If you experience any problems, please feel free to email me at "susan@cs" followed by ".jhu.edu".
Copyright belongs to the respective holders.
Journal Articles
Batch Verification of Short Signatures
Jan Camenisch, Susan Hohenberger and Michael Østergaard Pedersen
Journal of Cryptology, 25(4): 723-747, 2012.
Securely Obfuscating Re-Encryption
Susan Hohenberger, Guy Rothblum, Abhi Shelat, and Vinod Vaikuntanathan
Journal of Cryptology, 24(4): 694-719, 2011.
Access Controls for Oblivious and Anonymous Systems
Scott Coull, Matthew Green and Susan Hohenberger
ACM Transactions on Information and System Security (TISSEC), 14(1): 10, 2011.
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage (eprint)
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger
ACM Transactions on Information and System Security (TISSEC), 9(1): 1-30, 2006.
Tetris is Hard, Even to Approximate
Ron Breukelaar, Erik D. Demaine, Susan Hohenberger, Hendrik Jan Hoogeboom, Walter A. Kosters, and David Liben-Nowell
International Journal of Computational Geometry and Applications (IJCGA), 14(1-2): 41-68, 2004.
Conference and Workshop Proceedings
Attribute-Based Encryption with Fast Decryption
Susan Hohenberger and Brent Waters
Public Key Cryptography, 2013
Machine-Generated Algorithms, Proofs and Software for the Batch
Verification of Digital Signature Schemes
Joseph A. Akinyele, Matthew Green, Susan Hohenberger and Matthew W. Pagano
ACM Computer and Communications Security (CCS), 2012
New Definitions and Separations for Circular Security (eprint)
David Cash, Matthew Green and Susan Hohenberger
Public Key Cryptography, 2012
Detecting Dangerous Queries: A New Approach to Chosen Ciphertext Security
(eprint)
Susan Hohenberger, Allison Lewko and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2012
Computing on Authenticated Data (eprint)
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, and Brent Waters
Theory of Cryptography Conference (TCC), 2012
Outsourcing the Decryption of ABE Ciphertexts
Matthew Green, Susan Hohenberger and Brent Waters
USENIX Security, 2011
Practical Adaptive Oblivious Transfer from Simple Assumptions (eprint)
Matthew Green and Susan Hohenberger
Theory of Cryptography Conference (TCC), 2011
Synchronized Aggregate Signatures: New Definitions, Constructions and Applications (eprint)
Jae Hyun Ahn, Matthew Green and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2010
Constructing Verifiable Random Functions with Large Input Spaces (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2010
Short and Stateless Signatures from the RSA Assumption (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- CRYPTO, 2009
Controlling Access to an Oblivious Database using Stateful Anonymous
Credentials (eprint)
Scott Coull, Matthew Green, and Susan Hohenberger
Public Key Cryptography, 2009
Realizing Hash-and-Sign Signatures under Standard Assumptions (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2009
Practical Short Signature Batch Verification (eprint)
Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, and Michael Østergaard Pedersen
Topics in Cryptology -- CT-RSA, 2009
Key-Private Proxy Re-Encryption (eprint)
Giuseppe Ateniese, Karyn Benson, and Susan Hohenberger
Topics in Cryptology -- CT-RSA, 2009
Universally Composable Adaptive Oblivious Transfer (eprint)
Matthew Green and Susan Hohenberger
Advances in Cryptology -- ASIACRYPT, 2008
Blind Identity-Based Encryption and Simulatable Oblivious Transfer (eprint)
Matthew Green and Susan Hohenberger
Advances in Cryptology -- ASIACRYPT, 2007
On Tweaking Luby-Rackoff Blockciphers (eprint)
David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, and Hakan Seyalioglu
Advances in Cryptology -- ASIACRYPT, 2007
Chosen-Ciphertext Secure Proxy Re-Encryption
(eprint)
Ran Canetti and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2007
Batch Verification of Short Signatures (eprint)
Jan Camenisch, Susan Hohenberger, and Michael Østergaard Pedersen
Advances in Cryptology -- EUROCRYPT, 2007
Securely Obfuscating Re-Encryption (pdf)
Susan Hohenberger, Guy Rothblum, Abhi Shelat, and Vinod Vaikuntanathan
Theory of Cryptography Conference (TCC), 2007
How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication (eprint)
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
ACM Computer and Communications Security (CCS), 2006
Periodische n-Fach Anonyme Authentifizierung für Sensoren (in German)
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
DACH Mobility, 2006
Balancing Accountability and Privacy Using E-Cash (pdf)
Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya
Security and Cryptography for Networks (SCN), 2006
Lightweight Email Signatures (pdf)
Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest
Security and Cryptography for Networks (SCN), 2006
Honest-Verifier Private Disjointness Testing (without Random Oracles) (pdf)
Susan Hohenberger and Stephen A. Weis
Workshop on Privacy Enhancing Technologies (PET), 2006
Proxy Re-Signatures: New Definitions, Algorithms, and Applications (eprint)
Giuseppe Ateniese and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2005
Lightweight Encryption for Email (pdf)
Ben Adida, Susan Hohenberger, and Ronald L. Rivest
USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2005
Compact E-Cash (eprint)
Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya
Advances in Cryptology -- EUROCRYPT, 2005
How To Securely Outsource Cryptographic Computations (ps, pdf)
Susan Hohenberger and Anna Lysyanskaya
Theory of Cryptography Conference (TCC), 2005
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage (eprint)
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger
Network and Distributed System Security Symposium (NDSS), 2005
Tetris is Hard, Even to Approximate (ps, pdf)
Erik D. Demaine, Susan Hohenberger, and David Liben-Nowell
Computing and Combinatorics Conference (COCOON), 2003
[slides from Ohio State talk (ps)]
Theses
Advances in Signatures, Encryption, and E-Cash from Bilinear Groups (pdf)
Ph.D. Thesis, MIT, May 2006. Committee: Ran Canetti, Silvio Micali, and Ronald L. Rivest (advisor).
The Cryptographic Impact of Groups with Infeasible Inversion (pdf)
S.M. Thesis, MIT, May 2003. Advisor: Ronald L. Rivest.
Warning: this contains some known bugs. Feel free to email me with questions.
The Effectiveness of Genetic Algorithms on Production Flow Analysis
Honors Thesis, The Ohio State University, August 2000. Advisor: Bruce Weide.
Book Chapters
Lightweight Email Signatures
Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest
Phishing and Countermeasures (Eds. Jakobsson and Myers, Wiley), October 2006