Daniel Slamanig
Orcid: 0000-0002-4181-2561Affiliations:
- Universität der Bundeswehr München, Germany
- AIT Austrian Institute of Technology, Center for Digital Safety & Security, Vienna, Austria (former)
- Graz University of Technology, Institute for Applied Information Processing and Communications, Austria (former)
According to our database1,
Daniel Slamanig
authored at least 123 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on unibw.de
-
on linkedin.com
-
on twitter.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
J. Cryptol., September, 2024
J. Cryptol., March, 2024
Comput. Secur., January, 2024
Threshold Delegatable Anonymous Credentials With Controlled and Fine-Grained Delegation.
IEEE Trans. Dependable Secur. Comput., 2024
J. Univers. Comput. Sci., 2024
Attribute-Based Threshold Issuance Anonymous Counting Tokens and Its Application to Sybil-Resistant Self-Sovereign Identity.
IACR Cryptol. ePrint Arch., 2024
Threshold Structure-Preserving Signatures: Strong and Adaptive Security under Standard Assumptions.
IACR Cryptol. ePrint Arch., 2024
Structure-Preserving Compressing Primitives: Vector Commitments, Accumulators and Applications.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024
2023
Proc. Priv. Enhancing Technol., July, 2023
Unique-Path Identity Based Encryption With Applications to Strongly Secure Messaging.
IACR Cryptol. ePrint Arch., 2023
Aggregate Signatures with Versatile Randomization and Issuer-Hiding Multi-Authority Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Revisiting Updatable Encryption: Controlled Forward Security, Constructions and a Puncturable Perspective.
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 2023 on Cloud Computing Security Workshop, 2023
Proceedings of the Advances in Cryptology - ASIACRYPT 2023, 2023
RiBAC: Strengthening Access Control Systems for Pandemic Risk Reduction while Preserving Privacy.
Proceedings of the 18th International Conference on Availability, Reliability and Security, 2023
2022
Privacy-Preserving Authenticated Key Exchange: Stronger Privacy and Generic Constructions.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
2021
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Updatable Trapdoor SPHFs: Modular Construction of Updatable Zero-Knowledge Arguments and More.
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Financial Cryptography and Data Security, 2021
Versatile and Sustainable Timed-Release Encryption and Sequential Time-Lock Puzzles (Extended Abstract).
Proceedings of the Computer Security - ESORICS 2021, 2021
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Unbounded Simulation-Sound Subversion Resistant Quasi-Adaptive NIZK Proofs and Applications to Modular zk-SNARKs.
IACR Cryptol. ePrint Arch., 2020
Lift-and-Shift: Obtaining Simulation Extractable Subversion and Updatable SNARKs Generically.
IACR Cryptol. ePrint Arch., 2020
2019
Structure-Preserving Signatures on Equivalence Classes and Constant-Size Anonymous Credentials.
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
Efficient Tightly-Secure Structure-Preserving Signatures and Unbounded Simulation-Sound QA-NIZK Proofs.
IACR Cryptol. ePrint Arch., 2019
Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based.
IACR Cryptol. ePrint Arch., 2019
I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting.
IACR Cryptol. ePrint Arch., 2019
A Framework for UC-Secure Commitments from Publicly Computable Smooth Projective Hashing.
IACR Cryptol. ePrint Arch., 2019
Key-homomorphic signatures: definitions and applications to multiparty signatures and non-interactive zero-knowledge.
Des. Codes Cryptogr., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Generic Double-Authentication Preventing Signatures and a Post-Quantum Instantiation.
IACR Cryptol. ePrint Arch., 2018
Revisiting Proxy Re-Encryption: Forward Secrecy, Improved Security, and Applications.
IACR Cryptol. ePrint Arch., 2018
Practical witness encryption for algebraic languages or how to encrypt under Groth-Sahai proofs.
Des. Codes Cryptogr., 2018
Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Post-Quantum Zero-Knowledge Proofs for Accumulators with Applications to Ring Signatures from Symmetric-Key Primitives.
IACR Cryptol. ePrint Arch., 2017
Homomorphic Proxy Re-Authenticators and Applications to Verifiable Multi-User Data Aggregation.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
2016
The Austrian eID ecosystem in the public cloud: How to obtain privacy while preserving practicality.
J. Inf. Secur. Appl., 2016
Group Signatures with Linking-Based Revocation: A Pragmatic Approach for Efficient Revocation Checks.
IACR Cryptol. ePrint Arch., 2016
Practical Round-Optimal Blind Signatures in the Standard Model from Weaker Assumptions.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Signer-Anonymous Designated-Verifier Redactable Signatures for Cloud-Based Data Sharing.
IACR Cryptol. ePrint Arch., 2016
Non-Interactive Plaintext (In-)Equality Proofs and Group Signatures with Verifiable Controllable Linkability.
IACR Cryptol. ePrint Arch., 2016
ERCIM News, 2016
Linking-Based Revocation for Group Signatures: A Pragmatic Approach for Efficient Revocation Checks.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
PRISMACLOUD Tools: A Cryptographic Toolbox for Increasing Security in Cloud Services.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016
2015
Trans. Data Priv., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Practical Witness Encryption for Algebraic Languages And How to Reply an Unknown Whistleblower.
IACR Cryptol. ePrint Arch., 2015
Rethinking Privacy for Extended Sanitizable Signatures and a Black-Box Construction of Strongly Private Schemes.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives.
IACR Cryptol. ePrint Arch., 2015
Comput. Secur., 2015
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015
Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements.
Proceedings of the Privacy and Identity Management. Time for a Revolution?, 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the E-Democracy - Citizen Rights in the World of the New Computing Paradigms, 2015
Proceedings of the Cyber Security and Privacy, 2015
Proceedings of the 7th IEEE International Conference on Cloud Computing Technology and Science, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
User-centric identity as a service-architecture for eIDs with selective attribute disclosure.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014
Proceedings of the Privacy and Identity Management for the Future Internet in the Age of Globalisation, 2014
A Federated Cloud Identity Broker-Model for Enhanced Privacy via Proxy Re-Encryption.
Proceedings of the Communications and Multimedia Security, 2014
Structure-Preserving Signatures on Equivalence Classes and Their Application to Anonymous Credentials.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Efficient Simultaneous Privately and Publicly Verifiable Robust Provable Data Possession from Elliptic Curves.
IACR Cryptol. ePrint Arch., 2013
Scalable and Privacy-Preserving Variants of the Austrian Electronic Mandate System in the Public Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Security and Privacy Protection in Information Processing Systems, 2013
2012
Datenschutz und Datensicherheit, 2012
A Framework for Privacy-Preserving Mobile Payment on Security Enhanced ARM TrustZone Platforms.
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012
Proceedings of the 7th International Conference for Internet Technology and Secured Transactions, 2012
Dynamic Accumulator Based Discretionary Access Control for Outsourced Storage with Unlinkable Access - (Short Paper).
Proceedings of the Financial Cryptography and Data Security, 2012
2011
Datenschutz und Datensicherheit, 2011
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Proceedings of the Communications and Multimedia Security, 2011
On Security and Privacy in Cloud Computing.
Proceedings of the CLOSER 2011, 2011
2010
Anonymous but Authorized Transactions Supporting Selective Traceability.
Proceedings of the SECRYPT 2010, 2010
Proceedings of the e-Business and Telecommunications - 7th International Joint Conference, 2010
Generalizations and Extensions of Redactable Signatures with Applications to Electronic Healthcare.
Proceedings of the Communications and Multimedia Security, 2010
k-Anonymity in Context of Digitally Signed CDA Documents.
Proceedings of the HEALTHINF 2010, 2010
2009
Practical Traceable Anonymous Identification.
Proceedings of the SECRYPT 2009, 2009
Electronic Health Records: An Enhanced Security Paradigm to Preserve Patient's Privacy.
Proceedings of the Biomedical Engineering Systems and Technologies, 2009
How to Preserve Patient's Privacy and Anonymity in Web-based Electronic Health Records.
Proceedings of the Second International Conference on Health Informatics, 2009
2008
Privacy-enhancing methods for e-health applications: how to prevent statistical analyses and attacks.
Int. J. Bus. Intell. Data Min., 2008
Proceedings of the Mobile Response, 2008
Proceedings of the Future of Identity in the Information Society, 2008
Proceedings of the The Third International Conference on Availability, 2008