Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Fairness and Correctness in Case of a Premature Abort

    When using cryptographic protocols for security critical applications premature abort is a serious threat. We define two important properties called quit fairness and quit correctness for protocols to resist a...

    Jens-Matthias Bohli, Jörn Müller-Quade in Progress in Cryptology - INDOCRYPT 2005 (2005)

  2. No Access

    Chapter and Conference Paper

    On Subliminal Channels in Deterministic Signature Schemes

    Subliminal channels in randomized signature algorithms like the DSA are well-known. However, much less seems to be known about this issue when dealing with deterministic schemes. Using some known signature sch...

    Jens-Matthias Bohli, Rainer Steinwandt in Information Security and Cryptology – ICISC 2004 (2005)

  3. No Access

    Article

    Weak Keys in MST1

    The public key cryptosystem MST1 has been introduced by Magliveras et al. [12] (Public Key Cryptosystems from Group Factorizations. Jatra Mountain Mathematical Publications). Its security relies on the hardness o...

    Jens-Matthias Bohli, Rainer Steinwandt in Designs, Codes and Cryptography (2005)

  4. No Access

    Article

    Key substitution attacks revisited: Taking into account malicious signers

    Given a signature sfor some message malong with a corresponding public verification key yin a key substitution attack an attacker derives another verification key \(\overline{y}\) ...

    Jens-Matthias Bohli, Stefan Röhrich in International Journal of Information Secur… (2006)

  5. No Access

    Chapter and Conference Paper

    A Framework for Robust Group Key Agreement

    Considering a protocol of Tseng, we show that a group key agreement protocol that resists attacks by malicious insiders in the authenticated broadcast model, loses this security when it is transfered into an u...

    Jens-Matthias Bohli in Computational Science and Its Applications - ICCSA 2006 (2006)

  6. No Access

    Chapter and Conference Paper

    Deniable Group Key Agreement

    Especially for key establishment protocols to be used in internet applications, the (privacy) concern of deniability arises: Can a protocol transcript be used—possibly by a participant—to prove the involvement of...

    Jens-Matthias Bohli, Rainer Steinwandt in Progress in Cryptology - VIETCRYPT 2006 (2006)

  7. No Access

    Chapter and Conference Paper

    Towards Provably Secure Group Key Agreement Building on Group Theory

    Known proposals for key establishment schemes based on combinatorial group theory are often formulated in a rather informal manner. Typically, issues like the choice of a session identifier and parallel protoc...

    Jens-Matthias Bohli, Benjamin Glas in Progress in Cryptology - VIETCRYPT 2006 (2006)

  8. No Access

    Chapter and Conference Paper

    A Subliminal-Free Variant of ECDSA

    A mode of operation of the Elliptic Curve Digital Signature Algorithm (ECDSA) is presented which provably excludes subliminal communication through ECDSA signatures. For this, the notion of a signature scheme ...

    Jens-Matthias Bohli, María Isabel González Vasco, Rainer Steinwandt in Information Hiding (2007)

  9. No Access

    Chapter and Conference Paper

    Bingo Voting: Secure and Coercion-Free Voting Using a Trusted Random Number Generator

    It is debatable if current direct-recording electronic voting machines can sufficiently be trusted for a use in elections. Reports about malfunctions and possible ways of manipulation abound. Voting schemes ha...

    Jens-Matthias Bohli, Jörn Müller-Quade, Stefan Röhrich in E-Voting and Identity (2007)

  10. Chapter and Conference Paper

    (Password) Authenticated Key Establishment: From 2-Party to Group

    A protocol compiler is described, that transforms any provably secure authenticated 2-party key establishment into a provably secure authenticated group key establishment with 2 more rounds of communication. T...

    Michel Abdalla, Jens-Matthias Bohli, María Isabel González Vasco in Theory of Cryptography (2007)

  11. No Access

    Article

    Secure group key establishment revisited

    We examine the popular proof models for group key establishment of Bresson et al. (LNCS 2248: 290–309, 2001; Proceedings of the 8th ACM conference on computer and communications security (CCS-8), 2001) and poi...

    Jens-Matthias Bohli in International Journal of Information Secur… (2007)

  12. No Access

    Article

    Key-Substitution-Angriffe und das Signaturgesetz

    Der vorliegende Beitrag widerlegt die gängige Annahme, nahezu jedes kryptographische Signaturverfahren erfülle die Anforderungen an fortgeschrittene elektronische Signaturen. Auch Algorithmen, die nach übliche...

    Jens-Matthias Bohli, Christoph Sorge in Datenschutz und Datensicherheit - DuD (2008)

  13. No Access

    Chapter and Conference Paper

    Relations Among Privacy Notions

    This paper presents a hierarchy of privacy notions that covers multiple anonymity and unlinkability variants. The underlying definitions, which are based on the idea of indistinguishability between two worlds,...

    Jens-Matthias Bohli, Andreas Pashalidis in Financial Cryptography and Data Security (2009)

  14. Chapter and Conference Paper

    Assisting Server for Secure Multi-Party Computation

    Distributed threats like botnets are among the most serious threats in the Internet. Due to their distributed nature, these attacks are difficult to detect in an early stage without the collaboration of severa...

    Jens-Matthias Bohli, Wenting Li, Jan Seedorf in Information Security Theory and Practice. … (2012)

  15. No Access

    Chapter and Conference Paper

    Securing Proof-of-Stake Blockchain Protocols

    Proof-of-Stake (PoS) protocols have been actively researched for the past five years. PoS finds direct applicability in open blockchain platforms and has been seen as a strong candidate to replace the largely ...

    Wenting Li, Sébastien Andreina in Data Privacy Management, Cryptocurrencies … (2017)