Publications & Presentations

2022

talks

  • Thomas Locher: The Internet Computer: An Overview - Guest lecture at EPFL

    September 2022

  • Thomas Locher: The Internet Computer: An Overview - Guest lecture at TU Dortmund

    June 2022

  • Stefan Kaestle: The IC for Systems Researchers - ETH Systems Group

    June 2022

  • Victor Shoup, Panel Discussion: The Web3 Evolution – a decentralized future - BofA Web3 & Digital Assets Day, New York

    June 2022

  • Victor Shoup: On the security of ECDSA with additive key derivation and presignatures - Trondheim, Norway, Eurocrypt

    June 2022

  • Rüdiger Birkner, Yotam Harchol, Yvonne-Anne Pignolet: The Internet Computer and its networks - Networked Systems Group, Laurent Van Bever, ETH Zurich

    May 2022

  • Yvonne-Anne Pignolet: Catching up on the IC - Seminar Cryptography and Data Security, University of Bern, Christian Cachin

    May 2022

  • Rüdiger Birkner, Yotam Harchol, Yvonne-Anne Pignolet: The Internet Computer and its networks - Network Security Group, Adrian Perrig, ETH Zurich

    April 2022

  • Victor Shoup: What is the Internet Computer? - Algorand presentation

    April 2022

  • Victor Shoup: A threshold ECDSA protocol: its design and implementation - Real World Crypto, Amsterdam

    April 2022

  • Jens Groth: The Internet Computer - ZISC seminar, ETH

    March 2022

  • Jens Groth: DFINITY & IC - Discussion with London Business School MBA and EMBA students visiting Zurich

    February 2022

tutorials

  • Kyle Peacock, Helge Bahmann, Ognjen Maric: Performant and Secure Applications on the Internet Computer - ASPLOS Tutorials 2022

    2022

proceedings

  • Jens Groth, Victor Shoup: On the security of ECDSA with additive key derivation and presignatures - Eurocrypt 2022

    2022

  • Aisling Connolly, Pascal Lafourcade, Octavio Perez Kempner: Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes - PKC 2022

    2022

  • Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan: On the Price of Locality in Static Fast Rerouting - DSN 2022

    2022

  • Max Aartsen, Kanta Banga, Konrad Talko, Dustin Touw, Bertus Wisman, Daniel Meinsma, Mathias Björkqvist: Analyzing Interoperability and Security Overhead of ROS2 DDS Middleware - MED 2022

    2022

  • Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams: Internet Computer Consensus - PODC 2022

    2022

  • Michel Abdalla, Thorsten Eisenhofer, Eike Kiltz, Sabrina Kunzweiler, Doreen Riepel: Password-Authenticated Key Exchange from Group Actions - CRYPTO 2022

    2022

preprints

  • The DFINITY Team: The Internet Computer for Geeks

    2022

  • Jens Groth, Victor Shoup: Design and analysis of a distributed ECDSA signing service

    2022

2021

proceedings

  • David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks: Fine-Grained Forward Secrecy: Allow-List/Deny-List Encryption and Applications - Financial Cryptography and Data Security 2021

    2021

  • Lucca Hirschi, Lara Schmid, David Basin: Fixing the Achilles Heel of E-Voting: The Bulletin Board - 34th IEEE Computer Security Foundations Symposium (CSF)

    2021

  • Michel Abdalla, Manuel Barbosa, Jonathan Katz, Julian Loss, Jiayu Xu: Algebraic Adversaries in the Universal Composability Framework - ASIACRYPT 2021

    2021

  • Michel Abdalla, Björn Haase, Julia Hesse: Security Analysis of CPace - ASIACRYPT 2021

    2021

  • Susan Hohenberger, Satyanarayana Vusirikala: PPE Circuits for Rational Polynomials - CCS 2021

    2021

  • Manuel Barbosa, Alexanda Boldyreva, Shan Chen, and Bogdan Warinschi: Provable security analysis of FIDO2 - CRYPTO 2021

    2021

keynote speech

  • Yvonne-Anne Pignolet: Applications and Technologies - IEEE/ACM International Conference on Big Data Computing

    December 2021

  • Björn Tackmann: The future of PI - Internet Identity

    September 2021

  • Jens Groth: A World of SNARKS - Invited talk, CRYPTO 2021

    August 2021

talks

  • Yvonne-Anne Pignolet: Catching up on the IC - Online lectures at EPFL and Schaffhausen Institute of Technology

    December 2021

  • Yvonne-Anne Pignolet, Thomas Locher: Distributed Systems at DFINITY - Lecture at ETHZ

    December 2021

2020

journals

  • Jonathan Bootle, Andrea Cerulli, Pyrros Chaidos, Essam Ghadafi, Jens Groth: Foundations of Fully Dynamic Group Signatures - Journal of Cryptology

    2020

  • Klaus-Tycho Foerster, Andrzej Kamisinkis, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan: Improved Fast Rerouting Using Postprocessing - IEEE Transactions on Dependable and Secure Computing

    2020

  • Hadassa Daltrophe, Barbara Keller, Zvi Lotker, Claire Mathieu, David Peleg, Yvonne-Anne Pignolet: Mixed Preferential Attachment Model: Homophily and Minorities in Social Networks - Physica A

    2020

  • David Derler, Kai Gellert, Tibor Jager, Daniel Slamanig, Christoph Striecks: Bloom Filter Encryption and Applications to Efficient Forward-Secret 0-RTT Key Exchange - Journal of Cryptology

    2020

proceedings

  • Manu Drijvers and Sergey Gorbunov and Gregory Neven and Hoeteck Wee: Pixel: Multi-signatures for Consensus - USENIX Security 2020

    2020

  • David Derler, Kai Samelin, Daniel Slamanig: Bringing Order to Chaos: The Case of Collision-Resistant Chameleon-Hashes - PKC 2020

    2020

  • Cyprien de Saint Guilhem, Marc Fischlin, and Bogdan Warinschi: Authentication in Key-Exchange: Definitions, Relations and Composition - CSF 2020

    2020

  • Veronique Cortier, Joseph Lallemand, and Bogdan Warinschi: Fifty Shades of Ballot Privacy: Privacy against a Malicious Board - CSF 2020

    2020

  • Jan Camenisch and Manu Drijvers and Anja Lehmann and Gregory Neven and Patrick Towa: Zone Encryption with Anonymous Authentication for V2V Communication - EuroS&P 2020

    2020

  • Raphael Eidenbenz, Yvonne-Anne Pignolet, Alain Ryser: Latency-Aware Industrial Fog Application Orchestration with Kubernetes - FMEC 2020

    2020

  • Daniel Collins, Rachid Guerraoui, Jovan Komatovic, Petr Kuznetsov, Matteo Monti, Matej Pavlovic, Yvonne-Anne Pignolet, Adrian Seredinschi, Andrei Tonkih, Athanasios Xygkis: Online Payments by Merely Broadcasting Messages - DSN 2020

    2020

  • Balázs Németh, Yvonne-Anne Pignolet, Matthias Rost, Stefan Schmid, Balázs Vass: Cost-Efficient Embedding of Virtual Networks With and Without Routing Flexibility - IFIP Networking 2020

    2020

  • Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan: Implications of Routing Coherence and Consistency on Network Optimization - IFIP Networking 2020

    2020

  • David Derler, Stephan Krenn, Kai Samelin, Daniel Slamanig: Fully Collision-Resistant Chameleon-Hashes from Simpler and Post-Quantum Assumptions - SCN 2020

    2020

  • Jonathan Bootle, Alessandro Chiesa, Jens Groth: Linear-Time Arguments with Sublinear Verification from Tensor Codes - TCC 2020

    2020

  • Rachid Guerraoui, Jovan Komatovic, Petr Kuznetsov, Yvonne-Anne Pignolet, Adrian Seredinschi, Andrei Tonkih, Athanasios Xygkis: Dynamic Byzantine Reliable Broadcast - OPODIS 2020

    2020

  • Klaus-Tycho Foerster, Juho Hirvonen, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan: On the Feasibility of Perfect Resilience with Local Fast Failover - APOCS 2021

    2020

eprints

  • Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa: Short Threshold Dynamic Group Signatures

    2020

  • Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa: Zone Encryption with Anonymous Authentication for V2V Communication

    2020

talks

  • Yvonne-Anne Pignolet: Efficient Asynchronous Payments - SERIAL workshop @ ACM Middleware

    December 2020

  • Yvonne-Anne Pignolet: Building the Internet Computer, A glimpse into an ambitious adventure - EPFL, TU Graz, TU Delft

    November 2020

  • Jan Camenisch: Zero-knowledge proofs for protocol construction - ZKproof.org 3rd Conference

    May 2020

  • Mihir Bellare, Felix Günther, Björn Tackmann: Two-tier authenticated encryption: Nonce-Hiding in QUIC - QUIPS workshop at NDSS 2020

    2020

  • Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, Marko Vukolič: The Transaction Graph Model for Modeling Blockchain Semantics - Cryptoeconomic Systems 2020

    2020

  • Jens Groth: The potentiality of linear-time proofs - Theory and Practice of Blockchains

    2020

other

  • Jens Groth: SNARKs - Encyclopedia of Cryptography

    2020

2019

proceedings

  • Joachim Breitner, Nadia Heninger: Biased Nonce Sense: Lattice Attacks against Weak ECDSA Signatures in Cryptocurrencies - Financial Cryptography

    2019

  • Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti: Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data - Financial Cryptography

    2019

  • Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya: On the Impossibility of Structure-Preserving Deterministic Primitives - J. Cryptology 32(1): 239-264 (2019)

    2019

  • Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu: Password-Authenticated Public-Key Encryption - ACNS ’19

    2019

  • Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny: Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards - IFIP SEC ‘19

    2019

  • Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs: On the Security of Two-Round Multi-Signatures - IEEE S&P 2019

    2019

  • Klaus-Tycho Foerster, Yvonne-Anne Pignolet, Stefan Schmid, Gilles Tredan: CASA: Congestion and Stretch Aware Static Fast Rerouting - 38th IEEE Conference on Computer Communications (INFOCOM), Paris, France

    2019

  • Klaus-Tycho Foerster, Andrzej Kamisinski, Yvonne-Anne Pignolet, Stefan Schmid, and Gilles Tredan: Bonsai: Efficient Fast Failover Routing Using Small Arborescences - 49th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), Portland, Oregon, USA

    June 2019

  • Marco Suter, Raphael Eidenbenz, Yvonne-Anne Pignolet, Ankit Simla: Fog Application Allocation for Automation Systems - ICFC 2019

    2019

  • David Derler, Kai Samelin, Daniel Slamanig, Christoph Striecks: Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based - NDSS 2019

    2019

  • Kevin Liao, Matthew A. Hammer, and Andrew Miller: ILC: A Calculus for Composable, Computational Cryptography - 40th ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI ’19)

    2019

  • Samvid Dharanikota, Rene Rydhof Hansen, Michael Jensen, Sebastian Ro Kristensen, Matthias Sass Michno, Yvonne-Anne Pignolet, and Stefan Schmid: Breeding Unicorns: Developing Trustworthy and Scalable Randomness Beacons - IEEE International Conference on Blockchain (Blockchain), Atlanta, Georgia, USA

    July 2019

  • Jochen Küster, Niklaus Meyer, Hagen Völzer, Maria Dubovitskaya, Michael Osborne, Axel Tanner: Managing Security Objects and Processes Using an Extended BPM Approach and System - IEEE 23rd International Enterprise Distributed Object Computing Conference (EDOC)

    2019

  • Zichen Gui, Oliver Johnson, Bogdan Warinschi: Encrypted Databases: New Volume Attacks against Range Queries - Computer and Communication Security (CCS’19)

    2019

  • Jan Camenisch, Stephan Krenn, Ralf Kuesters, Daniel Rausch: iUC: Flexible Universal Composability Made Simple - Asiacrypt 2019, Springer Verlag

    2019

  • Christian Cachin, Björn Tackmann: Asymmetric Distributed Trust - OPODIS 2019

    2019

  • Masayuki Abe, Jens Groth, Markulf Kohlweiss, Miyako Ohkubo, Mehdi Tibouchi: Efficient Fully Structure-Preserving Signatures and Shrinking Commitments - J. Cryptology32(3): 973-1025 (2019)

    2019

  • David Derler, Daniel Slamanig: Key-Homomorphic Signatures: Definitions and Applications to Multiparty Signatures and Non-Interactive Zero-Knowledge - Designs, Codes and Cryptography. 87(6): 1373-1413 (2019)

    2019

eprints

  • Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee: Pixel: Multi-Signatures for Consensus

    2019

  • Jan Camenisch, Manu Drijvers, Björn Tackmann: Multi-Protocol UC and its Use for Building Modular and Efficient Protocols

    2019

  • Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann: Privacy-preserving auditable token payments in a permissioned blockchain system

    2019

  • Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, Björn Tackmann: Anonymous transactions with revocation and auditing in Hyperledger Fabric

    2019

  • David Derler, Sebastian Ramacher, Daniel Slamanig, Christoph Striecks: I Want to Forget: Fine-Grained Encryption with Full Forward Secrecy in the Distributed Setting

    2019

talks

  • Jens Groth: Why should I believe that? - TAU TheoryFest Workshop

    December 2019

  • Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs: On the Security of Two-Round Multi-Signatures - Swiss Crypto Day

    September 2019

  • Jan Camenisch, Manu Drijvers, Björn Tackmann: Multi-Protocol UC and its Use for Building Modular and Efficient Protocols - Swiss Crypto Day

    September 2019

  • Jens Groth: Tutorial on [Groth16] + history of pairing-based proofs - Zero-Knowledge Proofs Workshop, London

    June 2019

  • Jan Camenisch: Cryptography in Crypto - Theory and Practice of Blockchain, Aarhus, Denmark

    May 2019

  • Jan Camenisch: Cryptography in Crypto - The Swiss Blockchain Winter School, Interlaken, Switzerland

    February 2019

  • Manu Drijvers, Sergey Gorbunov, Gregory Neven, Hoeteck Wee: Pixel: Multi-Signatures for Consensus - PENCIL workshop

    2019

  • Jan Camenisch Manu Drijvers Maria Dubovitskaya Anna Kaplan: Universally Composable and Privacy-Preserving Audit Logs Using Bulletin Board - PENCIL workshop

    2019

  • Jan Camenisch, David Derler, Manu Drijvers, Timo Hanke, Mahnush Movahedi, Gregory Neven: Efficient Distributed Key Generation for Threshold Signatures - Stanford Blockchain Conference 2019

    2019

  • Jens Groth: Honesty in the digital world. Invited seminar - GCHQ

    2019

  • Jens Groth: ZK and NIZK from Bilinear Maps - Bar-Ilan Winter School 2019

    2019

  • Jens Groth: On the evolution of pairing-based zero-knowledge proofs - ZKProof Standards Workshop 2019

    2019

  • Jens Groth: Why should I believe that? - PENCIL Workshop

    2019

  • Jan Camenisch: Cryptography in Crypto - The Swiss Blockchain Winter School, Interlaken, Switzerland

    February 2019

  • Manu Drijvers, Kasra Edalatnejad, Bryan Ford, Eike Kiltz, Julian Loss, Gregory Neven, Igors Stepanovs: On the Security of Two-Round Multi-Signatures - Real World Crypto

    2019

  • Mahnush Movahedi, Mahdi Zamani, Mariana Raykova: Scalability, Sharding, and Churn - PODC Workshop on Security of Permissionless Systems

    2019

  • Mahnush Movahedi: TBD - SF Bay ACM Event

    2019

  • Jens Groth: Panel discussion on Bringing Academic Research to Practice - 4th Blockchain Research Meetup during ACM CCS 2019

    2019