georg fuchsbauer



contact



programme committees


publications

  1. G. Fuchsbauer, M. Konstantinov, K. Pietrzak, V. Rao.Adaptive Security of Constrained PRFs.  To appear at ASIACRYPT '14.
    Full version available as ePrint Report 2014/416.  [slides]

  2. G. Fuchsbauer. Constrained Verifiable Random Functions.SCN '14.
    Full version available as ePrint Report 2014/537.  [slides]

  3. M. Bellare, G. Fuchsbauer. Policy-Based Signatures.PKC '14.
    Full version available as ePrint Report 2013/413.  [slides]

  4. D. Dachman-Soled, G. Fuchsbauer, P. Mohassel, A. O'Neill.Enhanced Chosen-Ciphertext Security and Applications.PKC '14.
    Full version available as ePrint Report 2012/543.

  5. O. Blazy, G. Fuchsbauer, D. Pointcheval, D. Vergnaud.Short Blind Signatures.Journal of Computer Security: Volume 21, no. 5, 2013.
    Article available [here].

  6. A.L. Ferrara, G. Fuchsbauer, B. Warinschi.Cryptographically Enforced RBAC.CSF '13.
    Full version available as ePrint Report 2013/492.  [slides]

  7. D. Bernhard, G. Fuchsbauer, E. Ghadafi.Efficient Signatures of Knowledge and DAA in the Standard Model.ACNS '13.
    Full version available as ePrint Report 2012/475.

  8. D. Bernhard, G. Fuchsbauer, E. Ghadafi, N.P. Smart, B. Warinschi.Anonymous Attestation with User-Controlled Linkability.Int. Journal of Information Security: Volume 12, Issue 3, 2013.
    Available as ePrint Report 2011/658.

  9. S. Canard, G. Fuchsbauer, A. Gouget, F. Laguillaumie.Plaintext-Checkable Encryption.CT-RSA '12. [pdf]

  10. O. Blazy, S. Canard, G. Fuchsbauer, A. Gouget, H. Sibert, J. Traoré.Achieving Optimal Anonymity in Transferable E-cash with a Judge.AFRICACRYPT '11.
    Full version available [here].   [slides]

  11. G. Fuchsbauer.Commuting Signatures and Verifiable Encryption.EUROCRYPT '11.
    Full version available as Commuting Signatures and Verifiable Encryption and an Application to Non-Interactively Delegatable Credentials, ePrint Report 2010/233.  [slides]

  12. O. Blazy, G. Fuchsbauer, D. Pointcheval, D. Vergnaud.Signatures on Randomizable Ciphertexts.PKC '11.
    Full version available [here].

  13. G. Fuchsbauer.Automorphic Signatures in Bilinear Groups and an Application to Round-Optimal Blind Signatures.[pdf]Cryptology ePrint Archive: Report 2009/320.  [slides]
    Appeared as part of
    M. Abe, G. Fuchsbauer, J. Groth, K. Haralambiev, M. Ohkubo. Structure-Preserving Signatures and Commitments to Group Elements.CRYPTO '10. [slides]

  14. O. Blazy, G. Fuchsbauer, M. Izabachène, A. Jambert, H. Sibert, D. Vergnaud.Batch Groth–Sahai. ACNS '10.
    Full version available as ePrint Report 2010/040.

  15. G. Fuchsbauer, J. Katz, D. Naccache.Efficient Rational Secret Sharing in Standard Communication Networks.TCC '10.
    Full version available as ePrint Report 2008/488.  [slides]

  16. X. Boyen, C. Chevalier, G. Fuchsbauer, D. Pointcheval.Strong Cryptography from Weak Secrets.AFRICACRYPT '10.
    Full version available [here].  [slides]

  17. D. Galindo, B. Libert, M. Fischlin, G. Fuchsbauer, A. Lehmann, M. Manulis, D. Schröder.Public-Key Encryption with Non-interactive Opening: New Constructions and Stronger Definitions.AFRICACRYPT '10. [pdf]

  18. G. Fuchsbauer, D. Vergnaud.Fair Blind Signatures without Random Oracles.AFRICACRYPT '10.
    Full version available as ePrint Report 2010/101.  [slides]

  19. G. Fuchsbauer, D. Pointcheval, D. Vergnaud.Transferable Constant-Size Fair E-Cash.CANS '09.
    Full version available as ePrint Report 2009/146.

  20. G. Fuchsbauer, D. Pointcheval.Proofs on Encrypted Values in Bilinear Groups and an Application to Anonymity of Signatures.PAIRING '09.
    Full version available as ePrint Report 2008/528.  [slides]

  21. G. Fuchsbauer, D. Pointcheval.Anonymous Consecutive Delegation of Signing Rights: Unifying Group and Proxy Signatures.Formal to Practical Security, LNCS 5458, Springer-Verlag, 2009.
    (Full version of the paper below) [pdf]

  22. G. Fuchsbauer, D. Pointcheval.Anonymous Proxy Signatures.SCN '08.   [slides]

  23. G. J. Fuchsbauer.An Introduction to Probabilistic Encryption.Osječki matematički list 6(2006), pp. 37–44.  [pdf]


teaching



thesis