Christoph Striecks
Karlsruhe Institute of Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Christoph Striecks.
international cryptology conference | 2013
Eduarda S. V. Freire; Dennis Hofheinz; Kenneth G. Paterson; Christoph Striecks
We adapt the concept of a programmable hash function (PHF, Crypto 2008) to a setting in which a multilinear map is available. This enables new PHFs with previously unachieved parameters.
public key cryptography | 2015
Dennis Hofheinz; Jessica Koch; Christoph Striecks
We construct an identity-based encryption (IBE) scheme that is tightly secure in a very strong sense. Specifically, we consider a setting with many instances of the scheme and many encryptions per instance. In this setting, we reduce the security of our scheme to a variant of a simple assumption used for a similar purpose by Chen and Wee (Crypto 2013). The security loss of our reduction is (\(\mathbf {O}\) (\(k\)) ) (where \(k \) is the security parameter). Our scheme is the first IBE scheme to achieve this strong flavor of tightness under a simple assumption.
theory and application of cryptographic techniques | 2013
Florian Böhl; Dennis Hofheinz; Tibor Jager; Jessica Koch; Jae Hong Seo; Christoph Striecks
We put forward new techniques for designing signature schemes. As a result, we present practical signature schemes based on the CDH, the RSA, and the SIS assumptions. Our schemes compare favorably with existing schemes based on these assumptions.
Journal of Cryptology | 2015
Florian Böhl; Dennis Hofheinz; Tibor Jager; Jessica Koch; Christoph Striecks
We put forward a new technique to construct very efficient and compact signature schemes. Our technique combines several instances of only a mildly secure signature scheme to obtain a fully secure scheme. Since the mild security notion we require is much easier to achieve than full security, we can combine our strategy with existing techniques to obtain a number of interesting new (stateless and fully secure) signature schemes. Concretely, we get (1) A scheme based on the computational Diffie–Hellman (CDH) assumption in pairing-friendly groups. Signatures contain
international conference on information systems security | 2017
Stephan Krenn; Thomas Lorünser; Christoph Striecks
theory and application of cryptographic techniques | 2018
David Derler; Tibor Jager; Daniel Slamanig; Christoph Striecks
\mathbf {O}(1)
Elektrotechnik Und Informationstechnik | 2017
Thomas Lorünser; Stephan Krenn; Christoph Striecks; Thomas Länger
public key cryptography | 2018
David Derler; Stephan Krenn; Thomas Lorünser; Sebastian Ramacher; Daniel Slamanig; Christoph Striecks
O(1) and verification keys
IFIP International Summer School on Privacy and Identity Management | 2016
Farzaneh Karegar; Christoph Striecks; Stephan Krenn; Felix Hörandner; Thomas Lorünser; Simone Fischer-Hübner
the cryptographers’ track at the rsa conference | 2014
Dennis Hofheinz; Christoph Striecks
\mathbf {O}(\log k)