Search Results - "Miers, Ian"
-
1
Zerocash: Decentralized Anonymous Payments from Bitcoin
Published in 2014 IEEE Symposium on Security and Privacy (01-05-2014)“…Bit coin is the first digital currency to see widespread adoption. While payments are conducted between pseudonyms, Bit coin cannot offer strong privacy…”
Get full text
Conference Proceeding -
2
Forward Secure Asynchronous Messaging from Puncturable Encryption
Published in 2015 IEEE Symposium on Security and Privacy (01-05-2015)“…In this paper we investigate new mechanisms for achieving forward secure encryption in store and forward messaging systems such as email and SMS. In a forward…”
Get full text
Conference Proceeding -
3
ZEXE: Enabling Decentralized Private Computation
Published in 2020 IEEE Symposium on Security and Privacy (SP) (01-05-2020)“…Ledger-based systems that support rich applications often suffer from two limitations. First, validating a transaction requires re-executing the state…”
Get full text
Conference Proceeding -
4
Charm: a framework for rapidly prototyping cryptosystems
Published in Journal of cryptographic engineering (01-06-2013)“…We describe Charm, an extensible framework for rapidly prototyping cryptographic systems. Charm provides a number of features that explicitly support the…”
Get full text
Journal Article -
5
SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
Published in 2022 IEEE Symposium on Security and Privacy (SP) (01-05-2022)“…Zero-knowledge blocklists allow cross-platform blocking of users but, counter-intuitively, do not link users identities inter- or intra-platform, or to the…”
Get full text
Conference Proceeding -
6
Zerocoin: Anonymous Distributed E-Cash from Bitcoin
Published in 2013 IEEE Symposium on Security and Privacy (01-05-2013)“…Bitcoin is the first e-cash system to see widespread adoption. While Bitcoin offers the potential for new types of financial interaction, it has significant…”
Get full text
Conference Proceeding -
7
zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…Frequently, users on the web need to show that they are, for example, not a robot, old enough to access an age restricted video, or eligible to download an…”
Get full text
Conference Proceeding -
8
Is Cryptographic Deniability Sufficientƒ Non-Expert Perceptions of Deniability in Secure Messaging
Published in 2023 IEEE Symposium on Security and Privacy (SP) (01-05-2023)“…Cryptographers have long been concerned with secure messaging protocols threatening deniability. Many messaging protocols-including, surprisingly, modern…”
Get full text
Conference Proceeding -
9
A Watermark for Large Language Models
Published 24-01-2023“…Potential harms of large language models can be mitigated by watermarking model output, i.e., embedding signals into generated text that are invisible to…”
Get full text
Journal Article