Veronika Kuchta

Orcid: 0000-0002-7724-2601

According to our database1, Veronika Kuchta authored at least 38 papers between 2013 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Survey on Exotic Signatures for Post-quantum Blockchain: Challenges and Research Directions.
ACM Comput. Surv., December, 2023

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Improving Unlinkability of Attribute-based Authentication through Game Theory.
ACM Trans. Priv. Secur., 2022

Private Re-Randomization for Module LWE and Applications to Quasi-Optimal ZK-SNARKs.
IACR Cryptol. ePrint Arch., 2022

A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum.
IACR Cryptol. ePrint Arch., 2022

A Survey on Exotic Signatures for Post-Quantum Blockchain: Challenges & Research Directions.
IACR Cryptol. ePrint Arch., 2022

Lattice-Based Inner Product Argument.
Proceedings of the Progress in Cryptology, 2022

2021
Measure-Rewind-Measure: Tighter Quantum Random Oracle Model Proofs for One-Way to Hiding and CCA Security.
IACR Cryptol. ePrint Arch., 2021

Non-Slanderability of Linkable Spontaneous Anonymous Group Signature (LSAG).
IACR Cryptol. ePrint Arch., 2021

Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain.
IACR Cryptol. ePrint Arch., 2021

Lattice-based zero-knowledge arguments for additive and multiplicative relations.
Des. Codes Cryptogr., 2021

Enhancing Privacy Through DMMA: Decision-Making Method for Authentication.
Proceedings of the 20th IEEE International Conference on Trust, 2021

2020
Post-Quantum Linkable Ring Signature Enabling Distributed Authorised Ring Confidential Transactions in Blockchain.
IACR Cryptol. ePrint Arch., 2020

Practical Post-Quantum Few-Time Verifiable Random Function with Applications to Algorand.
IACR Cryptol. ePrint Arch., 2020

Efficient Lattice-Based Polynomial Evaluation and Batch ZK Arguments.
Proceedings of the Selected Areas in Cryptography - SAC 2020, 2020

2019
Public-Key Encryption with Integrated Keyword Search.
J. Hardw. Syst. Secur., 2019

Lattice RingCT v2.0 with Multiple Input and Output Wallets.
IACR Cryptol. ePrint Arch., 2019

A twofold group key agreement protocol for NoC-based MPSoCs.
Trans. Emerg. Telecommun. Technol., 2019

Incentives for Harvesting Attack in Proof of Work Mining Pools.
Proceedings of the Computer Security - ESORICS 2019, 2019

Revocable and Linkable Ring Signature.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

Lattice RingCT V2.0 with Multiple Input and Multiple Output Wallets.
Proceedings of the Information Security and Privacy - 24th Australasian Conference, 2019

2018
Post-Quantum One-Time Linkable Ring Signature and Application to Ring Confidential Transactions in Blockchain (Lattice RingCT v1.0).
IACR Cryptol. ePrint Arch., 2018

Secure Communication on NoC Based MPSoC.
Proceedings of the Security and Privacy in Communication Networks, 2018

A Twofold Group Key Agreement Protocol for NoC based MPSoCs.
Proceedings of the 16th Annual Conference on Privacy, Security and Trust, 2018

Anonymous yet Traceable Strong Designated Verifier Signature.
Proceedings of the Information Security - 21st International Conference, 2018

Fully Homomorphic Distributed Identity-based Encryption Resilient to Continual Auxiliary Input Leakage.
Proceedings of the 15th International Joint Conference on e-Business and Telecommunications, 2018

2017
Secure Certificateless Proxy Re-encryption Without Pairing.
Proceedings of the Advances in Information and Computer Security, 2017

Generic Framework for Attribute-Based Group Signature.
Proceedings of the Information Security Practice and Experience, 2017

On New Zero-Knowledge Arguments for Attribute-Based Group Signatures from Lattices.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Multi-party (Leveled) Homomorphic Encryption on Identity-Based and Attribute-Based Settings.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Authenticated Group Key Agreement Protocol Without Pairing.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Distributed protocols for digital signatures and public key encryption.
PhD thesis, 2016

Multi-authority Distributed Attribute-Based Encryption with Application to Searchable Encryption on Lattices.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

A Categorical Approach in Handling Event-Ordering in Distributed Systems.
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016

Identity-Based Threshold Encryption on Lattices with Application to Searchable Encryption.
Proceedings of the Applications and Techniques in Information Security, 2016

2015
Public Key Encryption with Distributed Keyword Search.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2014
Rerandomizable Threshold Blind Signatures.
Proceedings of the Trusted Systems - 6th International Conference, 2014

2013
Unique Aggregate Signatures with Applications to Distributed Verifiable Random Functions.
Proceedings of the Cryptology and Network Security - 12th International Conference, 2013


  Loading...