Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Greg Zaverucha is active.

Publication


Featured researches published by Greg Zaverucha.


computer and communications security | 2014

Algebraic MACs and Keyed-Verification Anonymous Credentials

Melissa Chase; Sarah Meiklejohn; Greg Zaverucha

We consider the problem of constructing anonymous credentials for use in a setting where the issuer of credentials is also the verifier, or more generally where the issuer and verifier have a shared key. In this setting we can use message authentication codes (MACs) instead of public key signatures as the basis for the credential system. To this end, we construct two algebraic MACs in prime-order groups, along with efficient protocols for issuing credentials, asserting possession of a credential, and proving statements about hidden attributes (e.g., the age of the credential owner). We prove the security of the first scheme in the generic group model, and prove the security of the second scheme\dash using a dual-system-based approach\dash under decisional Diffie-Hellman (DDH). Our MACs are of independent interest, as they are the only uf-cmva-secure MACs with efficient proofs of knowledge. Finally, we compare the efficiency of our new systems to two existing constructions of anonymous credentials: U-Prove and Idemix. We show that the performance of the new schemes is competitive with U-Prove (which does not have multi-show unlinkability), and many times faster than Idemix.


Archive | 2013

U-Prove Cryptographic Specification V1.1 (Revision 3)

Christian Paquin; Greg Zaverucha


computer and communications security | 2017

Post-Quantum Zero-Knowledge and Signatures from Symmetric-Key Primitives

Melissa Chase; David Derler; Steven Goldfeder; Claudio Orlandi; Sebastian Ramacher; Christian Rechberger; Daniel Slamanig; Greg Zaverucha


Archive | 2013

MINIMAL DISCLOSURE CREDENTIAL VERIFICATION AND REVOCATION

Tolga Acar; Christian Paquin; Greg Zaverucha; Melissa E. Chase


Archive | 2015

Return Oriented Programming (ROP) Attack Protection

Ling Tony Chen; Jonathan E. Lange; Greg Zaverucha


usenix security symposium | 2016

Authenticated Network Time Synchronization

Benjamin Dowling; Douglas Stebila; Greg Zaverucha


IACR Cryptology ePrint Archive | 2016

Efficient Post-Quantum Zero-Knowledge and Signatures.

Steven Goldfeder; Melissa Chase; Greg Zaverucha


IACR Cryptology ePrint Archive | 2015

Authenticated Network Time Synchronization.

Benjamin Dowling; Douglas Stebila; Greg Zaverucha


Archive | 2014

Identity escrow management for minimal disclosure credentials

Greg Zaverucha; Christian Paquin; Melissa E. Chase


IACR Cryptology ePrint Archive | 2013

A TPM Diffie-Hellman Oracle.

Tolga Acar; Lan Nguyen; Greg Zaverucha

Collaboration


Dive into the Greg Zaverucha's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Benjamin Dowling

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Douglas Stebila

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Daniel Slamanig

Austrian Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge