Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nils Fleischhacker is active.

Publication


Featured researches published by Nils Fleischhacker.


theory and application of cryptographic techniques | 2013

Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures

Marc Fischlin; Nils Fleischhacker

We revisit the security of Fiat-Shamir signatures in the non-programmable random oracle model. The well-known proof by Pointcheval and Stern for such signature schemes (Journal of Cryptology, 2000) relies on the ability to re-program the random oracle, and it has been unknown if this property is inherent. Pailler and Vergnaud (Asiacrypt 2005) gave some first evidence of the hardness by showing via meta-reduction techniques that algebraic reductions cannot succeed in reducing key-only attacks against unforgeability to the discrete-log assumptions. We also use meta-reductions to show that the security of Schnorr signatures cannot be proven equivalent to the discrete logarithm problem without programming the random oracle. Our result also holds under the one-more discrete logarithm assumption but applies to a large class of reductions, we call single-instance reductions, subsuming those used in previous proofs of security in the (programmable) random oracle model. In contrast to algebraic reductions, our class allows arbitrary operations, but can only invoke a single resettable adversary instance, making our class incomparable to algebraic reductions.


public key cryptography | 2016

Efficient Unlinkable Sanitizable Signatures from Signatures with Re-randomizable Keys

Nils Fleischhacker; Johannes Krupp; Giulio Malavolta; Jonas Schneider; Dominique Schröder; Mark Simkin

In a sanitizable signature scheme the signer allows a designated third party, called the sanitizer, to modify certain parts of the message and adapt the signature accordingly. Ateniese et al. ESORICS 2005 introduced this primitive and proposed five security properties which were formalized by Brzuska et al.i¾?PKC 2009. Subsequently, Brzuska et al. PKC 2010 suggested an additional security notion, called unlinkability which says that one cannot link sanitized message-signature pairs of the same document. Moreover, the authors gave a generic construction based on group signatures that have a certain structure. However, the special structure required from the group signature scheme only allows for inefficient instantiations. Here, we present the first efficient instantiation of unlinkable sanitizable signatures. Our construction is based on a novel type of signature schemes with re-randomizable keys. Intuitively, this property allows to re-randomize both the signing and the verification key separately but consistently. This allows us to sign the message with a re-randomized key and to prove in zero-knowledge that the derived key originates from either the signer or the sanitizer. We instantiate this generic idea with Schnorr signatures and efficient


international conference on the theory and application of cryptology and information security | 2014

On Tight Security Proofs for Schnorr Signatures

Nils Fleischhacker; Tibor Jager; Dominique Schröder


international cryptology conference | 2014

Feasibility and Infeasibility of Secure Computation with Malicious PUFs

Dana Dachman-Soled; Nils Fleischhacker; Jonathan Katz; Anna Lysyanskaya; Dominique Schröder

\varSigma


international cryptology conference | 2016

Two-Message, Oblivious Evaluation of Cryptographic Functionalities

Nico Döttling; Nils Fleischhacker; Johannes Krupp; Dominique Schröder


local computer networks | 2011

SDF — Solar-aware distributed flow in wireless sensor networks

Immanuel Schweizer; Nils Fleischhacker; Max Mühlhäuser; Thorsten Strufe

Σ-protocols, which we convert into non-interactive zero-knowledge proofs via the Fiat-Shamir transformation. Our construction is at least one order of magnitude faster than instantiating the generic scheme of Brzuska et al.i¾?with the most efficient group signature schemes.


International Conference on Research in Security Standardisation | 2014

A Modular Framework for Multi-Factor Authentication and Key Exchange

Nils Fleischhacker; Mark Manulis; Amir Azodi

The Schnorr signature scheme is the most efficient signature scheme based on the discrete logarithm problem and a long line of research investigates the existence of a tight security reduction for this scheme in the random oracle. Almost all recent works present lower tightness bounds and most recently Seurin (Eurocrypt 2012) showed that under certain assumptions the non-tight security proof for Schnorr signatures in the random oracle by Pointcheval and Stern (Eurocrypt 1996) is essentially optimal. All previous works in this direction rule out tight reductions from the (one-more) discrete logarithm problem. In this paper we introduce a new meta-reduction technique, which shows lower bounds for the large and very natural class of generic reductions. A generic reduction is independent of a particular representation of group elements and most reductions in state-of-the-art security proofs have this desirable property. Our approach shows unconditionally that there is no tight generic reduction from any natural computational problem Π defined over algebraic groups (including even interactive problems) to breaking Schnorr signatures, unless solving Π is easy.


computer and communications security | 2013

Pseudorandom signatures

Nils Fleischhacker; Felix Günther; Franziskus Kiefer; Mark Manulis; Bertram Poettering

A recent line of work has explored the use of physically uncloneable functions (PUFs) for secure computation, with the goals of (1) achieving universal composability without (additional) setup, and/or (2) obtaining unconditional security (i.e., avoiding complexity-theoretic assumptions). Initial work assumed that all PUFs, even those created by an attacker, are honestly generated. Subsequently, researchers have investigated models in which an adversary can create malicious PUFs with arbitrary behavior. Researchers have considered both malicious PUFs that might be stateful, as well as malicious PUFs that can have arbitrary behavior but are guaranteed to be stateless.


theory and application of cryptographic techniques | 2018

On the Existence of Three Round Zero-Knowledge Proofs

Nils Fleischhacker; Vipul Goyal; Abhishek Jain

We study the problem of two round oblivious evaluation of cryptographic functionalities. In this setting, one party


international cryptology conference | 2016

On Statistically Secure Obfuscation with Approximate Correctness

Zvika Brakerski; Christina Brzuska; Nils Fleischhacker

Collaboration


Dive into the Nils Fleischhacker's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amir Azodi

Hasso Plattner Institute

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marc Fischlin

Technische Universität Darmstadt

View shared research outputs
Top Co-Authors

Avatar

Tibor Jager

Ruhr University Bochum

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Abhishek Jain

Johns Hopkins University

View shared research outputs
Researchain Logo
Decentralizing Knowledge