• Publications
  • Influence
Designated Verifier Proofs and Their Applications
This work examplify the verifier designation method for the confirmation protocol for undeniable signatures, and demonstrates how a trap-door commitment scheme can be used to construct designated verifier proofs, both interactive and non-interactive. Expand
Coercion-resistant electronic elections
A model for electronic election schemes that involves a more powerful adversary than previous work that allows the adversary to demand of coerced voters that they vote in a particular manner, abstain from voting, or even disclose their secret keys. Expand
Controlling data in the cloud: outsourcing computation without outsourcing control
It is argued that with continued research advances in trusted computing and computation-supporting encryption, life in the cloud can be advantageous from a business intelligence standpoint over the isolated alternative that is more common today. Expand
Universal Re-encryption for Mixnets
An asymmetric cryptosystem with universal re-encryption that is half as efficient as standard ElGamal in terms of computation and storage is proposed. Expand
Mix and Match: Secure Function Evaluation via Ciphertexts
A practical, mix-and-match-based auction protocol that is fully private and non-interactive and may be readily adapted to a wide range of auction strategies, including sealed-bid auctions. Expand
Coercion-Resistant Electronic Elections
Abuse-Free Optimistic Contract Signing
We introduce the notion of abuse-free distributed contract signing, that is, distributed contract signing in which no party ever can prove to a third party that he is capable of choosing whether toExpand
Proofs of Work and Bread Pudding Protocols
The bread pudding protocol of the present invention represents a novel use of proofs of work and is based upon the same principle as the dish from which it takes its name, namely, that of reuse toExpand
Social phishing
Sometimes a "friendly" email message tempts recipients to reveal more online than they otherwise would, playing right into the sender's hand.
Security Weaknesses in Bluetooth
A range of methods can be employed to strengthen the protocol and prevent the newly discovered attacks, including a location attack, which can be used for industrial espionage, blackmail, and other undesirable activities. Expand