My Publications

You can find my list of publications also on dblp and GoogleScholar.


  1. 2024 | 📄 | Multi Designated Verifier Ring Signatures
  2. 2024 | 📄 | Updatable Privacy-Preserving Blueprints
  3. 2024 | 📄 | CaSCaDE: (Time-Based) Cryptography from Space Communications DElay
  4. 2024 | 📄 | Progressive and Efficient Verification for Digital Signatures: Extensions and Experimental Results
  5. 2024 | 📄 | Metadata Privacy Beyond Tunneling for Instant Messaging
  6. 2023 | 📄 | PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials
  7. 2022 | 📄 | Bifrost: Secure, Scalable and Efficient File Sharing System Using Dual Deduplication
  8. 2022 | 📄 | Secure Cloud Storage with Joint Deduplication and Erasure Protection
  9. 2022 | 📄 | CatNap: Practical and actively secure proximity testing with a napping party based on generic MPC techniques
  10. 2022 | 📄 | Outsourcing MPC Precomputation for Location Privacy
  11. 2022 | 📄 🎦 | Progressive And Efficient Verification For Digital Signatures
  12. 2022 | 📄 🎦 | Count Me In! Extendability for Threshold Ring Signatures
  13. 2021 | 📄 🎦 | LOVE a Pairing
  14. 2021 | 📄 | Yggdrasil: Privacy-aware Dual Deduplication in Multi Client Settings
  15. 2020 | 📄 🎦 | Where are you Bob? Privacy-Preserving Proximity Testing with a Napping Party
  16. 2020 | 📄 🎦 | Secure Generalized Deduplication via Multi-Key Revealing Encryption
  17. 2019 | 📄 | TOPPool: time-aware optimized privacy-preserving ridesharing
  18. 2019 | 📄 | The simplest multi-key linearly homomorphic signature scheme
  19. 2019 | 📄 | SAID: Reshaping Signal into an Identity-Based Asynchronous Messaging Protocol with Authenticated Ratcheting
  20. 2019 | 📄 🎦 | Multi-key homomorphic authenticators
  21. 2018 | 📄 | HIKE: Walking the Privacy Trail
  22. 2018 | 📄 🎦 | Matrioska: A Compiler for Multi-Key Homomorphic Signatures
  23. 2018 | 📄 | HB+DB: Distance bounding meets human based authentication
  24. 2017 | 📄 | Anonymous Single-Round Server-Aided Verification
  25. 2017 | 📄 | Revisiting Yasuda et al.’s Biometric Authentication Protocol: Are you Private Enough?
  26. 2017 | 📄 | Two-hop Distance-Bounding Protocols: Keep your Friends Close
  27. 2017 | 📄 | Privacy-preserving biometric authentication: challenges and directions
  28. 2016 | 📄 🎦 | Multi-key homomorphic authenticators
  29. 2015 | 📄 | Using distance-bounding protocols to securely verify the proximity of two-hop neighbours
  30. 2015 | 📄 | HB+DB, Mitigating Man-in-the-Middle Attacks Against HB+ with Distance Bounding
  31. 2014 | 📄 | On the Leakage of Information in Biometric Authentication.