Stanislaw Jarecki - Publications

Affiliations: 
University of California, Irvine, Irvine, CA 
Area:
Computer Science

45 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2019 Shirvanian M, Saxena N, Jarecki S, Krawczyk H. Building and Studying a Password Store that Perfectly Hides Passwords from Itself Ieee Transactions On Dependable and Secure Computing. 16: 770-782. DOI: 10.1109/Tdsc.2019.2902551  0.649
2016 Jarecki S, Shirvanian M, Krawczyk H, Saxena N. Device-enhanced password protocols with optimal online-offline protection Asia Ccs 2016 - Proceedings of the 11th Acm Asia Conference On Computer and Communications Security. 177-188. DOI: 10.1145/2897845.2897880  0.433
2016 Jarecki S, Kiayias A, Krawczyk H, Xu J. Highly-efficient and composable password-protected secret sharing (Or: How to Protect Your Bitcoin Wallet Online) Proceedings - 2016 Ieee European Symposium On Security and Privacy, Euro S and P 2016. 276-291. DOI: 10.1109/EuroSP.2016.30  0.334
2015 Faber S, Jarecki S, Kentros S, Wei B. Three-party ORAM for secure computation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 9452: 360-385. DOI: 10.1007/978-3-662-48797-6_16  0.415
2015 Jarecki S, Odlyzko A. An efficient micropayment system based on probabilistic polling Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1318: 173-191.  0.474
2014 Jarecki S. Practical covert authentication Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8383: 611-629. DOI: 10.1007/978-3-642-54631-0_35  0.432
2014 Jarecki S, Kiayias A, Krawczyk H. Round-optimal password-protected secret sharing and T-PAKE in the password-only model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8874: 233-253.  0.582
2013 Cash D, Jarecki S, Jutla C, Krawczyk H, Roşu MC, Steiner M. Highly-scalable searchable symmetric encryption with support for Boolean queries Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8042: 353-373. DOI: 10.1007/978-3-642-40041-4_20  0.365
2012 Cheon JH, Jarecki S, Seo JH. Multi-party privacy-preserving set intersection with quasi-linear complexity Ieice Transactions On Fundamentals of Electronics, Communications and Computer Sciences. 1366-1378. DOI: 10.1587/Transfun.E95.A.1366  0.554
2011 Bagherzandi A, Jarecki S, Saxena N, Lu Y. Password-protected secret sharing Proceedings of the Acm Conference On Computer and Communications Security. 433-443. DOI: 10.1145/2046707.2046758  0.694
2011 Jarecki S, Kim J, Tsudik G. Flexible robust group key agreement Ieee Transactions On Parallel and Distributed Systems. 22: 879-886. DOI: 10.1109/Tpds.2010.128  0.481
2011 Cheon JH, Jarecki S, Kwon T, Lee MK. Fast exponentiation using split exponents Ieee Transactions On Information Theory. 57: 1816-1826. DOI: 10.1109/Tit.2010.2059831  0.492
2010 Jarecki S, Saxena N. On the insecurity of proactive RSA in the URSA mobile Ad Hoc network access control protocol Ieee Transactions On Information Forensics and Security. 5: 739-749. DOI: 10.1109/Tifs.2010.2058104  0.717
2010 Jarecki S, Liu X. Fast secure computation of set intersection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6280: 418-435. DOI: 10.1007/978-3-642-15317-4_26  0.368
2010 Jarecki S, Saxena N. Authenticated key agreement with key re-use in the short authenticated strings model Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6280: 253-270. DOI: 10.1007/978-3-642-15317-4_17  0.658
2010 Bagherzandi A, Jarecki S. Identity-based aggregate and multi-signature schemes based on RSA Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6056: 480-498. DOI: 10.1007/978-3-642-13013-7_28  0.701
2009 Sirivianos M, Yang X, Jarecki S. Robust and efficient incentives for cooperative content distribution Ieee/Acm Transactions On Networking. 17: 1766-1779. DOI: 10.1109/Tnet.2009.2021655  0.391
2009 De Cristofaro E, Jarecki S, Kim J, Tsudik G. Privacy-preserving policy-based information transfer Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5672: 164-184. DOI: 10.1007/978-3-642-03168-7_10  0.354
2009 Jarecki S, Liu X. Efficient oblivious pseudorandom function with applications to adaptive ot and secure computation of set intersection Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5444: 577-594. DOI: 10.1007/978-3-642-00457-5_34  0.434
2008 Bagherzandi A, Cheon JH, Jarecki S. Multisignatures secure under the discrete logarithm assumption and a generalized forking lemma Proceedings of the Acm Conference On Computer and Communications Security. 449-458. DOI: 10.1145/1455770.1455827  0.708
2008 Bagherzandi A, Jarecki S. Multisignatures using proofs of secret key possession, as secure as the Diffie-Hellman problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5229: 218-235. DOI: 10.1007/978-3-540-85855-3_15  0.688
2008 Jarecki S, Kim J, Tsudik G. Beyond secret handshakes: Affiliation-hiding authenticated key exchange Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4964: 352-369. DOI: 10.1007/978-3-540-79263-5_23  0.564
2008 Jarecki S, Liu X. Affiliation-hiding envelope and authentication schemes with efficient support for multiple credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5126: 715-726. DOI: 10.1007/978-3-540-70583-3_58  0.525
2007 Jarecki S, Kim J, Tsudik G. Robust group key agreement using short broadcasts Proceedings of the Acm Conference On Computer and Communications Security. 411-420. DOI: 10.1145/1315245.1315296  0.421
2007 Goh EJ, Jarecki S, Katz J, Wang N. Efficient signature schemes with tight reductions to the Diffie-Hellman problems Journal of Cryptology. 20: 493-514. DOI: 10.1007/S00145-007-0549-3  0.627
2007 Gennaro R, Jarecki S, Krawczyk H, Rabin T. Secure distributed key generation for discrete-log based cryptosystems Journal of Cryptology. 20: 51-83. DOI: 10.1007/S00145-006-0347-3  0.628
2007 Jarecki S, Shmatikov V. Efficient two-party secure computation on committed inputs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4515: 97-114.  0.381
2007 Jarecki S, Liu X. Unlinkable secret handshakes and key-private group key management schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4521: 270-287.  0.601
2006 Castelluccia C, Jarecki S, Kim J, Tsudik G. Secure acknowledgment aggregation and multisignatures with limited robustness Computer Networks. 50: 1639-1652. DOI: 10.1016/J.Comnet.2005.09.021  0.639
2006 Jarecki S, Kim J, Tsudik G. Authentication for paranoids: Multi-party secret handshakes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3989: 325-339. DOI: 10.1007/11767480_22  0.559
2005 Jarecki S, Shmatikov V. Probabilistic escrow of financial transactions with cumulative threshold disclosure Lecture Notes in Computer Science. 3570: 172-187.  0.535
2005 Castelluccia C, Jarecki S, Kim J, Tsudik G. A robust multisignature scheme with applications to acknowledgement aggregation Lecture Notes in Computer Science. 3352: 193-207.  0.384
2005 Jarecki S, Saxena N. Further simplifications in proactive RSA signatures Lecture Notes in Computer Science. 3378: 510-528.  0.527
2004 Jarecki S, Saxena N, Yi JH. An attack on the proactive RSA signature scheme in the ursa ad hoc network access control protocol Proceedings of the 2004 Acm Workshop On Security of Ad Hoc and Sensor Networks, Sasn'04. 1-9.  0.529
2004 Jarecki S, Shmatikov V. Handcuffing big brother: An abuse-resilient transaction escrow scheme (extended abstract) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3027: 590-608.  0.51
2004 Dodis Y, Jarecki S, Freedman MJ, Walfish S. Versatile padding schemes for joint signature and encryption Proceedings of the Acm Conference On Computer and Communications Security. 344-353.  0.412
2004 Castelluccia C, Jarecki S, Tsudik G. Secret handshakes from CA-oblivious encryption Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3329: 293-307.  0.483
2003 Gennaro R, Jarecki S, Krawczyk H, Rabin T. Secure applications of Pedersen's distributed key generation protocol Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2612: 373-390.  0.575
2003 Goh EJ, Jarecki S. A signature scheme as secure as the Diffie-Hellman problem Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2656: 401-415.  0.564
2003 Jarecki S, Lincoln P, Shmatikov V. Negotiated privacy (extended abstract) Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2609: 96-111.  0.334
2000 Jarecki S, Lysyanskaya A. Adaptively secure threshold cryptography: Introducing concurrency, removing erasures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 221-242.  0.583
1999 Canetti R, Gennaro R, Jarecki S, Krawczyk H, Rabin T. Adaptive security for threshold cryptosystems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1666: 98-116.  0.515
1996 Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust threshold DSS signatures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1070: 354-371. DOI: 10.1006/Inco.2000.2881  0.581
1996 Gennaro R, Jarecki S, Krawczyk H, Rabin T. Robust and efficient sharing of RSA functions Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1109: 157-172.  0.54
1995 Herzberg A, Jarecki S, Krawczyk H, Yung M. Proactive secret sharing or: How to cope with perpetual leakage Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 963: 339-352. DOI: 10.1007/3-540-44750-4_27  0.432
Show low-probability matches.