Łukasz Krzywiecki

Department of Fundamentals of Computer Science, Wrocław University of Science and Technology
Contact Teaching Research Activity
Patents
Shlomi Dolev, Nisha Panwar, Michael Segal, Łukasz Krzywiecki
Certificating vehicle public key with vehicle attributes,
United States Patent: US 9,769,658 Β2. Date of Patent: Sep. 19, 2017.
Papers DBLP ORCID iD icon
Deniable Authentication, Anonymous Authentication, Identification, AKE
  • Maciej Grzeskowiak, Lukasz Krzywiecki, Karol Niczyj
    Cryptanalysis of Human Identification Protocol with Human-Computable Passwords. ISPEC 2023: 347-364. DOI: 10.1007/978-981-99-7032-2_21
  • Lukasz Krzywiecki, Hannes Salin
    How to Design Authenticated Key Exchange for Wearable Devices: Cryptanalysis of AKE for Health Monitoring and Countermeasures via Distinct SMs with Key Split and Refresh. CANS 2022: 225-244. DOI: 10.1007/978-3-031-20974-1_11
  • Przemyslaw Blaskiewicz, Bartosz Drzazga, Lukasz Krzywiecki, Damian Stygar, Piotr Syga
    RFID Batch Authentication - A Usable Scheme Providing Anonymity. IEEE Access 10 (2022). DOI: 10.1109/ACCESS.2022.3197795
  • Łukasz Krzywiecki, Adam Bobowski, Patryk Kozieł, Marcin Słowik, Marta Słowik
    Schnorr-like identification scheme resistant to malicious subliminal setting of ephemeral secret. Computer Networks (2020). Elsevier. doi.org/10.1016/j.comnet.2020.107346
  • Patryk Kozieł, Łukasz Krzywiecki, Damian Stygar
    Identity-based Conditional Privacy-Preserving Authentication Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. ICETE (2) SECRYPT 2019: 492-497. doi:10.5220/0007954204920497
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Jakub Pezda, Marcin Słowik
    Anonymous Deniable Identification in Ephemeral Setup and Leakage Scenarios (Brief Announcement) . CSCML 2019: 320-323. doi:10.1007/978-3-030-20951-3_27
  • Mirosław Kutyłowski, Łukasz Krzywiecki, Xiaofeng Chen
    Rethinking Identification Protocols from the Point of View of the GDPR . CSCML 2019: 296-315. doi:10.1007/978-3-030-20951-3_25
  • Łukasz Krzywiecki, Kamil Kluczniak, Patryk Koziel, Nisha Panwar
    Privacy-Oriented Dependency via Deniable SIGMA Protocol . Computers & Security 79 (2018) 53–67. Elsevier. doi:10.1016/j.cose.2018.08.002
  • Łukasz Krzywiecki, Tomasz Wlisłocki
    Deniable key establishment resistant against eKCI attacks . Security and Communication Networks, vol. 2017, Article ID 7810352, 13 pages, 2017. Wiley|Hindawi. doi:10.1155/2017/7810352
  • Łukasz Krzywiecki, Marcin Słowik
    Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage . SECITC 2017: 115-128. doi:10.1007/978-3-319-69284-5_9
  • Łukasz Krzywiecki, Marta Wszoła and Mirosław Kutyłowski
    Brief Announcement: Anonymous Credentials Secure to Ephemeral Leakage. CSCML 2017: 96-98. doi:10.1007/978-3-319-60080-2_7
  • Łukasz Krzywiecki, Mirosław Kutyłowski
    Security of Okamoto Identification Scheme in Practice - a Defense against Ephemeral Key Leakage and Setup. SCC@AsiaCCS 2017: 43-50. doi:10.1145/3055259.3055267
    Proof-of-Concept Implementation
  • Przemysław Błaśkiewicz, Łukasz Krzywiecki, Piotr Syga
    RFID Tags Batch Authentication Revisited - Communication Overhead and Server Computational Complexity Limits. ISPEC 2016: 209-223. doi:10.1007/978-3-319-49151-6_15
  • Łukasz Krzywiecki
    Schnorr-like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret. SECITC 2016: 137-148. doi:10.1007/978-3-319-47238-6_10.
    Proof-of-Concept Implementation
  • Łukasz Krzywiecki
    Anonymous Authentication Scheme Based on PUF. ICISC 2015: 359-372. doi:10.1007/978-3-319-30840-1_23
  • Łukasz Krzywiecki
    Deniable Version of SIGMA Key Exchange Protocol Resilient to Ephemeral Key Leakage. ProvSec 2014: 334-341. doi:10.1007/978-3-319-12475-9_25
  • Lucjan Hanzlik, Kamil Kluczniak, Mirosław Kutyłowski, Łukasz Krzywiecki
    Mutual Restricted Identification. EuroPKI 2013: 119-133. doi:10.1007/978-3-642-53997-8_8
  • Lucjan Hanzlik, Łukasz Krzywiecki, Mirosław Kutyłowski
    Simplified PACE|AA Protocol. ISPEC 2013: 218-232. doi:10.1007/978-3-642-38033-4_16
  • Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, Mirosław Kutyłowski
    Mutual Chip Authentication. TrustCom/ISPA/IUCC 2013: 1683-1689. doi:10.1109/TrustCom.2013.209
  • Mirosław Kutyłowski, Łukasz Krzywiecki, Przemysław Kubiak, Michał Koza
    Restricted Identification Scheme and Diffie-Hellman Linking Problem. INTRUST 2011: 221-238. doi:10.1007/978-3-642-32298-3_15
VANET Protocols
  • Hannes Salin, Lukasz Krzywiecki.
    A Source Hiding Protocol for Cooperative Intelligent Transportation Systems (C-ITS). ISPEC 2023: 365-379. DOI: 10.1007/978-981-99-7032-2_22
  • Łukasz Krzywiecki, Hannes Salin and Mateusz Jachniak.
    Certificateless Multi-Party Authenticated Encryption Mitigating Ephemeral Key Leakage. NCA 2021: 1-8. DOI: 10.1109/NCA53618.2021.9685848
  • Łukasz Krzywiecki, Hannes Salin, Nisha Panwar, Mykola Pavlov
    Proxy Signcryption for Vehicle Infrastructure Immune to Randomness Leakage and Setup Attacks. NCA 2020: 1-8. doi.org/10.1109/NCA51143.2020.9306703
  • Łukasz Krzywiecki, Patryk Kozieł, Nisha Panwar
    Signature Based Authentication for Ephemeral Setup Attacks in Vehicular Sensor Networks. NCA 2019: 1-4. doi:10.1109/NCA.2019.8935058
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Dynamic Attribute Based Vehicle Authentication. Wireless Networks 23(4): 1045-1062 (2017). doi:10.1007/s11276-016-1203-5
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Optical PUF for Non-Forwardable Vehicle Authentication. Computer Communications 93: 52-67 (2016). doi:10.1016/j.comcom.2016.05.016
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Vehicle Authentication via Monolithically Certified Public Key and Attributes. Wireless Networks 22(3): 879-896 (2016). doi:10.1007/s11276-015-1005-1
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Optical PUF for Non Forwardable Vehicle Authentication. NCA 2015: 204-207. doi:10.1109/NCA.2015.25
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Dynamic Attribute Based Vehicle Authentication. NCA 2014: 1-8. doi: 10.1109/NCA.2014.5
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Certificating Vehicle Public Key with Vehicle Attributes A (periodical) Licensing Routine, Against Man-in-the-Middle Attacks and Beyond. ASCoMS@SAFECOMP 2013.
  • Shlomi Dolev, Łukasz Krzywiecki, Nisha Panwar, Michael Segal
    Vehicle to Vehicle Authentication. CoRR abs/1508.01324 (2015).
Signatures and Signcryptions
  • Łukasz Krzywiecki, Hannes Salin.
    Short Signatures via Multiple Hardware Security Modules with Key Splitting in Circuit Breaking Environments. TrustCom 2022: 1528-1533. DOI: 10.1109/TrustCom56396.2022.00218
  • Łukasz Krzywiecki, Adam Połubek, Hannes Salin.
    Multi-Signature Scheme Resistant to Randomness Injection Attacks - Bitcoin Case. NCA 2021: 1-4. DOI: 10.1109/NCA53618.2021.9685253
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Rafał Rothenberger, Bartosz Drzazga
    Hierarchical Ring Signatures Immune to Randomness Injection Attacks. CSCML 2021: 171-186. DOI: 10.1007/978-3-030-78086-9_13
  • Łukasz Krzywiecki, Marta Słowik, Michał Szala
    Identity-Based Signature Scheme Secure in Ephemeral Setup and Leakage Scenarios. ISPEC 2019: 310-324. doi:10.1007/978-3-030-34339-2_17
  • Przemysław Błaśkiewicz, Lucjan Hanzlik, Kamil Kluczniak, Łukasz Krzywiecki, Mirosław Kutyłowski, Marcin Słowik, Marta Wszoła
    Pseudonymous Signature Schemes. Advances in Cyber Security: Principles, Techniques, and Applications. Pages 185-255. Springer 2019. doi:10.1007/978-981-13-1483-4_8
    Proof-of-Concept Implementation
  • Łukasz Krzywiecki, Malgorzata Sulkowska, Filip Zagórski
    Hierarchical Ring Signatures Revisited - Unconditionally and Perfectly Anonymous Schnorr Version. SPACE 2015: 329-346. doi:10.1007/978-3-319-24126-5_19
  • Marek Klonowski, Łukasz Krzywiecki, Mirosław Kutyłowski, Anna Lauks
    Step-out group signatures. Computing 85(1-2): 137-151 (2009).
  • Marek Klonowski, Łukasz Krzywiecki, Mirosław Kutyłowski, Anna Lauks
    Step-Out Ring Signatures. MFCS 2008: 431-442.
Post-Quantum Crypto
Anonymous Broadcast Encryption
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Maciej Nikodem
    General anonymous key broadcasting via Lagrangian interpolation. IET Information Security 2(3): 79-84 (2008).
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
    A Revocation Scheme Preserving Privacy. Inscrypt 2006: 130-143.
  • Jacek Cichoń, Łukasz Krzywiecki, Mirosław Kutyłowski, Pawel Wlaź
    Anonymous Distribution of Encryption Keys in Cellular Broadcast Systems. MADNES 2005: 96-109.
Cloud Computing
  • Bartosz Drzazga, Łukasz Krzywiecki, Hannes Salin
    Cryptanalysis of Deterministic and Probabilistic Multi-Copy PDP Schemes For Cloud Storage - Attacks and Countermeasures. TrustCom 2021: 172-179. DOI: 10.1109/TrustCom53373.2021.00040
  • Łukasz Krzywiecki, Krzysztof Majcher and Wojciech Macyna
    Efficient Probabilistic Methods for Proof of Possession in Clouds. DMBD 2016: 364-372. doi:10.1007/978-3-319-40973-3_36
  • Łukasz Krzywiecki, Mirosław Kutyłowski
    Proof of Possession for Cloud Storage via Lagrangian Interpolation Techniques. NSS 2012: 305-319.
  • Łukasz Krzywiecki, Mirosław Kutyłowski, Hubert Misztela, Tomasz Strumiński
    Private Information Retrieval with a Trusted Hardware Unit - Revisited. Inscrypt 2010: 373-386.
Other Topics
  • Łukasz Krzywiecki, Mirosław Kutyłowski
    Lagrangian E-Voting: Verifiability on Demand and Strong Privacy. TRUST 2010: 109-123.
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
    Probabilistic Admissible Encoding on Elliptic Curves - Towards PACE with Generalized Integrated Mapping. SOFSEM 2014: 395-406.
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski
    Stamp and Extend - Instant But Undeniable Timestamping Based on Lazy Trees. INTRUST 2012: 5-24.
  • Jacek Cichoń, Marek Klonowski, Łukasz Krzywiecki, Bartlomiej Różański, Paweł Zieliński
    Random Subsets of the Interval and P2P Protocols. APPROX-RANDOM 2007: 409-421.
Security Administrative and Business Model
  • Mirosław Kutyłowski, Lucjan Hanzlik, Kamil Kluczniak, Przemysław Kubiak, Łukasz Krzywiecki
    Forbidden City Model - Towards a Practice Relevant Framework for Designing Cryptographic Protocols. ISPEC 2014: 42-59.
  • Łukasz Krzywiecki, Przemysław Kubiak, Mirosław Kutyłowski, Michał Tabor, Daniel Wachnik
    Lightweight Certificates - Towards a Practical Model for PKI. BIS 2012: 296-307.
  • Mirosław Kutyłowski, Przemysław Blaskiewicz, Łukasz Krzywiecki, Przemysław Kubiak, Wieslaw Paluszynski, Michal Tabor
    Technical and Legal Meaning of "Sole Control" - Towards Verifiability in Signing Systems. BIS (Workshops) 2011: 270-281.