Forschung
Meine Forschung beschäftigt sich primär mit der Entwicklung von kryptographischen Techniken und Verfahren zum Schutz der Privatsphäre. Dazu zählen meine Arbeiten über blinde Signaturen, sanitizable Signaturen, beweisbar verschlüsselte Signaturen, ring Signaturen und oblivious RAM. Ich interessiere mich ebenfalls für Kryptowährungen wie z.B. Bitcoin und solche die die Privatsphäre schützen, wie zum Beispiel Monero. Darüberhinaus begeistere ich mich für die Integration und Entwicklung von kryptographischen Lösungen in praktische Systeme mit dem Ziel die (praktische) Sicherheit und die Privatsphäre zu schützen, ohne die gewünschte Funktionalität einzuschränken. Beispiele hierfür sind meine Arbeiten über Password-hardening, password-hardened Verschlüsselung und die (kontrollierte) Berechnung auf verschlüsselten (genetischen) Daten.
Artikel in begutachteten Konferenzen und Workshops
-
Verifiable Timed Signatures Made Practical
Aravinda Thyagarajan | Adithya Bhat | Giulio Malavolta | Nico Döttling | Aniket Kate | Dominique Schröder
ACM SIGSAC Conference on Computer and Communications Security | CCS | XX – XX | 2020 -
Omniring: Scaling Private Payments Without Trusted Setup
Russell W. F. Lai | Viktoria Ronge | Tim Ruffing | Dominique Schröder | Sri Aravinda Krishnan Thyagarajan | Jiafan Wang
ACM SIGSAC Conference on Computer and Communications Security | CCS | 31-48 | 2019
PDF -
Arithmetic Garbling from Bilinear Maps
Nils Fleischhacker | Giulio Malavolta | Dominique Schröder
The European Symposium on Research in Computer Security | ESORICS | (2) | 172-192 | 2019
PDF -
Efficient Invisible and Unlinkable Sanitizable Signatures
Xavier Bultel | Pascal Lafourcade | Russell W. F. Lai | Giulio Malavolta | Dominique Schröder | Sri Aravinda Krishnan Thyagarajan
Public Key Cryptography | PKC | (1) | 159-189 | 2019
PDF -
Homomorphic Secret Sharing for Low Degree Polynomials
Russell W. F. Lai | Giulio Malavolta | Dominique Schröder
Advances in Cryptology | ASIACRYPT | (3) | 2018 | 279-309
PDF -
Burning Zerocoins for Fun and for Profit - A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol (Short Paper)
Tim Ruffing | Sri Aravinda Krishnan Thyagarajan | Viktoria Ronge | Dominique Schröder
Crypto Valley Conference on Blockchain Technology | CVCBT | 2018 |116-119
PDF -
Efficient Ring Signatures in the Standard Model
Giulio Malavolta | Dominique Schröder
Advances in Cryptology | ASIACRYPT | (2) | 2017 | 128-157
VIDEO -
Maliciously Secure Multi-Client ORAM
Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
Applied Cryptography and Network Security | ACNS | 2017 | 645-664
PDF -
Subset Predicate Encryption and Its Applications
Jonathan Katz | Matteo Maffei | Giulio Malavolta | Dominique Schröder
Cryptology and Network Security | CANS | 2017 | 115-134
PDF -
On the Security of Frequency-Hiding Order-Preserving Encryption
Matteo Maffei | Manuel Reinert | Dominique Schröder
Cryptology and Network Security | CANS | 2017 | 51-70
-
Efficient Sanitizable Signatures Without Random Oracles
Russell W. F. Lai | Tao Zhang | Sherman S. M. Chow | Dominique Schröder
European Symposium on Research in Computer Security | ESORICS | 2016 | 363-380
PDF -
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys
Nils Fleischhacker | Johannes Krupp | Giulio Malavolta | Jonas Schneider | Dominique Schröder | Mark Simkin
International Conference on Practice and Theory in Public-Key Cryptography | PKC | 2016 | 301-330
PDF -
Delegatable Functional Signatures
Michael Backes | Sebastian Meiser | Dominique Schröder
International Conference on Practice and Theory in Public-Key Cryptography | PKC | 2016 | 357-386
PDF -
Nearly Optimal Verifiable Data Streaming
Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger
International Conference on Practice and Theory in Public-Key Cryptography | PKC | 2016 | 417-445
PDF -
Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins
Tim Ruffing | Aniket Kate | Dominique Schröder
ACM Conference on Computer and Communications Security | CCS | 2015 | 219-230
PDF -
Privacy and Access Control for Outsourced Personal Records
Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
IEEE Symposium on Security and Privacy | Oakland | 2015 | 341-358
PDF -
VeriStream - A Framework for Verifiable Data Streaming
Dominique Schröder | Marc Simkin
Financial Cryptography | FC | 2015 | 548-566
PDF -
Verifiably Encrypted Signatures: Security Revisited and a New Construction
Christian Hanser | Max Rabkin | Dominique Schröder
European Symposium on Research in Computer Security | ESORICS | (1) | 2015 | 146-164
PDF -
Foundations of Reconfigurable PUFs
Jonas Schneider | Dominique Schröder
Applied Cryptography and Network Security | ACNS | 2015 | 579-594
PDF -
Feasibility and Infeasibility of Secure Computation with Malicious PUFs
Dana Dachman-Soled | Nils Fleischhacker | Jonathan Katz | Anna Lysyanskaya | Dominique Schröder
Advances in Cryptology | CRYPTO | 2014 | 405-420
PDF -
On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker | Tibor Jager | Dominique Schröder
Advances in Cryptology | ASIACRYPT | 2014 | (1) | 512-531
PDF -
WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP
Michael Backes | Rainer W. Gerling | Sebastian Gerling | Stefan Nürnberger | Dominique Schröder | Mark Simkin
Applied Cryptography and Network Security | ACNS | 2014 | 401-418 -
POSTER: Enhancing Security and Privacy with Google Glass
Johannes Krupp | Dominique Schröder | Mark Simkin
ACM Conference on Computer and Communications Security | CCS | 2014 | 1445-1447 -
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Seung Geol Choi | Jonathan Katz | Dominique Schröder | Arkady Yerukhimovich | Hong-Sheng Zhou
Theory of Cryptography Conference | TCC | 2014 | 638-662
PDF -
Ubic: Bridging the Gap between Digital Cryptography and the Physical World
Mark Simkin | Dominique Schröder | Andreas Bulling | Mario Fritz
European Symposium on Research in Computer Security | ESORICS | (1) | 2014 | 56-75
PDF -
Brief announcement: towards security and privacy for outsourced data in the multi-party setting
Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
ACM Symposium on Principles of Distributed Computing | PODC | 2014 | 144-146 -
Verifiable data streaming
Dominique Schröder | Heike Schröder
ACM Conference on Computer and Communications Security | CCS | 2012 | 953-964
PDF -
Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations
Dario Fiore | Dominique Schröder
Theory of Cryptography Conference | TCC | 2012 | 636-653
PDF -
Security of Blind Signatures Revisited
Dominique Schröder | Dominique Unruh
International Conference on Practice and Theory in Public Key Cryptography | PKC | 2012 | 662-679
PDF -
History-Free Sequential Aggregate Signatures
Marc Fischlin | Anja Lehmann | Dominique Schröder
Security and Cryptography for Networks | SCN | 2012 | 113-130
PDF -
Round Optimal Blind Signatures
Dominique Schröder | Dominique Unruh (merged with Sanjam Garg | Vanishree Rao | Amit Sahai)
Advances in Cryptology | CRYPTO | 2011 | (1) | 512-531
Submitted Version | Merged Version -
Impossibility of Blind Signatures from One-Way Permutations
Jonathan Katz | Dominique Schröder | Arkady Yerukhimovich
Theory of Cryptography Conference | TCC | 2011 | 615-629
PDF -
How to Aggregate the CL Signature Scheme
Dominique Schröder
European Symposium on Research in Computer Security | ESORICS | 2011 | 298-314
Slides | -
Expedient Non-malleability Notions for Hash Functions
Paul Baecher | Marc Fischlin | Dominique Schröder
The Cryptographers‘ Track at the RSA Conference | CT-RSA | 2011 | 268-283
PDF -
On the Impossibility of Three-Move Blind Signature Schemes
Marc Fischlin | Dominique Schröder
Advances in Cryptology | EUROCRYPT | 2010 | 197-215
PDF -
Unlinkability of Sanitizable Signatures
Christina Brzuska | Marc Fischlin | Anja Lehmann | Dominique Schröder
Public Key Cryptography | PKC | 2010 | 159-189
PDF -
Confidential Signatures and Deterministic Signcryption
Alexander W. Dent | Marc Fischlin | Mark Manulis | Martijn Stam | Dominique Schröder
Public Key Cryptography | PKC | 2010 | 462-479
PDF -
History-Free Aggregate Message Authentication Codes
Oliver Eikemeier | Marc Fischlin | Jens-Fabian Götzmann | Anja Lehmann | Dominique Schröder | Peter Schröder | Daniel Wagner
Security and Cryptography for Networks | SCN | 309-328
PDF -
Redactable Signatures for Tree-Structured Data: Definitions and Constructions
Christina Brzuska | Heike Busch | Özgür Dagdelen | Marc Fischlin | Martin Franz | Stefan Katzenbeisser | Mark Manulis | Cristina Onete | Andreas Peter | Bertram Poettering | Dominique Schröder
Applied Cryptography and Network Security | ACNS | 2010 | 87-104
PDF -
Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs
Markus Rückert | Michael Schneider | Dominique Schröder
Applied Cryptography and Network Security | ACNS | 2010 | 69-86
PDF -
Fair Partially Blind Signatures
Markus Rückert | Dominique Schröder
International Conference on Cryptology in Africa | Africacrypt | 2010 | 34-51 -
Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions
David Galindo | Benoît Libert | Marc Fischlin | Georg Fuchsbauer | Anja Lehmann | Mark Manulis | Dominique Schröder
International Conference on Cryptology in Africa | Africacrypt | 2010 | 333-350 -
CAPTCHAs: The Good, the Bad, and the Ugly
Paul Baecher | Marc Fischlin | Lior Gordon | Robert Langenberg | Michael Lützow | Dominique Schröder
Sicherheit, Schutz und Zuverlässigkeit | Sicherheit | 2010 | 353-365
PDF -
Security of Sanitizable Signatures Revisited
Christina Brzuska | Marc Fischlin | Tobias Freudenreich | Anja Lehmann | Marcus Page | Jakob Schelbert | Dominique Schröder | Florian Volk
Public Key Cryptography | PKC | 2009 | 317-336
PDF -
Security of Blind Signatures under Aborts
Marc Fischlin | Dominique Schröder
Public Key Cryptography | PKC | 2009 | 297-316 -
Security of Verifiably Encrypted Signatures and a Construction without Random Oracles
Markus Rückert | Dominique Schröder
Pairing-Based Cryptography | Pairing | 2009 | 17-34 -
Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles
Markus Rückert | Dominique Schröder
Advances in Information Security and Assurance | ISA | 2009 | 750-759 -
Santizable Signatures: How to Partially Delegate Control for Authenticated Data
Christina Brzuska | Marc Fischlin | Anja Lehmann | Dominique Schröder
Special Interest Group on Biometrics and Electronic Signatures | BioSig | 2009 | 117-128 -
Mobi: Eine Infrastruktur für das Internet der Dinge
Michael Doering | Dominique Schröder
Informatiktage | 2006 | 117-120
Journal Artikel
-
Group ORAM for Privacy and Access Control in Outsourced Personal Records
Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
Journal of Computer Security | JoC | 27(1) | 1-47 | 2019
PDF -
(Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens
Seung Geol Choi |Jonathan Katz | Dominique Schröder | Arkady Yerukhimovich | Hong-Sheng Zhou |
Journal of Cryptology | JoC | 32(2) | 459-497 | 2019 -
On Tight Security Proofs for Schnorr Signatures
Nils Fleischhacker | Tibor Jager | Dominique Schröder
Journal of Cryptology | JoC | 32(2) | 566-599 | 2019 -
My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data
Dominic Deuber | Christoph Egger | Katharina Fech | Giulio Malavolta | Dominique Schröder | Sri Aravinda Krishnan Thyagarajan | Florian Battke | Claudia Durand
Proceedings on Privacy Enhancing Technologies | PoPETs | (1) | 108-132 | 2019 -
Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys.
Nils Fleischhacker | Johannes Krupp | Giulio Malavolta | Jonas Schneider |Dominique Schröder | Mark Simkin
IET Information Security | IET | 12(3) | 166-183 | 2018 -
Delegatable Functional Signatures
Sebastian Meiser | Dominique Schröder
IET Information Security | IET | 12(3) | 194-206 | 2018 -
Functional Credentials
Dominic Deuber | Matteo Maffei | Giulio Malavolta | Max Rabkin | Dominique Schröder | Mark Simkin
Proceedings on Privacy Enhancing Technologies | PoPETs | (2) | 64-84 | 2018 -
Security of Blind Signatures Revisited
Dominique Schröder | Dominique Unruh
Journal of Cryptology | JoC | 30(2) | 470-494 | 2017 -
Security of blind signatures under aborts and applications to adaptive oblivious transfer
Marc Fischlin | Dominique Schröder
Journal of Mathematical Cryptology | JoMC | 5(2) | 169-204 | 2012