Interessen

Meine Forschung beschäftigt sich primär mit der Entwicklung von kryptographischen Techniken und Verfahren zum Schutz der Privatsphäre. Dazu zählen meine Arbeiten über blinde Signaturen, sanitizable Signaturen, beweisbar verschlüsselte Signaturen, ring Signaturen und oblivious RAM. Ich interessiere mich ebenfalls für Kryptowährungen wie z.B. Bitcoin und solche die die Privatsphäre schützen, wie zum Beispiel Monero. Darüberhinaus begeistere ich mich für die Integration und Entwicklung von kryptographischen Lösungen in praktische Systeme mit dem Ziel die (praktische) Sicherheit und die Privatsphäre zu schützen, ohne die gewünschte Funktionalität einzuschränken. Beispiele hierfür sind meine Arbeiten über Password-hardening, password-hardened Verschlüsselung und die (kontrollierte) Berechnung auf verschlüsselten (genetischen) Daten.

Artikel in begutachteten Konferenzen und Workshops

  1. Verifiable Timed Signatures Made Practical

    Aravinda Thyagarajan | Adithya Bhat | Giulio Malavolta | Nico Döttling | Aniket Kate | Dominique Schröder
    ACM SIGSAC Conference on Computer and Communications Security | CCS | XX – XX | 2020

  2. Omniring: Scaling Private Payments Without Trusted Setup

    Russell W. F. Lai | Viktoria Ronge | Tim Ruffing | Dominique Schröder | Sri Aravinda Krishnan Thyagarajan | Jiafan Wang
    ACM SIGSAC Conference on Computer and Communications Security | CCS | 31-48 | 2019
    PDF

  3. Arithmetic Garbling from Bilinear Maps

    Nils Fleischhacker | Giulio Malavolta | Dominique Schröder
    The European Symposium on Research in Computer Security | ESORICS | (2) | 172-192 | 2019
    PDF

  4. Efficient Invisible and Unlinkable Sanitizable Signatures

    Xavier Bultel | Pascal Lafourcade |  Russell W. F. Lai |  Giulio Malavolta | Dominique Schröder |  Sri Aravinda Krishnan Thyagarajan
    Public Key Cryptography | PKC | (1) | 159-189 | 2019
    PDF

  5. Homomorphic Secret Sharing for Low Degree Polynomials

    Russell W. F. Lai | Giulio Malavolta | Dominique Schröder
    Advances in Cryptology | ASIACRYPT  | (3) | 2018 | 279-309
    PDF

  6. Simple Password-Hardened Encryption Services

    Russell W. F. Lai | Christoph Egger |  Manuel Reinert |  Sherman S. M. Chow | Matteo Maffei | Dominique Schröder
    USENIX Security Symposium | USENIX SEC | 2018 | 1405-1421
    PDF | VIDEO

  7. Burning Zerocoins for Fun and for Profit - A Cryptographic Denial-of-Spending Attack on the Zerocoin Protocol (Short Paper)

    Tim Ruffing | Sri Aravinda Krishnan Thyagarajan | Viktoria Ronge | Dominique Schröder
    Crypto Valley Conference on Blockchain Technology | CVCBT | 2018 |116-119
    PDF

  8. Phoenix: Rebirth of a Cryptographic Password-Hardening Service

    Russell W. F. Lai | Christoph Egger | Dominique Schröder | Sherman S. M. Chow
    USENIX Security Symposium | USENIX SEC | 2017 | 899-916
    PDF | VIDEO

  9. Efficient Ring Signatures in the Standard Model

    Giulio Malavolta | Dominique Schröder
    Advances in Cryptology | ASIACRYPT  | (2) | 2017 | 128-157
    VIDEO

  10. Maliciously Secure Multi-Client ORAM

    Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
    Applied Cryptography and Network Security | ACNS | 2017 | 645-664
    PDF

  11. Subset Predicate Encryption and Its Applications

    Jonathan Katz | Matteo Maffei | Giulio Malavolta | Dominique Schröder
    Cryptology and Network Security | CANS | 2017 | 115-134
    PDF

  12. On the Security of Frequency-Hiding Order-Preserving Encryption

    Matteo Maffei | Manuel Reinert | Dominique Schröder
    Cryptology and Network Security | CANS | 2017 | 51-70

  13. Efficient Cryptographic Password Hardening Services from Partially Oblivious Commitments

    Jonas Schneider | Nils Fleischhacker | Dominique Schröder | Michael Backes
    ACM Conference on Computer and Communications Security | CCS | 2016 | 1192-
    PDF | VIDEO

  14. Two-Message, Oblivious Evaluation of Cryptographic Functionalities.

    Nico Döttling | Nils Fleischhacker | Johannes Krupp | Dominique Schröder
    Advances in Cryptology | CRYPTO | 2016 | 619-648
    PDF | VIDEO

  15. Efficient Sanitizable Signatures Without Random Oracles

    Russell W. F. Lai | Tao Zhang | Sherman S. M. Chow | Dominique Schröder
    European Symposium on Research in Computer Security | ESORICS | 2016 | 363-380
    PDF

  16. Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

    Nils Fleischhacker | Johannes Krupp | Giulio Malavolta | Jonas Schneider | Dominique Schröder | Mark Simkin
    International Conference on Practice and Theory in Public-Key Cryptography | PKC |  2016 | 301-330
    PDF

  17. Delegatable Functional Signatures

    Michael Backes | Sebastian Meiser | Dominique Schröder
    International Conference on Practice and Theory in Public-Key Cryptography | PKC |  2016 | 357-386
    PDF

  18. Nearly Optimal Verifiable Data Streaming

    Johannes Krupp, Dominique Schröder, Mark Simkin, Dario Fiore, Giuseppe Ateniese, Stefan Nürnberger
    International Conference on Practice and Theory in Public-Key Cryptography | PKC |  2016 | 417-445
    PDF

  19. Liar, Liar, Coins on Fire!: Penalizing Equivocation By Loss of Bitcoins

    Tim Ruffing | Aniket Kate | Dominique Schröder
    ACM Conference on Computer and Communications Security | CCS | 2015 | 219-230
    PDF

  20. Efficient Pseudorandom Functions via On-the-Fly Adaptation

    Nico Döttling | Dominique Schröder
    Advances in Cryptology | CRYPTO | 2015 | 329-350
    PDF | VIDEO

  21. Privacy and Access Control for Outsourced Personal Records

    Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
    IEEE Symposium on Security and Privacy | Oakland | 2015 | 341-358
    PDF

  22. VeriStream - A Framework for Verifiable Data Streaming

    Dominique Schröder | Marc Simkin
    Financial Cryptography | FC | 2015 | 548-566
    PDF

  23. Verifiably Encrypted Signatures: Security Revisited and a New Construction

    Christian Hanser | Max Rabkin | Dominique Schröder
    European Symposium on Research in Computer Security | ESORICS | (1) | 2015 | 146-164
    PDF

  24. Foundations of Reconfigurable PUFs

    Jonas Schneider | Dominique Schröder
    Applied Cryptography and Network Security | ACNS | 2015 | 579-594
    PDF

  25. Feasibility and Infeasibility of Secure Computation with Malicious PUFs

    Dana Dachman-Soled | Nils Fleischhacker | Jonathan Katz | Anna Lysyanskaya | Dominique Schröder
    Advances in Cryptology | CRYPTO | 2014 | 405-420
    PDF

  26. On Tight Security Proofs for Schnorr Signatures

    Nils Fleischhacker | Tibor Jager | Dominique Schröder
    Advances in Cryptology | ASIACRYPT | 2014 | (1) | 512-531
    PDF

  27. WebTrust - A Comprehensive Authenticity and Integrity Framework for HTTP

    Michael Backes | Rainer W. Gerling | Sebastian Gerling | Stefan Nürnberger | Dominique Schröder | Mark Simkin
    Applied Cryptography and Network Security | ACNS | 2014 | 401-418

  28. POSTER: Enhancing Security and Privacy with Google Glass

    Johannes Krupp | Dominique Schröder | Mark Simkin
    ACM Conference on Computer and Communications Security | CCS | 2014 | 1445-1447

  29. (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

    Seung Geol Choi | Jonathan Katz | Dominique Schröder | Arkady Yerukhimovich | Hong-Sheng Zhou
    Theory of Cryptography Conference | TCC | 2014 | 638-662
    PDF

  30. Ubic: Bridging the Gap between Digital Cryptography and the Physical World

    Mark Simkin | Dominique Schröder | Andreas Bulling | Mario Fritz
    European Symposium on Research in Computer Security | ESORICS | (1) | 2014 | 56-75
    PDF

  31. Brief announcement: towards security and privacy for outsourced data in the multi-party setting

    Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
    ACM Symposium on Principles of Distributed Computing | PODC | 2014 | 144-146

  32. Verifiable data streaming

    Dominique Schröder | Heike Schröder
    ACM Conference on Computer and Communications Security | CCS | 2012 | 953-964
    PDF

  33. Uniqueness Is a Different Story: Impossibility of Verifiable Random Functions from Trapdoor Permutations

    Dario Fiore | Dominique Schröder
    Theory of Cryptography Conference | TCC | 2012 | 636-653
    PDF

  34. Security of Blind Signatures Revisited

    Dominique Schröder | Dominique Unruh
    International Conference on Practice and Theory in Public Key Cryptography | PKC | 2012 | 662-679
    PDF

  35. History-Free Sequential Aggregate Signatures

    Marc Fischlin | Anja Lehmann | Dominique Schröder
    Security and Cryptography for Networks | SCN | 2012 | 113-130
    PDF

  36. Round Optimal Blind Signatures

    Dominique Schröder | Dominique Unruh (merged with Sanjam Garg | Vanishree Rao | Amit Sahai)
    Advances in Cryptology | CRYPTO | 2011 | (1) | 512-531
    Submitted Version | Merged Version

  37. Impossibility of Blind Signatures from One-Way Permutations

    Jonathan Katz | Dominique Schröder | Arkady Yerukhimovich
    Theory of Cryptography Conference | TCC | 2011 | 615-629
    PDF

  38. How to Aggregate the CL Signature Scheme

    Dominique Schröder
    European Symposium on Research in Computer Security | ESORICS | 2011 | 298-314
    Slides |

  39. Expedient Non-malleability Notions for Hash Functions

    Paul Baecher | Marc Fischlin | Dominique Schröder
    The Cryptographers‘ Track at the RSA Conference | CT-RSA | 2011 | 268-283
    PDF

  40. On the Impossibility of Three-Move Blind Signature Schemes

    Marc Fischlin | Dominique Schröder
    Advances in Cryptology | EUROCRYPT  | 2010 | 197-215
    PDF

  41. Unlinkability of Sanitizable Signatures

    Christina Brzuska | Marc Fischlin | Anja Lehmann | Dominique Schröder
    Public Key Cryptography | PKC | 2010 | 159-189
    PDF

  42. Confidential Signatures and Deterministic Signcryption

    Alexander W. Dent | Marc Fischlin | Mark Manulis | Martijn Stam | Dominique Schröder
    Public Key Cryptography | PKC | 2010 | 462-479
    PDF 

  43. History-Free Aggregate Message Authentication Codes

    Oliver Eikemeier | Marc Fischlin | Jens-Fabian Götzmann | Anja Lehmann | Dominique Schröder | Peter Schröder | Daniel Wagner
    Security and Cryptography for Networks | SCN | 309-328
    PDF

  44. Redactable Signatures for Tree-Structured Data: Definitions and Constructions

    Christina Brzuska | Heike Busch | Özgür Dagdelen | Marc Fischlin | Martin Franz | Stefan Katzenbeisser | Mark Manulis | Cristina Onete | Andreas Peter | Bertram Poettering | Dominique Schröder
    Applied Cryptography and Network Security | ACNS | 2010 | 87-104
    PDF

  45. Generic Constructions for Verifiably Encrypted Signatures without Random Oracles or NIZKs

    Markus Rückert | Michael Schneider | Dominique Schröder
    Applied Cryptography and Network Security | ACNS | 2010 | 69-86
    PDF

  46. Fair Partially Blind Signatures

    Markus Rückert | Dominique Schröder
    International Conference on Cryptology in Africa | Africacrypt | 2010 | 34-51

  47. Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions

    David Galindo | Benoît Libert | Marc Fischlin | Georg Fuchsbauer | Anja Lehmann | Mark Manulis | Dominique Schröder
    International Conference on Cryptology in Africa | Africacrypt | 2010 | 333-350

  48. CAPTCHAs: The Good, the Bad, and the Ugly

    Paul Baecher | Marc Fischlin | Lior Gordon | Robert Langenberg | Michael Lützow | Dominique Schröder
    Sicherheit, Schutz und Zuverlässigkeit | Sicherheit | 2010 | 353-365
    PDF

  49. Security of Sanitizable Signatures Revisited

    Christina Brzuska | Marc Fischlin | Tobias Freudenreich | Anja Lehmann | Marcus Page | Jakob Schelbert | Dominique Schröder | Florian Volk
    Public Key Cryptography | PKC | 2009 | 317-336
    PDF

  50. Security of Blind Signatures under Aborts

    Marc Fischlin | Dominique Schröder
    Public Key Cryptography | PKC | 2009 | 297-316

  51. Security of Verifiably Encrypted Signatures and a Construction without Random Oracles

    Markus Rückert | Dominique Schröder
    Pairing-Based Cryptography | Pairing | 2009 | 17-34

  52. Aggregate and Verifiably Encrypted Signatures from Multilinear Maps without Random Oracles

    Markus Rückert | Dominique Schröder
    Advances in Information Security and Assurance | ISA | 2009 | 750-759

  53. Santizable Signatures: How to Partially Delegate Control for Authenticated Data

    Christina Brzuska | Marc Fischlin | Anja Lehmann | Dominique Schröder
    Special Interest Group on Biometrics and Electronic Signatures | BioSig | 2009 | 117-128

  54. Mobi: Eine Infrastruktur für das Internet der Dinge

    Michael Doering | Dominique Schröder
    Informatiktage | 2006 | 117-120

Journal Artikel

  1. Group ORAM for Privacy and Access Control in Outsourced Personal Records

    Matteo Maffei | Giulio Malavolta | Manuel Reinert | Dominique Schröder
    Journal of Computer Security | JoC | 27(1) | 1-47 | 2019
    PDF

  2. (Efficient) Universally Composable Oblivious Transfer Using a Minimal Number of Stateless Tokens

    Seung Geol Choi |Jonathan Katz | Dominique Schröder | Arkady Yerukhimovich | Hong-Sheng Zhou |
    Journal of Cryptology | JoC | 32(2) | 459-497 | 2019

  3. On Tight Security Proofs for Schnorr Signatures

    Nils Fleischhacker | Tibor Jager | Dominique Schröder
    Journal of Cryptology | JoC | 32(2) | 566-599 | 2019

  4. My Genome Belongs to Me: Controlling Third Party Computation on Genomic Data

    Dominic Deuber | Christoph Egger | Katharina Fech | Giulio Malavolta | Dominique Schröder | Sri Aravinda Krishnan Thyagarajan | Florian Battke | Claudia Durand
    Proceedings on Privacy Enhancing Technologies | PoPETs  | (1) | 108-132 | 2019

  5. Efficient Unlinkable Sanitizable Signatures from Signatures with Re-Randomizable Keys.

    Nils Fleischhacker | Johannes Krupp | Giulio Malavolta | Jonas Schneider |Dominique Schröder | Mark Simkin
    IET Information Security | IET | 12(3) | 166-183 | 2018

  6. Delegatable Functional Signatures

    Sebastian Meiser | Dominique Schröder
    IET Information Security | IET | 12(3) | 194-206 | 2018

  7. Functional Credentials

    Dominic Deuber |  Matteo Maffei | Giulio Malavolta | Max Rabkin | Dominique Schröder | Mark Simkin
    Proceedings on Privacy Enhancing Technologies |  PoPETs | (2) | 64-84 | 2018

  8. Security of Blind Signatures Revisited

    Dominique Schröder | Dominique Unruh
    Journal of Cryptology | JoC | 30(2) | 470-494 | 2017

  9. Security of blind signatures under aborts and applications to adaptive oblivious transfer

    Marc Fischlin | Dominique Schröder
    Journal of  Mathematical Cryptology | JoMC | 5(2) |  169-204 | 2012