default search action
Susan Hohenberger
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c49]Susan Hohenberger, George Lu, Brent Waters, David J. Wu:
Registered Attribute-Based Encryption. EUROCRYPT (3) 2023: 511-542 - 2022
- [c48]Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala:
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems. ACNS 2022: 24-44 - [i39]Susan Hohenberger, George Lu, Brent Waters, David J. Wu:
Registered Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2022: 1500 (2022) - 2021
- [c47]Susan Hohenberger, Satyanarayana Vusirikala:
PPE Circuits for Rational Polynomials. CCS 2021: 2738-2757 - [i38]Arush Chhatrapati, Susan Hohenberger, James Trombo, Satyanarayana Vusirikala:
A Performance Evaluation of Pairing-Based Broadcast Encryption Systems. IACR Cryptol. ePrint Arch. 2021: 1526 (2021) - 2020
- [c46]Susan Hohenberger, Brent Waters:
New Methods and Abstractions for RSA-Based Forward Secure Signatures. ACNS (1) 2020: 292-312 - [c45]Susan Hohenberger, Satyanarayana Vusirikala, Brent Waters:
PPE Circuits: Formal Definition to Software Automation. CCS 2020: 391-408 - [c44]Susan Hohenberger, Venkata Koppula, Brent Waters:
Chosen Ciphertext Security from Injective Trapdoor Functions. CRYPTO (1) 2020: 836-866 - [i37]Susan Hohenberger, Venkata Koppula, Brent Waters:
Chosen Ciphertext Security from Injective Trapdoor Functions. IACR Cryptol. ePrint Arch. 2020: 759 (2020) - [i36]Susan Hohenberger, Brent Waters:
New Methods and Abstractions for RSA-Based Forward Secure Signatures. IACR Cryptol. ePrint Arch. 2020: 874 (2020)
2010 – 2019
- 2019
- [c43]Susan Hohenberger, Satyanarayana Vusirikala:
Are These Pairing Elements Correct?: Automated Verification and Applications. CCS 2019: 923-939 - [i35]Susan Hohenberger, Satyanarayana Vusirikala:
Are These Pairing Elements Correct? Automated Verification and Applications. IACR Cryptol. ePrint Arch. 2019: 1391 (2019) - 2018
- [c42]Susan Hohenberger, Brent Waters:
Synchronized Aggregate Signatures from the RSA Assumption. EUROCRYPT (2) 2018: 197-229 - [i34]Susan Hohenberger, Brent Waters:
Synchronized Aggregate Signatures from the RSA Assumption. IACR Cryptol. ePrint Arch. 2018: 82 (2018) - 2017
- [c41]Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters:
Signature Schemes with Randomized Verification. ACNS 2017: 373-389 - [c40]Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. TCC (2) 2017: 537-566 - [i33]Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters:
A Generic Approach to Constructing and Proving Verifiable Random Functions. IACR Cryptol. ePrint Arch. 2017: 21 (2017) - 2015
- [j8]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
An Overview of ANONIZE: A Large-Scale Anonymous Survey System. IEEE Secur. Priv. 13(2): 22-29 (2015) - [j7]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. J. Cryptol. 28(2): 351-395 (2015) - [c39]Susan Hohenberger, Venkata Koppula, Brent Waters:
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. ASIACRYPT (1) 2015: 79-102 - [c38]Allison Bishop, Susan Hohenberger, Brent Waters:
New Circular Security Counterexamples from Decision Linear and Learning with Errors. ASIACRYPT (2) 2015: 776-800 - [c37]Joseph A. Akinyele, Christina Garman, Susan Hohenberger:
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. CCS 2015: 1370-1381 - [c36]Susan Hohenberger, Venkata Koppula, Brent Waters:
Universal Signature Aggregators. EUROCRYPT (2) 2015: 3-34 - [i32]Joseph A. Akinyele, Christina Garman, Susan Hohenberger:
Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes. IACR Cryptol. ePrint Arch. 2015: 290 (2015) - [i31]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IACR Cryptol. ePrint Arch. 2015: 681 (2015) - [i30]Allison Bishop, Susan Hohenberger, Brent Waters:
New Circular Security Counterexamples from Decision Linear and Learning with Errors. IACR Cryptol. ePrint Arch. 2015: 715 (2015) - 2014
- [j6]Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. J. Comput. Secur. 22(6): 867-912 (2014) - [c35]Susan Hohenberger, Amit Sahai, Brent Waters:
Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation. EUROCRYPT 2014: 201-220 - [c34]Susan Hohenberger, Brent Waters:
Online/Offline Attribute-Based Encryption. Public Key Cryptography 2014: 293-310 - [c33]Susan Hohenberger, Steven A. Myers, Rafael Pass, Abhi Shelat:
ANONIZE: A Large-Scale Anonymous Survey System. IEEE Symposium on Security and Privacy 2014: 375-389 - [i29]Susan Hohenberger, Brent Waters:
Online/Offline Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2014: 21 (2014) - [i28]Susan Hohenberger, Venkata Koppula, Brent Waters:
Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model. IACR Cryptol. ePrint Arch. 2014: 521 (2014) - [i27]Susan Hohenberger, Venkata Koppula, Brent Waters:
Universal Signature Aggregators. IACR Cryptol. ePrint Arch. 2014: 745 (2014) - 2013
- [c32]Joseph A. Akinyele, Matthew Green, Susan Hohenberger:
Using SMT solvers to automate design tasks for encryption and signature schemes. CCS 2013: 399-410 - [c31]Susan Hohenberger, Amit Sahai, Brent Waters:
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures. CRYPTO (1) 2013: 494-512 - [c30]Susan Hohenberger, Brent Waters:
Attribute-Based Encryption with Fast Decryption. Public Key Cryptography 2013: 162-179 - [i26]Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes. IACR Cryptol. ePrint Arch. 2013: 175 (2013) - [i25]Susan Hohenberger, Brent Waters:
Attribute-Based Encryption with Fast Decryption. IACR Cryptol. ePrint Arch. 2013: 265 (2013) - [i24]Susan Hohenberger, Amit Sahai, Brent Waters:
Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures. IACR Cryptol. ePrint Arch. 2013: 434 (2013) - [i23]Susan Hohenberger, Amit Sahai, Brent Waters:
Replacing a Random Oracle: Full Domain Hash From Indistinguishability Obfuscation. IACR Cryptol. ePrint Arch. 2013: 509 (2013) - 2012
- [j5]Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen:
Batch Verification of Short Signatures. J. Cryptol. 25(4): 723-747 (2012) - [c29]Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano:
Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes. CCS 2012: 474-487 - [c28]Susan Hohenberger, Allison B. Lewko, Brent Waters:
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. EUROCRYPT 2012: 663-681 - [c27]David Cash, Matthew Green, Susan Hohenberger:
New Definitions and Separations for Circular Security. Public Key Cryptography 2012: 540-557 - [c26]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. TCC 2012: 1-20 - [i22]Susan Hohenberger, Allison B. Lewko, Brent Waters:
Detecting Dangerous Queries: A New Approach for Chosen Ciphertext Security. IACR Cryptol. ePrint Arch. 2012: 6 (2012) - 2011
- [j4]Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan:
Securely Obfuscating Re-Encryption. J. Cryptol. 24(4): 694-719 (2011) - [j3]Scott E. Coull, Matthew Green, Susan Hohenberger:
Access controls for oblivious and anonymous systems. ACM Trans. Inf. Syst. Secur. 14(1): 10:1-10:28 (2011) - [c25]Matthew Green, Susan Hohenberger:
Practical Adaptive Oblivious Transfer from Simple Assumptions. TCC 2011: 347-363 - [c24]Matthew Green, Susan Hohenberger, Brent Waters:
Outsourcing the Decryption of ABE Ciphertexts. USENIX Security Symposium 2011 - [i21]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. IACR Cryptol. ePrint Arch. 2011: 96 (2011) - 2010
- [c23]Jae Hyun Ahn, Matthew Green, Susan Hohenberger:
Synchronized aggregate signatures: new definitions, constructions and applications. CCS 2010: 473-484 - [c22]Susan Hohenberger, Brent Waters:
Constructing Verifiable Random Functions with Large Input Spaces. EUROCRYPT 2010: 656-672 - [i20]Susan Hohenberger, Brent Waters:
Constructing Verifiable Random Functions with Large Input Spaces. IACR Cryptol. ePrint Arch. 2010: 102 (2010) - [i19]Matthew Green, Susan Hohenberger:
Practical Adaptive Oblivious Transfer from Simple Assumptions. IACR Cryptol. ePrint Arch. 2010: 109 (2010) - [i18]Matthew Green, Susan Hohenberger:
CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure. IACR Cryptol. ePrint Arch. 2010: 144 (2010) - [i17]Jae Hyun Ahn, Matthew Green, Susan Hohenberger:
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications. IACR Cryptol. ePrint Arch. 2010: 422 (2010)
2000 – 2009
- 2009
- [c21]Susan Hohenberger, Brent Waters:
Short and Stateless Signatures from the RSA Assumption. CRYPTO 2009: 654-670 - [c20]Giuseppe Ateniese, Karyn Benson, Susan Hohenberger:
Key-Private Proxy Re-encryption. CT-RSA 2009: 279-294 - [c19]Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen:
Practical Short Signature Batch Verification. CT-RSA 2009: 309-324 - [c18]Susan Hohenberger, Brent Waters:
Realizing Hash-and-Sign Signatures under Standard Assumptions. EUROCRYPT 2009: 333-350 - [c17]Scott E. Coull, Matthew Green, Susan Hohenberger:
Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials. Public Key Cryptography 2009: 501-520 - [i16]Susan Hohenberger, Brent Waters:
Realizing Hash-and-Sign Signatures under Standard Assumptions. IACR Cryptol. ePrint Arch. 2009: 28 (2009) - [i15]Susan Hohenberger, Brent Waters:
Short and Stateless Signatures from the RSA Assumption. IACR Cryptol. ePrint Arch. 2009: 283 (2009) - 2008
- [c16]Matthew Green, Susan Hohenberger:
Universally Composable Adaptive Oblivious Transfer. ASIACRYPT 2008: 179-197 - [i14]Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, Michael Østergaard Pedersen:
Practical Short Signature Batch Verification. IACR Cryptol. ePrint Arch. 2008: 15 (2008) - [i13]Matthew Green, Susan Hohenberger:
Universally Composable Adaptive Oblivious Transfer. IACR Cryptol. ePrint Arch. 2008: 163 (2008) - [i12]Giuseppe Ateniese, Karyn Benson, Susan Hohenberger:
Key-Private Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2008: 463 (2008) - [i11]Scott E. Coull, Matthew Green, Susan Hohenberger:
Access Controls for Oblivious and Anonymous Systems. IACR Cryptol. ePrint Arch. 2008: 474 (2008) - 2007
- [c15]Matthew Green, Susan Hohenberger:
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. ASIACRYPT 2007: 265-282 - [c14]David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu:
On Tweaking Luby-Rackoff Blockciphers. ASIACRYPT 2007: 342-356 - [c13]Ran Canetti, Susan Hohenberger:
Chosen-ciphertext secure proxy re-encryption. CCS 2007: 185-194 - [c12]Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen:
Batch Verification of Short Signatures. EUROCRYPT 2007: 246-263 - [c11]Susan Hohenberger, Guy N. Rothblum, Abhi Shelat, Vinod Vaikuntanathan:
Securely Obfuscating Re-encryption. TCC 2007: 233-252 - [i10]Ran Canetti, Susan Hohenberger:
Chosen-Ciphertext Secure Proxy Re-Encryption. IACR Cryptol. ePrint Arch. 2007: 171 (2007) - [i9]Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen:
Batch Verification of Short Signatures. IACR Cryptol. ePrint Arch. 2007: 172 (2007) - [i8]Matthew Green, Susan Hohenberger:
Blind Identity-Based Encryption and Simulatable Oblivious Transfer. IACR Cryptol. ePrint Arch. 2007: 235 (2007) - [i7]David Goldenberg, Susan Hohenberger, Moses D. Liskov, Elizabeth Crump Schwartz, Hakan Seyalioglu:
On Tweaking Luby-Rackoff Blockciphers. IACR Cryptol. ePrint Arch. 2007: 350 (2007) - 2006
- [b1]Susan Hohenberger:
Advances in signatures, encryption, and E-Cash from bilinear groups. Massachusetts Institute of Technology, Cambridge, MA, USA, 2006 - [j2]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1): 1-30 (2006) - [c10]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication. CCS 2006: 201-210 - [c9]Susan Hohenberger, Stephen A. Weis:
Honest-Verifier Private Disjointness Testing Without Random Oracles. Privacy Enhancing Technologies 2006: 277-294 - [c8]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract). SCN 2006: 141-155 - [c7]Ben Adida, David Chau, Susan Hohenberger, Ronald L. Rivest:
Lightweight Email Signatures (Extended Abstract). SCN 2006: 288-302 - [i6]Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich:
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication. IACR Cryptol. ePrint Arch. 2006: 454 (2006) - 2005
- [c6]Giuseppe Ateniese, Susan Hohenberger:
Proxy re-signatures: new definitions, algorithms, and applications. CCS 2005: 310-319 - [c5]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. EUROCRYPT 2005: 302-321 - [c4]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. NDSS 2005 - [c3]Ben Adida, Susan Hohenberger, Ronald L. Rivest:
Lightweight Encryption for Email. SRUTI 2005 - [c2]Susan Hohenberger, Anna Lysyanskaya:
How to Securely Outsource Cryptographic Computations. TCC 2005: 264-282 - [i5]Giuseppe Ateniese, Kevin Fu, Matthew Green, Susan Hohenberger:
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage. IACR Cryptol. ePrint Arch. 2005: 28 (2005) - [i4]Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya:
Compact E-Cash. IACR Cryptol. ePrint Arch. 2005: 60 (2005) - [i3]Giuseppe Ateniese, Jan Camenisch, Susan Hohenberger, Breno de Medeiros:
Practical Group Signatures without Random Oracles. IACR Cryptol. ePrint Arch. 2005: 385 (2005) - [i2]Giuseppe Ateniese, Susan Hohenberger:
Proxy Re-Signatures: New Definitions, Algorithms, and Applications. IACR Cryptol. ePrint Arch. 2005: 433 (2005) - 2004
- [j1]Ron Breukelaar, Erik D. Demaine, Susan Hohenberger, Hendrik Jan Hoogeboom, Walter A. Kosters, David Liben-Nowell:
Tetris is hard, even to approximate. Int. J. Comput. Geom. Appl. 14(1-2): 41-68 (2004) - 2003
- [c1]Erik D. Demaine, Susan Hohenberger, David Liben-Nowell:
Tetris is Hard, Even to Approximate. COCOON 2003: 351-363 - 2002
- [i1]Erik D. Demaine, Susan Hohenberger, David Liben-Nowell:
Tetris is Hard, Even to Approximate. CoRR cs.CC/0210020 (2002)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:51 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint