If you experience any problems, please feel free to email me at "susan@cs" followed by ".jhu.edu".

Copyright belongs to the respective holders.

Journal Articles

Batch Verification of Short Signatures
Jan Camenisch, Susan Hohenberger and Michael Østergaard Pedersen
Journal of Cryptology, 25(4): 723-747, 2012.

Securely Obfuscating Re-Encryption
Susan Hohenberger, Guy Rothblum, Abhi Shelat, and Vinod Vaikuntanathan
Journal of Cryptology, 24(4): 694-719, 2011.

Access Controls for Oblivious and Anonymous Systems
Scott Coull, Matthew Green and Susan Hohenberger
ACM Transactions on Information and System Security (TISSEC), 14(1): 10, 2011.

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage (eprint)
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger
ACM Transactions on Information and System Security (TISSEC), 9(1): 1-30, 2006.

Tetris is Hard, Even to Approximate
Ron Breukelaar, Erik D. Demaine, Susan Hohenberger, Hendrik Jan Hoogeboom, Walter A. Kosters, and David Liben-Nowell
International Journal of Computational Geometry and Applications (IJCGA), 14(1-2): 41-68, 2004.

Conference and Workshop Proceedings

Anonize: A Large-Scale Anonymous Survey System (PDF)
Susan Hohenberger, Steven Myers, Rafael Pass, Abhi Shelat
IEEE Security and Privacy (Oakland), 2014

Replacing a Random Oracle: Full Domain Hash from Indistinguishability Obfuscation (eprint)
Susan Hohenberger, Amit Sahai and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2014

Online/Offline Attribute-Based Encryption (eprint)
Susan Hohenberger and Brent Waters
Public Key Cryptography, 2014

Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes
Joseph A. Akinyele, Matthew Green and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2013

Full Domain Hash from (Leveled) Multilinear Maps and Identity-Based Aggregate Signatures (eprint)
Susan Hohenberger, Amit Sahai and Brent Waters
Advances in Cryptology -- CRYPTO, 2013

Attribute-Based Encryption with Fast Decryption (eprint)
Susan Hohenberger and Brent Waters
Public Key Cryptography, 2013

Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes
Joseph A. Akinyele, Matthew Green, Susan Hohenberger and Matthew W. Pagano
ACM Computer and Communications Security (CCS), 2012

New Definitions and Separations for Circular Security (eprint)
David Cash, Matthew Green and Susan Hohenberger
Public Key Cryptography, 2012

Detecting Dangerous Queries: A New Approach to Chosen Ciphertext Security (eprint)
Susan Hohenberger, Allison Lewko and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2012

Computing on Authenticated Data (eprint)
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, and Brent Waters
Theory of Cryptography Conference (TCC), 2012

Outsourcing the Decryption of ABE Ciphertexts
Matthew Green, Susan Hohenberger and Brent Waters
USENIX Security, 2011

Practical Adaptive Oblivious Transfer from Simple Assumptions (eprint)
Matthew Green and Susan Hohenberger
Theory of Cryptography Conference (TCC), 2011

Synchronized Aggregate Signatures: New Definitions, Constructions and Applications (eprint)
Jae Hyun Ahn, Matthew Green and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2010

Constructing Verifiable Random Functions with Large Input Spaces (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2010

Short and Stateless Signatures from the RSA Assumption (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- CRYPTO, 2009

Controlling Access to an Oblivious Database using Stateful Anonymous Credentials (eprint)
Scott Coull, Matthew Green, and Susan Hohenberger
Public Key Cryptography, 2009

Realizing Hash-and-Sign Signatures under Standard Assumptions (eprint)
Susan Hohenberger and Brent Waters
Advances in Cryptology -- EUROCRYPT, 2009

Practical Short Signature Batch Verification (eprint)
Anna Lisa Ferrara, Matthew Green, Susan Hohenberger, and Michael Østergaard Pedersen
Topics in Cryptology -- CT-RSA, 2009

Key-Private Proxy Re-Encryption (eprint)
Giuseppe Ateniese, Karyn Benson, and Susan Hohenberger
Topics in Cryptology -- CT-RSA, 2009

Universally Composable Adaptive Oblivious Transfer (eprint)
Matthew Green and Susan Hohenberger
Advances in Cryptology -- ASIACRYPT, 2008

Blind Identity-Based Encryption and Simulatable Oblivious Transfer (eprint)
Matthew Green and Susan Hohenberger
Advances in Cryptology -- ASIACRYPT, 2007

On Tweaking Luby-Rackoff Blockciphers (eprint)
David Goldenberg, Susan Hohenberger, Moses Liskov, Elizabeth Crump Schwartz, and Hakan Seyalioglu
Advances in Cryptology -- ASIACRYPT, 2007

Chosen-Ciphertext Secure Proxy Re-Encryption (eprint)
Ran Canetti and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2007

Batch Verification of Short Signatures (eprint)
Jan Camenisch, Susan Hohenberger, and Michael Østergaard Pedersen
Advances in Cryptology -- EUROCRYPT, 2007

Securely Obfuscating Re-Encryption (pdf)
Susan Hohenberger, Guy Rothblum, Abhi Shelat, and Vinod Vaikuntanathan
Theory of Cryptography Conference (TCC), 2007

How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication (eprint)
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
ACM Computer and Communications Security (CCS), 2006

Periodische n-Fach Anonyme Authentifizierung für Sensoren (in German)
Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich
DACH Mobility, 2006

Balancing Accountability and Privacy Using E-Cash (pdf)
Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya
Security and Cryptography for Networks (SCN), 2006

Lightweight Email Signatures (pdf)
Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest
Security and Cryptography for Networks (SCN), 2006

Honest-Verifier Private Disjointness Testing (without Random Oracles) (pdf)
Susan Hohenberger and Stephen A. Weis
Workshop on Privacy Enhancing Technologies (PET), 2006

Proxy Re-Signatures: New Definitions, Algorithms, and Applications (eprint)
Giuseppe Ateniese and Susan Hohenberger
ACM Computer and Communications Security (CCS), 2005

Lightweight Encryption for Email (pdf)
Ben Adida, Susan Hohenberger, and Ronald L. Rivest
USENIX Steps to Reducing Unwanted Traffic on the Internet Workshop (SRUTI), 2005

Compact E-Cash (eprint)
Jan Camenisch, Susan Hohenberger, and Anna Lysyanskaya
Advances in Cryptology -- EUROCRYPT, 2005

How To Securely Outsource Cryptographic Computations (ps, pdf)
Susan Hohenberger and Anna Lysyanskaya
Theory of Cryptography Conference (TCC), 2005

Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage (eprint)
Giuseppe Ateniese, Kevin Fu, Matthew Green, and Susan Hohenberger
Network and Distributed System Security Symposium (NDSS), 2005

Tetris is Hard, Even to Approximate (ps, pdf)
Erik D. Demaine, Susan Hohenberger, and David Liben-Nowell
Computing and Combinatorics Conference (COCOON), 2003
[slides from Ohio State talk (ps)]

Theses

Advances in Signatures, Encryption, and E-Cash from Bilinear Groups (pdf)
Ph.D. Thesis, MIT, May 2006. Committee: Ran Canetti, Silvio Micali, and Ronald L. Rivest (advisor).

The Cryptographic Impact of Groups with Infeasible Inversion (pdf)
S.M. Thesis, MIT, May 2003. Advisor: Ronald L. Rivest.
Warning: this contains some known bugs. Feel free to email me with questions.

The Effectiveness of Genetic Algorithms on Production Flow Analysis
Honors Thesis, The Ohio State University, August 2000. Advisor: Bruce Weide.

Book Chapters

Lightweight Email Signatures
Ben Adida, David Chau, Susan Hohenberger, and Ronald L. Rivest
Phishing and Countermeasures (Eds. Jakobsson and Myers, Wiley), October 2006