Copyright belongs to the respective holders.

Peer-Reviewed Conference and Workshop Proceedings

Registered Attribute-Based Encryption (eprint)
Susan Hohenberger, George Lu, Brent Waters, David J. Wu
Advances in Cryptology -- EUROCRYPT, 2023

A Performance Evaluation of Pairing-Based Broadcast Encryption Systems (eprint)
Arush Chhatrapati, Susan Hohenberger, James Trombo, and Satyanarayana Vusirikala
Applied Cryptography and Network Security, 2022

PPE Circuits for Rational Polynomials (ACM DL)
Susan Hohenberger, Satyanarayana Vusirikala
ACM Computer and Communications Security (CCS), 2021

Chosen Ciphertext Security from Injective Trapdoor Functions (eprint)
Susan Hohenberger, Venkata Koppula, Brent Waters
Advances in Cryptology -- CRYPTO, 2020
Best Paper Award

PPE Circuits: Formal Definition to Software Automation (ACM DL)
Susan Hohenberger, Satyanarayana Vusirikala, Brent Waters
ACM Computer and Communications Security (CCS), 2020

New Methods and Abstractions for RSA-Based Forward Secure Signatures (eprint)
Susan Hohenberger, Brent Waters
Applied Cryptography and Network Security, 2020

Are These Pairing Elements Correct? Automated Verification and Applications (eprint)
Susan Hohenberger, Satyanarayana Vusirikala
ACM Computer and Communications Security (CCS), 2019

Synchronized Aggregate Signatures from the RSA Assumption (eprint)
Susan Hohenberger, Brent Waters
Advances in Cryptology -- EUROCRYPT, 2018

Signature Schemes with Randomized Verification
Cody Freitag, Rishab Goyal, Susan Hohenberger, Venkata Koppula, Eysa Lee, Tatsuaki Okamoto, Jordan Tran, Brent Waters
Applied Cryptography and Network Security, 2017

A Generic Approach to Constructing and Proving Verifiable Random Functions (eprint)
Rishab Goyal, Susan Hohenberger, Venkata Koppula, Brent Waters
Theory of Cryptography Conference (TCC), 2017

New Circular Security Counterexamples from Decision Linear and Learning with Errors (eprint)
Allison Bishop, Susan Hohenberger, Brent Waters
Advances in Cryptology -- ASIACRYPT, 2015

Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model (eprint)
Susan Hohenberger, Venkata Koppula, Brent Waters
Advances in Cryptology -- ASIACRYPT, 2015

Automating Fast and Secure Translations from Type-I to Type-III Pairing Schemes (eprint)
Joseph A. Akinyele, Christina Garman, Susan Hohenberger
ACM Computer and Communications Security (CCS), 2015

Universal Signature Aggregators (eprint)
Susan Hohenberger, Venkata Koppula, Brent Waters
Advances in Cryptology -- EUROCRYPT, 2015

Anonize: A Large-Scale Anonymous Survey System (PDF)
Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat
IEEE Security and Privacy (Oakland), 2014

Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation (eprint)
Susan Hohenberger, Amit Sahai and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2014

Online/Offline Attribute-Based Encryption (eprint)
Susan Hohenberger and Brent Waters
Public Key Cryptography, 2014

Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes
Joseph A. Akinyele, Matthew Green and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2013

Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures (eprint)
Susan Hohenberger, Amit Sahai and Brent Waters
Advances in Cryptology -- CRYPTO, 2013

Attribute-Based Encryption with Fast Decryption (eprint)
Susan Hohenberger and Brent Waters
Public Key Cryptography, 2013

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele, Matthew Green, Susan Hohenberger and Matthew W. Pagano
ACM Computer and Communications Security (CCS), 2012

New Definitions and Separations for Circular Security (eprint)
David Cash, Matthew Green and Susan Hohenberger
Public Key Cryptography, 2012

Detecting Dangerous Queries: A New Approach to Chosen Ciphertext Security (eprint)
Susan Hohenberger, Allison Lewko and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2012

Computing on Authenticated Data (eprint)
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, and Brent Waters
Theory of Cryptography Conference (TCC), 2012

Outsourcing the Decryption of ABE Ciphertexts
Matthew Green, Susan Hohenberger and Brent Waters
USENIX Security, 2011

Practical Adaptive Oblivious Transfer from Simple Assumptions (eprint)
Matthew Green and Susan Hohenberger
Theory of Cryptography Conference (TCC), 2011

Synchronized Aggregate Signatures: New Definitions, Constructions and Applications (eprint)
Jae Hyun Ahn, Matthew Green and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2010

Constructing Verifiable Random Functions with Large Input Spaces (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2010

Short and Stateless Signatures from the RSA Assumption (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- CRYPTO, 2009

Controlling Access to an Oblivious Database using Stateful Anonymous Credentials (eprint)
Scott Coull, Matthew Green, and Susan Hohenberger
Public Key Cryptography, 2009

Realizing Hash-and-Sign Signatures under Standard Assumptions (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2009

Practical Short Signature Batch Verification (eprint)
Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, and Michael Østergaard Pedersen
Topics in Cryptology -- CT-RSA, 2009

Key-Private Proxy Re-Encryption (eprint)
Giuseppe Ateniese, Karyn Benson, and Susan Hohenberger
Topics in Cryptology -- CT-RSA, 2009

Universally Composable Adaptive Oblivious Transfer (eprint)
Matthew Green and Susan Hohenberger
Advances in Cryptology -- ASIACRYPT, 2008

Blind Identity-Based Encryption and Simulatable Oblivious Transfer (eprint)
Matthew Green and Susan Hohenberger
Advances in Cryptology -- ASIACRYPT, 2007

On Tweaking Luby-Rackoff Blockciphers (eprint)
David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, and Hakan Seyalioglu
Advances in Cryptology -- ASIACRYPT, 2007

Chosen-Ciphertext Secure Proxy Re-Encryption (eprint)
Ran Canetti and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2007

Batch Verification of Short Signatures (eprint)
Jan Camenisch, Susan Hohenberger, and Michael Østergaard Pedersen
Advances in Cryptology -- EUROCRYPT, 2007

Securely Obfuscating Re-Encryption (pdf)
Susan Hohenberger, Guy Rothblum, Abhi Shelat, and Vinod Vaikuntanathan
Theory of Cryptography Conference (TCC), 2007

How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication (eprint)
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
ACM Computer and Communications Security (CCS), 2006

Periodische n-Fach Anonyme Authentifizierung für Sensoren (in German)
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
DACH Mobility, 2006

Balancing Accountability and Privacy Using E-Cash (pdf)
Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya
Security and Cryptography for Networks (SCN), 2006

Lightweight Email Signatures (pdf)
Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest
Security and Cryptography for Networks (SCN), 2006

Honest-Verifier Private Disjointness Testing (without Random Oracles) (pdf)
Susan Hohenberger and Stephen A. Weis
Workshop on Privacy Enhancing Technologies (PET), 2006

Proxy Re-Signatures: New Definitions, Algorithms, and Applications (eprint)
Giuseppe Ateniese and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2005

Lightweight Encryption for Email (pdf)
Ben Adida, Susan Hohenberger, and Ronald L. Rivest
USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2005

Compact E-Cash (eprint)
Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya
Advances in Cryptology -- EUROCRYPT, 2005

How To Securely Outsource Cryptographic Computations (ps, pdf)
Susan Hohenberger and Anna Lysyanskaya
Theory of Cryptography Conference (TCC), 2005

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage (eprint)
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger
Network and Distributed System Security Symposium (NDSS), 2005

Tetris is Hard, Even to Approximate (ps, pdf)
Erik D. Demaine, Susan Hohenberger, and David Liben-Nowell
Computing and Combinatorics Conference (COCOON), 2003
[slides from Ohio State talk (ps)]

Journal Articles

An Overview of Anonize: A Large-Scale Anonymous Survey System
Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat
IEEE Security and Privacy Magazine, 13(2): 22-29, 2015.

Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters
Journal of Cryptology, 28(2): 351-395, 2015.

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele, Matthew Green, Susan Hohenberger, Matthew W. Pagano
Journal of Computer Security, 22(6): 867-912, 2014.

Batch Verification of Short Signatures
Jan Camenisch, Susan Hohenberger and Michael Østergaard Pedersen
Journal of Cryptology, 25(4): 723-747, 2012.

Securely Obfuscating Re-Encryption
Susan Hohenberger, Guy Rothblum, Abhi Shelat, and Vinod Vaikuntanathan
Journal of Cryptology, 24(4): 694-719, 2011.

Access Controls for Oblivious and Anonymous Systems
Scott Coull, Matthew Green and Susan Hohenberger
ACM Transactions on Information and System Security (TISSEC), 14(1): 10, 2011.

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage (eprint)
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger
ACM Transactions on Information and System Security (TISSEC), 9(1): 1-30, 2006.

Tetris is Hard, Even to Approximate
Ron Breukelaar, Erik D. Demaine, Susan Hohenberger, Hendrik Jan Hoogeboom, Walter A. Kosters, and David Liben-Nowell
International Journal of Computational Geometry and Applications (IJCGA), 14(1-2): 41-68, 2004.

Theses

Advances in Signatures, Encryption, and E-Cash from Bilinear Groups (pdf)
Ph.D. Thesis, MIT, May 2006. Committee: Ran Canetti, Silvio Micali, and Ronald L. Rivest (advisor).

The Cryptographic Impact of Groups with Infeasible Inversion (pdf)
S.M. Thesis, MIT, May 2003. Advisor: Ronald L. Rivest.
Warning: this contains some known bugs. Feel free to email me with questions.

The Effectiveness of Genetic Algorithms on Production Flow Analysis
Honors Thesis, The Ohio State University, August 2000. Advisor: Bruce Weide.

Book Chapters

Lightweight Email Signatures
Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest
Phishing and Countermeasures (Eds. Jakobsson and Myers, Wiley), October 2006