Giuseppe Ateniese

Associate Professor
Information Security Institute and
Department of Computer Science
The Johns Hopkins University
3400 N. Charles St.
Baltimore, MD 21218

Office: 410-516-8051
Fax: 410-516-6134

My PGP key


Courses


Research

My research focuses on Applied Cryptography and Network Security.

Recent Papers:

(If) Size Matters: Size-Hiding Private Set Intersection (with E. De Cristofaro and G. Tsudik).
Cryptology ePrint Archive Report 2010/220.

Deniable Cloud Storage: Sharing Files via Public-key Deniability (with Paolo Gasti and Marina Blanton).
Workshop on Privacy in the Electronic Society (WPES ’10), 2010.

Remote Data Checking for Network Coding-based Distributed Storage Systems (with B. Chen, R. Curtmola, and R. Burns).
ACM Cloud Computing Security Workshop (CCSW ’10), 2010.

Proofs of Storage from Homomorphic Identification Protocols (with Seny Kamara and Jonathan Katz).
Advances in Cryptology, (ASIACRYPT 2009)

FastAD: An Authenticated Directory for Billions of Objects (with P. Stanton, R. Burns, and B. McKeown).
Hot Topics in Storage and File Systems (HotStorage’09), 2009.

Key-Private Proxy Re-Encryption (with K. Benson and S. Hohenberger).
RSA Conference 2009, Cryptographers' Track (CT-RSA '09), 2009.
Full version.
Cryptology ePrint Archive Report 2008/463.

Universally Anonymous IBE based on the Quadratic Residuosity Assumption (with P. Gasti).
RSA Conference 2009, Cryptographers' Track (CT-RSA '09), 2009.
This is the extended version of the paper in the proceedings.
Cryptology ePrint Archive Report 2009/280.

Scalable and Efficient Provable Data Possession (with R. Di Pietro, L. V. Mancini, and G. Tsudik).
Security and Privacy in Communication Networks (SecureComm '08), 2008.
Extended version in preparation.

MR. PDP: Multiple-replica provable data possession (with R. Curtmola, O. Khan, and R. Burns).
International Conference on Distributed Computing Systems (ICDCS '08), 2008.

Provable Data Possession at Untrusted Stores (with R. Burns, R. Curtmola, J. Herring, L. Kissner, Z. Peterson, and D. Song).
ACM Conference on Computer and Communications Security (CCS '07), 2007.
Full version.
Cryptology ePrint Archive Report 2007/202.

Identity-Based Proxy Re-encryption (with M. Green).
Applied Cryptography and Network Security (ACNS '07), 2007.
Cryptology ePrint Archive Report 2006/473.

Secret Handshakes with Dynamic and Fuzzy Matching (with M. Blanton and J. Kirsch).
Network annd Distributed System Security Symposium (NDSS '07), 2007.

Design and Implementation of Verifiable Audit Trails for a Versioning File System (with Z. Peterson, R. Burns, and S. Bono).
USENIX Conference on File and Storage Technolgoies (FAST '07), 2007.

Provably-Secure Time-Bound Hierarchical Key Assignment Schemes (with A. De Santis, A. L. Ferrara, and B. Masucci).
ACM Conference on Computer and Communications Security (CCS '06), 2006.
Full version.
Cryptology ePrint Archive Report 2006/225.

Practical Group Signatures without Random Oracles (with J. Camenisch, S. Hohenberger, and B. de Medeiros).
Cryptology ePrint Archive Report 2005/385.

Proxy Re-Signatures: New Definitions, Algorithms, and Applications (with Susan Hohenberger).
ACM Conference on Computer and Communications Security (CCS '05), 2005.
Full version.
Cryptology ePrint Archive Report 2005/433.

Untraceable RFID Tags via Insubvertible Encryption (with J. Camenisch and B. de Medeiros).
ACM Conference on Computer and Communications Security (CCS '05), 2005.

Verifiable Audit Trails for a Versioning File System (with R. Burns, Z. Peterson, and S. Bono).
Short paper in ACM Workshop on Storage Security and Survivability (StorageSS '05), 2005.

Sanitizable Signatures (with D. Chou, B. de Medeiros, and G. Tsudik).
European Symposium on Research in Computer Security (ESORICS '05), 2005.

Survivable Monitoring in Dynamic Networks (with C. Riley and C. Scheideler).
IEEE Transactions on Mobile Computing, 2005.
Conference version in IEEE International Information Assurance Workshop (IWIA '04).

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage (with K. Fu, M. Green, and S. Hohenberger).
ACM Transactions on Information and System Security (TISSEC), 2006.
Conference version in Network and Distributed System Security Symposium (NDSS '05), 2005.
Cryptology ePrint Archive Report 2005/028.

All Papers

Lab Information

SPAR Lab @ JHU Information Security Institute
Lab phone: 410-516-7517

Projects:

Proxy Re-cryptography (NSF, Co-PI, PI: Susan Hohenberger).
Please visit the web page of the JHU-MIT Proxy Re-cryptography Library.

Digital Archiving and Long-Term Preservation (DIGARCH) (NSF, Co-PI, PI: Randal Burns).
Please visit the web page of the Hopkins Storage Systems Lab (HSSL).

Personal

My little princess Sarah




Last Updated: Sep 13, 2009