignment Problem: And Applications to Air Traffic Management.
Proceedings of the 2022 on Cloud Computing Security Workshop, 2022

KRAKEN: A Secure, Trusted, Regulatory-Compliant, and Privacy-Preserving Data Sharing Platform.
Proceedings of the Data Spaces - Design, 2022

2021
Privacy-Preserving Identity Management and Applications to Academic Degree Verification.
Proceedings of the Privacy and Identity Management. Between Data Protection and Security, 2021

Single-Use Delegatable Signatures Based on Smart Contracts.
Proceedings of the ARES 2021: The 16th International Conference on Availability, 2021

2020
Fully invisible protean signatures schemes.
IET Inf. Secur., 2020

Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.
IACR Cryptol. ePrint Arch., 2020

Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving Analytics for Data Markets Using MPC.
Proceedings of the Privacy and Identity Management: 15th IFIP WG 9.2, 2020

2019
Practical Group-Signatures with Privacy-Friendly Openings.
IACR Cryptol. ePrint Arch., 2019

Breaking and Fixing Anonymous Credentials for the Cloud (Full Version).
IACR Cryptol. ePrint Arch., 2019

iUC: Flexible Universal Composability Made Simple.
IACR Cryptol. ePrint Arch., 2019

Towards Privacy in Geographic Message Dissemination for Connected Vehicles.
Proceedings of the 2019 IEEE International Conference on Connected Vehicles and Expo, 2019

Breaking and Fixing Anonymous Credentials for the Cloud.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Stronger Security for Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2018

Chameleon-Hashes with Dual Long-Term Trapdoors and Their Applications.
IACR Cryptol. ePrint Arch., 2018

Protean Signature Schemes.
IACR Cryptol. ePrint Arch., 2018

Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications.
IACR Cryptol. ePrint Arch., 2018

Engineering Cryptography for Security and Privacy in the Cloud.
ERCIM News, 2018

TRUSTEE - Data Privacy and Cloud Security Cluster Europe.
ERCIM News, 2018

2017
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017

Agile cryptographic solutions for the cloud.
Elektrotech. Informationstechnik, 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Batch-verifiable Secret Sharing with Unconditional Privacy.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Towards Attribute-Based Credentials in the Cloud.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Towards the Adoption of Secure Cloud Identity Services.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
IACR Cryptol. ePrint Arch., 2016

Universal Composition with Responsive Environments.
IACR Cryptol. ePrint Arch., 2016

Secure and Privacy-Preserving Identity Management in the Cloud.
ERCIM News, 2016

CREDENTIAL: Secure Cloud Identity Wallet.
ERCIM News, 2016

A counterexample to the chain rule for conditional HILL entropy.
Comput. Complex., 2016

Practical Signing-Right Revocation.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Malicious Clients in Distributed Secret Sharing Based Storage Networks.
Proceedings of the Security Protocols XXIV, 2016

Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

CREDENTIAL: A Framework for Privacy-Preserving Cloud-Based Data Sharing.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Efficient and Privacy Preserving Third Party Auditing for a Distributed Storage System.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

2015
Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

Cryptographic Protocols Underlying Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Formal Treatment of Privacy-Enhancing Credential Systems.
IACR Cryptol. ePrint Arch., 2014

Efficient Zero-Knowledge Proofs for Commitments from Learning With Errors over Rings.
IACR Cryptol. ePrint Arch., 2014

Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

2013
Learning with Rounding, Revisited: New Reduction, Properties and Applications.
IACR Cryptol. ePrint Arch., 2013

A Counterexample to the Chain Rule for Conditional HILL Entropy - And What Deniable Encryption Has to Do with It.
Proceedings of the Theory of Cryptography - 10th Theory of Cryptography Conference, 2013

2012
Bringing zero-knowledge proofs of knowledge to practice.
PhD thesis, 2012

Full Proof Cryptography: Verifiable Compilation of Efficient Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2012

Commitments and Efficient Zero-Knowledge Proofs from Hard Learning Problems.
IACR Cryptol. ePrint Arch., 2012

Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
A Framework for Practical Universally Composable Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2011

cPLC - A Cryptographic Programming Language and Compiler.
Proceedings of the Information Security South Africa Conference 2011, 2011

2010
Cache Games - Bringing Access Based Cache Attacks on AES to Practice.
IACR Cryptol. ePrint Arch., 2010

A Certifying Compiler for Zero-Knowledge Proofs of Knowledge Based on Sigma-Protocols.
IACR Cryptol. ePrint Arch., 2010

Efficiency Limitations for Σ-Protocols for Group Homomorphisms.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

2009
Efficiency Limitations for Sigma-Protocols for Group Homomorphisms.
IACR Cryptol. ePrint Arch., 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice.
IACR Cryptol. ePrint Arch., 2009

Bringing Zero-Knowledge Proofs of Knowledge to Practice.
Proceedings of the Security Protocols XVII, 2009

Automatic Generation of Sigma-Protocols.
Proceedings of the Public Key Infrastructures, Services and Applications, 2009

2008
Automatic Generation of Sound Zero-Knowledge Protocols.
IACR Cryptol. ePrint Arch., 2008


  Loading...