Łukasz Krzywiecki

Department of Fundamentals of Computer Science, Wrocław University of Science and Technology
Contact Teaching Research Activity
Patents
Shlomi Dolev, Nisha Panwar, Michael Segal, Łukasz Krzywiecki
Certificating vehicle public key with vehicle attributes,
United States Patent: US 9,769,658 Β2. Date of Patent: Sep. 19, 2017.
Papers DBLPORCID iD icon
Papers Thematic bibliography, chronological list and keyword layer
Deniable Authentication, Anonymous Authentication, Identification, AKE
  • Nisha Panwar, Shantanu Sharma, Sharad Mehrotra, Lukasz Krzywiecki, Nalini Venkatasubramanian. Smart Home Survey on Security and Privacy. CoRR 2019. DBLP link
  • Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj. Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. ISPEC 2023: 347‑364. DOI: 10.1007/978-981-99-7032-2_21
  • Lukasz Krzywiecki, Hannes Salin. How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. CANS 2022: 225‑244. DOI: 10.1007/978-3-031-20974-1_11
  • Przemyslaw Blaskiewicz, Bartosz Drzazga, Lukasz Krzywiecki, Damian Stygar, Piotr Syga. RFID Batch Authentication - A Usable Scheme Providing Anonymity. IEEE Access 10 (2022). DOI: 10.1109/ACCESS.2022.3197795
  • Łukasz Krzywiecki, Adam Bobowski, Patryk Kozieł, Marcin Słowik, Marta Słowik. Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret. Computer Networks (2020). Elsevier. DOI: 10.1016/j.comnet.2020.107346
  • Patryk Kozieł, Łukasz Krzywiecki, Damian Stygar. Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. ICETE (2) SECRYPT 2019: 492‑497. DOI: 10.5220/0007954204920497
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik. Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement) . CSCML 2019: 320‑323. DOI: 10.1007/978-3-030-20951-3_27
  • Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen. Rethinking Identification Protocols from the Point of View of the GDPR . CSCML 2019: 296‑315. DOI: 10.1007/978-3-030-20951-3_25
  • Łukasz Krzywiecki, Kamil Kluczniak, Patryk Koziel, Nisha Panwar. Privacy-Oriented Dependency via Deniable SIGMA Protocol . Computers & Security 79 (2018) 53–67. Elsevier. DOI: 10.1016/j.cose.2018.08.002
  • Lukasz Krzywiecki, Tomasz Wlislocki. Deniable Key Establishment Resistance against eKCI Attacks. Secur. Commun. Networks 2017: 7810352:1‑7810352:13. DOI: 10.1155/2017/7810352
  • Łukasz Krzywiecki, Marcin Słowik. Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage . SECITC 2017: 115‑128. DOI: 10.1007/978-3-319-69284-5_9
  • Łukasz Krzywiecki, Marta Wszoła and Mirosław Kutyłowski. Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96‑98. DOI: 10.1007/978-3-319-60080-2_7
  • Lukasz Krzywiecki, Miroslaw Kutylowski. Security of Okamoto Identification Scheme: a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43‑50. DOI: 10.1145/3055259.3055267
  • Przemysław Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga. RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. ISPEC 2016: 209‑223. DOI: 10.1007/978-3-319-49151-6_15
  • Łukasz Krzywiecki. Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. SECITC 2016: 137‑148. DOI: 10.1007/978-3-319-47238-6_10
    Proof-of-Concept Implementation
  • Łukasz Krzywiecki. Anonymous Authentication Scheme Based on PUF. ICISC 2015: 359‑372. DOI: 10.1007/978-3-319-30840-1_23
  • Łukasz Krzywiecki. Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. ProvSec 2014: 334‑341. DOI: 10.1007/978-3-319-12475-9_25
  • Lucjan Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski, Łukasz Krzywiecki. Mutual Restricted Identification. EuroPKI 2013: 119‑133. DOI: 10.1007/978-3-642-53997-8_8
  • Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski. Simplified PACE|AA Protocol. ISPEC 2013: 218‑232. DOI: 10.1007/978-3-642-38033-4_16
  • Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, Mirosław Kutyłowski. Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683‑1689. DOI: 10.1109/TrustCom.2013.209
  • Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza. Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221‑238. DOI: 10.1007/978-3-642-32298-3_15
ML Security-Privacy-Verifiability & Blockchain
  • Krzysztof Talalaj, Lukasz Krzywiecki, Marcin Zawada. Privacy for AI Generated Images: Conditional Generative Adversarial Networks Trained Over Obfuscated Data. TrustCom 2025: 3005‑3010. DOI: 10.1109/Trustcom66490.2025.00357
  • Mikolaj Pietrek, Lukasz Krzywiecki, Karol Niczyj, Witold Karas. Verifiable and Robust Distributed Deep Learning based on Blockchain Infrastructure. TrustCom 2025: 2044‑2049. DOI: 10.1109/Trustcom66490.2025.00237
  • Łukasz Krzywiecki, Gabriel Wechta. Proof of Training: Obtaining Verifiable ML Models by Delegating Training to a Blockchain Network. ICCS 2025: 207‑221. DOI: 10.1007/978-3-031-97629-2_15
  • Bartłomiej Dzikowski, Łukasz Krzywiecki, Ksawery Możdżynski, Karol Niczyj, Hannes Salin. Distributed Data Possession - Blockchain Based Scalability. TrustCom 2024: 2523‑2528. DOI: 10.1109/TrustCom63139.2024.00351
  • Karolina Bąk, Hannes Salin, Karol Niczyj, Łukasz Krzywiecki. Enhancing Tunnel Safety for Dangerous Goods Vehicles through Blockchain-Based Time-Stamping. TrustCom 2023: 1312‑1317 DOI: 10.1109/TrustCom60117.2023.00179
  • Łukasz Krzywiecki, Tadeusz Kulczycki, Christian Emmanuel Nteranya, Andrzej Stos. Detectable Mislabeling - Can Faulty AI Models be Recognized from Incomplete Memory Traces?. TrustCom 2024: 2382‑2387 DOI: 10.1109/TrustCom63139.2024.00329
  • Kewin Ignasiak, Wojciech Kowalczyk, Łukasz Krzywiecki, Mateusz Nasewicz, Hannes Salin, Marcin Zawada. Privacy-Preserving Real-Time Gesture Recognition using Cloud-Trained Neural Networks. TrustCom 2024: 2388‑2393 DOI: 10.1109/TrustCom63139.2024.00330
  • Łukasz Krzywiecki, Krzysztof Szymaniak, Marcin Zawada. Privacy Preservation in Cloud-Based Distributed Learning through Data Encoding and Partitioning. TrustCom 2024: 2424‑2429 DOI: 10.1109/TrustCom63139.2024.00335
  • Łukasz Krzywiecki, Grzegorz Zaborowski, Marcin Zawada. Too Noisy, or Not Too Noisy? A Private Training in Machine Learning. TrustCom 2023: 149‑156 DOI: 10.1109/TrustCom60117.2023.00041
VANET Protocols
  • Hannes Salin, Lukasz Krzywiecki. A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). ISPEC 2023: 365‑379. DOI: 10.1007/978-981-99-7032-2_22
  • Łukasz Krzywiecki, Hannes Salin and Mateusz Jachniak. Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage. NCA 2021: 1‑8. DOI: 10.1109/NCA53618.2021.9685848
  • Lukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov. Proxy Signcryption Scheme for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. NCA 2020: 1‑8. DOI: 10.1109/NCA51143.2020.9306703
  • Łukasz Krzywiecki, Patryk Kozieł, Nisha Panwar. Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks. NCA 2019: 1‑4. DOI: 10.1109/NCA.2019.8935058
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Dynamic Attribute Based Vehicle Authentication. Wireless Networks 23(4): 1045‑1062 (2017). DOI: 10.1007/s11276-016-1203-5
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Optical PUF for Non-Forwardable Vehicle Authentication. Computer Communications 93: 52‑67 (2016). DOI: 10.1016/j.comcom.2016.05.016
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Vehicle Authentication via Monolithically Certified Public Key and Attributes. Wireless Networks 22(3): 879‑896 (2016). DOI: 10.1007/s11276-015-1005-1
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Optical PUF for Non Forwardable Vehicle Authentication. NCA 2015: 204‑207. DOI: 10.1109/NCA.2015.25
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Dynamic Attribute Based Vehicle Authentication. NCA 2014: 1‑8. DOI: 10.1109/NCA.2014.5
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond. ASCoMS@SAFECOMP 2013. DBLP link
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal. Vehicle to Vehicle Authentication. CoRR abs/1508.01324 (2015). DBLP link
Signatures and Signcryptions
  • Łukasz Krzywiecki, Witold Karaś, Adam Niezgoda, Karol Niczyj. Hierarchical Ring Signatures with Hidden Signature Functionality over Blockchain Infrastructure. TrustCom 2025: 2010‑2015. DOI: 10.1109/Trustcom66490.2025.00233
  • Łukasz Krzywiecki, Hannes Salin. Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments. TrustCom 2022: 1528‑1533. DOI: 10.1109/TrustCom56396.2022.00218
  • Lukasz Krzywiecki, Adam Polubek, Hannes Salin. Multi-Signature Scheme Resistant to Randomness Injection Attacks - A Bitcoin Case. NCA 2021: 1‑4. DOI: 10.1109/NCA53618.2021.9685253
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Rafał Rothenberger, Bartosz Drzazga. Hierarchical Ring Signatures Immune to Randomness Injection Attacks. CSCML 2021: 171‑186. DOI: 10.1007/978-3-030-78086-9_13
  • Łukasz Krzywiecki, Marta Słowik, Michał Szala. Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios. ISPEC 2019: 310‑324. DOI: 10.1007/978-3-030-34339-2_17
  • Przemysław Błaśkiewicz, Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, Mirosław Kutyłowski, Marcin Słowik, Marta Wszoła. Pseudonymous Signature Schemes. Advances in Cyber Security: Principles, Techniques, and Applications. Pages 185‑255. Springer 2019. DOI: 10.1007/978-981-13-1483-4_8
    Proof-of-Concept Implementation
  • Łukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski. Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. SPACE 2015: 329‑346. DOI: 10.1007/978-3-319-24126-5_19
  • Marek Klonowski, Łukasz Krzywiecki, Mirosław Kutyłowski, Anna Lauks. Step-out group signatures. Computing 85(1‑2): 137‑151 (2009). DOI: 10.1007/s00607-009-0040-0
  • Marek Klonowski, Łukasz Krzywiecki, Mirosław Kutyłowski, Anna Lauks. Step-Out Ring Signatures. MFCS 2008: 431‑442. DOI: 10.1007/978-3-540-85238-4_35
Post-Quantum Crypto
Anonymous Broadcast Encryption
  • Łukasz Krzywiecki, Mirosław Kutyłowski. Coalition Resistant Anonymous Broadcast Encryption Scheme Based on PUF. TRUST 2011: 48‑62. DOI: 10.1007/978-3-642-21599-5_4
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Maciej Nikodem. General anonymous key broadcasting via Lagrangian interpolation. IET Information Security 2(3): 79‑84 (2008). DOI: 10.1049/iet-ifs:20070122
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski. A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130‑143. DOI: 10.1007/11937807_11
  • Jacek Cichoń, Łukasz Krzywiecki, Mirosław Kutyłowski, Pawel Wlaź. Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96‑109. DOI: 10.1007/11801412_9
Cloud Computing
  • Bartosz Drzazga, Łukasz Krzywiecki, Hannes Salin. Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. TrustCom 2021: 172‑179. DOI: 10.1109/TrustCom53373.2021.00040
  • Łukasz Krzywiecki, Krzysztof Majcher and Wojciech Macyna. Efficient Probabilistic Methods for Proof of Possession in Clouds. DMBD 2016: 364‑372. DOI: 10.1007/978-3-319-40973-3_36
  • Łukasz Krzywiecki, Mirosław Kutyłowski. Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305‑319. DOI: 10.1007/978-3-642-34601-9_23
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Hubert Misztela, Tomasz Strumiński. Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373‑386. DOI: 10.1007/978-3-642-21518-6_26
Other Topics
  • Łukasz Krzywiecki, Mirosław Kutyłowski. Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109‑123. DOI: 10.1007/978-3-642-13869-0_8
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski. Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395‑406. DOI: 10.1007/978-3-319-04298-5_35
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski. Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5‑24. DOI: 10.1007/978-3-642-35371-0_2
  • Jacek Cichon, Marek Klonowski, Lukasz Krzywiecki, Bartlomiej Rózanski, Pawel Zielinski. Random Subsets of the Interval and P2P Protocols. APPROX-RANDOM 2007: 409‑421. DOI: 10.1007/978-3-540-74208-1_30
Security Administrative and Business Model
  • Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Łukasz Krzywiecki. Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42‑59. DOI: 10.1007/978-3-319-06320-1_5
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski, Michał Tabor, Daniel Wachnik. Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296‑307. DOI: 10.1007/978-3-642-30359-3_26
  • Mirosław Kutyłowski, Przemysław Blaskiewicz, Łukasz Krzywiecki, Przemysław Kubiak, Wieslaw Paluszynski, Michal Tabor. Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270‑281. DOI: 10.1007/978-3-642-25370-6_27