Doreen Riepel
Doreen Riepel
Home
Publications
Service
Contact
CV
Light
Dark
Automatic
1
No more Reviewer #2: Subverting Automatic Paper-Reviewer Assignment using Adversarial Learning
The number of papers submitted to academic conferences is steadily rising in many scientific disciplines. To handle this growth, …
Thorsten Eisenhofer
,
Erwin Quiring
,
Jonas Möller
,
Doreen Riepel
,
Thorsten Holz
,
Konrad Rieck
PDF
Cite
Code
Generic Models for Group Actions
We define the Generic Group Action Model (GGAM), an adaptation of the Generic Group Model to the setting of group actions (such as …
Julien Duman
,
Dominik Hartmann
,
Eike Kiltz
,
Sabrina Kunzweiler
,
Jonas Lehmann
,
Doreen Riepel
PDF
Cite
Multi-User CDH Problems and the Concrete Security of NAXOS and HMQV
We introduce CorrGapCDH, the Gap Computational Diffie-Hellman problem in the multi-user setting with Corruptions. In the random oracle …
Eike Kiltz
,
Jiaxin Pan
,
Doreen Riepel
,
Magnus Ringerud
PDF
Cite
FABEO: Fast Attribute-Based Encryption with Optimal Security
Attribute-based encryption (ABE) enables fine-grained access control on encrypted data and has a large number of practical …
Doreen Riepel
,
Hoeteck Wee
PDF
Cite
Code
Slides
Group Action Key Encapsulation and Non-Interactive Key Exchange in the QROM
In the context of quantum-resistant cryptography, cryptographic group actions offer an abstraction of isogeny-based cryptography in …
Julien Duman
,
Dominik Hartmann
,
Eike Kiltz
,
Sabrina Kunzweiler
,
Jonas Lehmann
,
Doreen Riepel
PDF
Cite
Strongly Anonymous Ratcheted Key Exchange
Anonymity is an (abstract) security goal that is especially important to threatened user groups. Therefore, widely deployed …
Benjamin Dowling
,
Eduard Hauck
,
Doreen Riepel
,
Paul Rösler
PDF
Cite
Password-Authenticated Key Exchange from Group Actions
We present two provably secure password-authenticated key exchange (PAKE) protocols based on a commutative group action. To date the …
Michel Abdalla
,
Thorsten Eisenhofer
,
Eike Kiltz
,
Sabrina Kunzweiler
,
Doreen Riepel
PDF
Cite
Video
Slides
Authenticated Key Exchange and Signatures with Tight Security in the Standard Model
We construct the first authenticated key exchange protocols that achieve tight security in the
standard model
. Previous works either …
Shuai Han
,
Tibor Jager
,
Eike Kiltz
,
Shengli Liu
,
Jiaxin Pan
,
Doreen Riepel
,
Sven Schäge
PDF
Cite
Video
Slides
Analysing the HPKE Standard
The
Hybrid Public Key Encryption
(HPKE) scheme is an emerging standard currently under consideration by the Crypto Forum Research Group …
Joël Alwen
,
Bruno Blanchet
,
Eduard Hauck
,
Eike Kiltz
,
Benjamin Lipp
,
Doreen Riepel
PDF
Cite
CryptoVerif
Tightly-Secure Authenticated Key Exchange, Revisited
We introduce new tightly-secure authenticated key exchange (AKE) protocols that are extremely efficient, yet have only a constant …
Tibor Jager
,
Eike Kiltz
,
Doreen Riepel
,
Sven Schäge
PDF
Cite
Video
Slides
«
Cite
×