Christoph Striecks

Orcid: 0000-0003-4724-8022

Affiliations:
  • AIT Austrian Institute of Technology, Center for Digital Safety & Security, Vienna, Austria
  • Karlsruhe Institute of Technology, Cryptography and Security Group, Karlsruhe, Germany (former)


According to our database1, Christoph Striecks authored at least 33 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Identity-Based Encryption with (Almost) Tight Security in the Multi-instance, Multi-ciphertext Setting.
J. Cryptol., June, 2024

(Inner-Product) Functional Encryption with Updatable Ciphertexts.
J. Cryptol., March, 2024

2023
Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging.
IACR Cryptol. ePrint Arch., 2023

Muckle+: End-to-End Hybrid Authenticated Key Exchanges.
IACR Cryptol. ePrint Arch., 2023

Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023

Optimizing 0-RTT Key Exchange with Full Forward Security.
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023

2021
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
J. Cryptol., 2021

Puncture 'Em All: Stronger Updatable Encryption with No-Directional Key Updates.
IACR Cryptol. ePrint Arch., 2021

Updatable Signatures and Message Authentication Codes.
IACR Cryptol. ePrint Arch., 2021

Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2021 Workshops, 2021

Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications.
Proceedings of the Financial Cryptography and Data Security, 2021

Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2021, 2021

2020
Logarithmic-Size (Linkable) Threshold Ring Signatures in the Plain Model.
IACR Cryptol. ePrint Arch., 2020

CCA-Secure (Puncturable) KEMs from Encryption With Non-Negligible Decryption Errors.
IACR Cryptol. ePrint Arch., 2020

Generic Constructions of Incremental and Homomorphic Timed-Release Encryption.
IACR Cryptol. ePrint Arch., 2020

Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.
IACR Cryptol. ePrint Arch., 2020

Collecting and Classifying Security and Privacy Design Patterns for Connected Vehicles: SECREDAS Approach.
Proceedings of the Computer Safety, Reliability, and Security. SAFECOMP 2020 Workshops, 2020

2019
Practical Group-Signatures with Privacy-Friendly Openings.
IACR Cryptol. ePrint Arch., 2019

Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
IACR Cryptol. ePrint Arch., 2019

I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
IACR Cryptol. ePrint Arch., 2019

2018
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications.
IACR Cryptol. ePrint Arch., 2018

Engineering Cryptography for Security and Privacy in the Cloud.
ERCIM News, 2018

Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Agile cryptographic solutions for the cloud.
Elektrotech. Informationstechnik, 2017

Secure and Privacy-Friendly Storage and Data Processing in the Cloud.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017

Batch-verifiable Secret Sharing with Unconditional Privacy.
Proceedings of the 3rd International Conference on Information Systems Security and Privacy, 2017

Towards Attribute-Based Credentials in the Cloud.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

2016
Opportunities and Challenges of CREDENTIAL - Towards a Metadata-Privacy Respecting Identity Provider.
Proceedings of the Privacy and Identity Management. Facing up to Next Steps, 2016

2015
On Cryptographic Building Blocks and Transformations.
PhD thesis, 2015

Confined Guessing: New Signatures From Standard Assumptions.
J. Cryptol., 2015

2013
A generic view on trace-and-revoke broadcast encryption schemes.
IACR Cryptol. ePrint Arch., 2013

Programmable Hash Functions in the Multilinear Setting.
IACR Cryptol. ePrint Arch., 2013

Practical Signatures from Standard Assumptions.
Proceedings of the Advances in Cryptology, 2013


  Loading...