Author pages are created from data sourced from our academic publisher partnerships and public sources.
Share This Author
- Stefan Dziembowski, Krzysztof Pietrzak
- Computer Science49th Annual IEEE Symposium on Foundations of…
- 25 October 2008
A stream-cipher S is constructed whose implementation is secure even if a bounded amount of arbitrary (adversarially chosen) information on the internal state of S is leaked during computation, and a lemma is proved that the output of any PRG has high HILLpseudoentropy even if arbitrary information about the seed is leaked.
Secure Multiparty Computations on Bitcoin
- Marcin Andrychowicz, Stefan Dziembowski, Daniel Malinowski, Lukasz Mazurek
- Computer ScienceIEEE Symposium on Security and Privacy
- 23 March 2016
The Bit coin system can be used to go beyond the standard "emulation-based" definition of the MPCs, by constructing protocols that link their inputs and the outputs with the real Bit coin transactions.
Proofs of Space
- Stefan Dziembowski, Sebastian Faust, V. Kolmogorov, Krzysztof Pietrzak
- Computer ScienceCRYPTO
- 16 August 2015
Proofs of work (PoW) have been suggested by Dwork and Naor as protection to a shared resource and used to prevent double spending in the Bitcoin digital currency system.
Efficient Multiparty Computations Secure Against an Adaptive Adversary
This paper observes that a subprotocol of Rabin and Ben-Or's, known as weak secret sharing (WSS), is not secure against an adaptive adversary, and proposes new and adaptively secure protocols for WSS, VSS and MPC that are substantially more efficient than the original ones.
Intrusion-Resilience Via the Bounded-Storage Model
- Stefan Dziembowski
- Computer ScienceTCC
- 4 March 2006
A new method of achieving intrusion-resilience in the cryptographic protocols, based on the results from the Bounded-Storage Model is introduced, namely: session-key generation and entity authentication.
It is shown that any functionality can be made secure against a large class of tampering attacks, simply by encoding the secret state with a non-malleable code while it is stored in memory.
FairSwap: How To Fairly Exchange Digital Goods
- Stefan Dziembowski, Lisa Eckey, Sebastian Faust
- Computer Science, BusinessIACR Cryptol. ePrint Arch.
- 8 October 2018
FairSwap is introduced -- an efficient protocol for fair exchange of digital goods using smart contracts executed over decentralized cryptocurrencies, where the contract takes the role of an external judge that completes the exchange in case of disagreement.
Leakage-Resilient Cryptography From the Inner-Product Extractor
- Stefan Dziembowski, Sebastian Faust
- Computer Science, MathematicsIACR Cryptol. ePrint Arch.
- 4 December 2011
It is shown that the encoding scheme used to store a cryptographic secret such that it remains information theoretically hidden, even given arbitrary continuous leakage from the storage, can be used to protect important cryptographic tasks such as identification, signing and encryption.
Perun: Virtual Payment Hubs over Cryptocurrencies
- Stefan Dziembowski, Lisa Eckey, Sebastian Faust, Daniel Malinowski
- Computer ScienceIEEE Symposium on Security and Privacy (SP)
- 19 May 2019
This work introduces Perun, an off-chain channel system that offers a new method for connecting channels that is more efficient than the existing technique of ``routing transactions'' over multiple channels, and formally model and prove security of this technique in the case of one intermediary.
General State Channel Networks
The main contribution of this work is to give the first full specification for general state channel networks, and provide formal security definitions and prove the security of the construction against powerful adversaries.