Łukasz Krzywiecki
Department of Fundamentals of Computer Science, Wrocław University of Science and Technology
Shlomi Dolev, Nisha Panwar, Michael Segal, Łukasz Krzywiecki
Certificating vehicle public key
with vehicle attributes,
United States Patent: US 9,769,658 Β2. Date of Patent: Sep. 19, 2017.
Deniable Authentication, Anonymous Authentication, Identification, AKE
-
Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj
Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. ISPEC 2023: 347-364. DOI: 10.1007/978-981-99-7032-2_21
-
Lukasz Krzywiecki, Hannes Salin
How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. CANS 2022: 225-244. DOI: 10.1007/978-3-031-20974-1_11
-
Przemyslaw Blaskiewicz, Bartosz Drzazga, Lukasz Krzywiecki, Damian Stygar, Piotr Syga
RFID Batch Authentication - A Usable Scheme Providing Anonymity.
IEEE Access 10 (2022). DOI: 10.1109/ACCESS.2022.3197795
-
Łukasz Krzywiecki, Adam Bobowski, Patryk Kozieł, Marcin Słowik, Marta Słowik
Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret.
Computer Networks (2020). Elsevier. doi.org/10.1016/j.comnet.2020.107346
-
Patryk Kozieł, Łukasz Krzywiecki, Damian Stygar
Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret.
ICETE (2) SECRYPT 2019: 492-497.
doi:10.5220/0007954204920497
-
Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement)
. CSCML 2019: 320-323.
doi:10.1007/978-3-030-20951-3_27
-
Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen
Rethinking Identification Protocols from the Point of View of the GDPR
. CSCML 2019: 296-315.
doi:10.1007/978-3-030-20951-3_25
-
Łukasz Krzywiecki, Kamil Kluczniak, Patryk Koziel, Nisha Panwar
Privacy-Oriented Dependency via Deniable SIGMA Protocol
. Computers & Security 79 (2018) 53–67. Elsevier. doi:10.1016/j.cose.2018.08.002
-
Łukasz Krzywiecki, Tomasz Wlisłocki
Deniable key establishment resistant against eKCI attacks
. Security and Communication Networks, vol. 2017, Article ID 7810352, 13 pages, 2017. Wiley|Hindawi. doi:10.1155/2017/7810352
-
Łukasz Krzywiecki, Marcin Słowik
Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage
. SECITC 2017: 115-128. doi:10.1007/978-3-319-69284-5_9
-
Łukasz Krzywiecki, Marta Wszoła and Mirosław Kutyłowski
Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96-98.
doi:10.1007/978-3-319-60080-2_7
-
Łukasz Krzywiecki, Mirosław Kutyłowski
Security of Okamoto Identification Scheme in Practice - a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43-50.
doi:10.1145/3055259.3055267
Proof-of-Concept Implementation
-
Przemysław Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga
RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. ISPEC 2016: 209-223.
doi:10.1007/978-3-319-49151-6_15
-
Łukasz Krzywiecki
Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. SECITC 2016: 137-148.
doi:10.1007/978-3-319-47238-6_10.
Proof-of-Concept Implementation
-
Łukasz Krzywiecki
Anonymous Authentication Scheme Based on PUF. ICISC 2015: 359-372.
doi:10.1007/978-3-319-30840-1_23
-
Łukasz Krzywiecki
Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. ProvSec 2014: 334-341.
doi:10.1007/978-3-319-12475-9_25
-
Lucjan Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski, Łukasz Krzywiecki
Mutual Restricted Identification. EuroPKI 2013: 119-133.
doi:10.1007/978-3-642-53997-8_8
-
Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski
Simplified PACE|AA Protocol. ISPEC 2013: 218-232.
doi:10.1007/978-3-642-38033-4_16
-
Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, Mirosław Kutyłowski
Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683-1689.
doi:10.1109/TrustCom.2013.209
-
Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza
Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238.
doi:10.1007/978-3-642-32298-3_15
VANET Protocols
-
Hannes Salin, Lukasz Krzywiecki.
A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS).
ISPEC 2023: 365-379.
DOI: 10.1007/978-981-99-7032-2_22
-
Łukasz Krzywiecki, Hannes Salin and Mateusz Jachniak.
Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage.
NCA 2021: 1-8.
DOI: 10.1109/NCA53618.2021.9685848
-
Łukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov
Proxy Signcryption for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks.
NCA 2020: 1-8.
doi.org/10.1109/NCA51143.2020.9306703
-
Łukasz Krzywiecki, Patryk Kozieł, Nisha Panwar
Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks.
NCA 2019: 1-4.
doi:10.1109/NCA.2019.8935058
-
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
Dynamic Attribute Based Vehicle Authentication. Wireless Networks 23(4): 1045-1062 (2017).
doi:10.1007/s11276-016-1203-5
-
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
Optical PUF for Non-Forwardable Vehicle Authentication. Computer Communications 93: 52-67 (2016).
doi:10.1016/j.comcom.2016.05.016
-
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
Vehicle Authentication via Monolithically Certified Public Key and Attributes. Wireless Networks 22(3): 879-896 (2016).
doi:10.1007/s11276-015-1005-1
-
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
Optical PUF for Non Forwardable Vehicle Authentication. NCA 2015: 204-207.
doi:10.1109/NCA.2015.25
-
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
Dynamic Attribute Based Vehicle Authentication. NCA 2014: 1-8.
doi: 10.1109/NCA.2014.5
-
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond. ASCoMS@SAFECOMP 2013.
-
Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
Vehicle to Vehicle Authentication. CoRR abs/1508.01324 (2015).
Signatures and Signcryptions
-
Łukasz Krzywiecki, Hannes Salin.
Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments.
TrustCom 2022: 1528-1533.
DOI: 10.1109/TrustCom56396.2022.00218
-
Łukasz Krzywiecki, Adam Połubek, Hannes Salin.
Multi-Signature Scheme Resistant to Randomness Injection Attacks - Bitcoin Case.
NCA 2021: 1-4.
DOI: 10.1109/NCA53618.2021.9685253
-
Łukasz Krzywiecki, Mirosław Kutyłowski, Rafał Rothenberger, Bartosz Drzazga
Hierarchical Ring Signatures Immune to Randomness Injection Attacks.
CSCML 2021: 171-186.
DOI: 10.1007/978-3-030-78086-9_13
-
Łukasz Krzywiecki, Marta Słowik, Michał Szala
Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios.
ISPEC 2019: 310-324.
doi:10.1007/978-3-030-34339-2_17
-
Przemysław Błaśkiewicz, Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, Mirosław Kutyłowski, Marcin Słowik, Marta Wszoła
Pseudonymous Signature Schemes.
Advances in Cyber Security: Principles, Techniques, and Applications. Pages 185-255. Springer 2019.
doi:10.1007/978-981-13-1483-4_8
Proof-of-Concept Implementation
-
Łukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski
Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. SPACE 2015: 329-346.
doi:10.1007/978-3-319-24126-5_19
-
Marek Klonowski, Łukasz Krzywiecki, Mirosław Kutyłowski, Anna Lauks
Step-out group signatures. Computing 85(1-2): 137-151 (2009).
-
Marek Klonowski, Łukasz Krzywiecki, Mirosław Kutyłowski, Anna Lauks
Step-Out Ring Signatures. MFCS 2008: 431-442.
Anonymous Broadcast Encryption
-
Łukasz Krzywiecki, Mirosław Kutyłowski, Maciej Nikodem
General anonymous key broadcasting via Lagrangian interpolation. IET Information Security 2(3): 79-84 (2008).
-
Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143.
-
Jacek Cichoń, Łukasz Krzywiecki, Mirosław Kutyłowski, Pawel Wlaź
Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96-109.
Cloud Computing
-
Bartosz Drzazga, Łukasz Krzywiecki, Hannes Salin
Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. TrustCom 2021: 172-179. DOI: 10.1109/TrustCom53373.2021.00040
-
Łukasz Krzywiecki, Krzysztof Majcher and Wojciech Macyna
Efficient Probabilistic Methods for Proof of Possession in Clouds. DMBD 2016: 364-372.
doi:10.1007/978-3-319-40973-3_36
-
Łukasz Krzywiecki, Mirosław Kutyłowski
Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305-319.
-
Łukasz Krzywiecki, Mirosław Kutyłowski, Hubert Misztela, Tomasz Strumiński
Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373-386.
Other Topics
-
Łukasz Krzywiecki, Mirosław Kutyłowski
Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109-123.
-
Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406.
-
Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24.
-
Jacek Cichoń, Marek Klonowski, Łukasz Krzywiecki, Bartlomiej Różański, Paweł Zieliński
Random Subsets of the Interval and P2P Protocols. APPROX-RANDOM 2007: 409-421.
Security Administrative and Business Model
-
Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Łukasz Krzywiecki
Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59.
-
Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski, Michał Tabor, Daniel Wachnik
Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307.
-
Mirosław Kutyłowski, Przemysław Blaskiewicz, Łukasz Krzywiecki, Przemysław Kubiak, Wieslaw Paluszynski, Michal Tabor
Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281.