Publications
Academic Paper Collaboration
Zero-Knowledge in EasyCrypt
Academic Paper Collaboration
Secure and Efficient Implementation of Electronic Money
View online
Academic Paper Collaboration
Towards a Foundation of Web3
View online
Academic Paper Collaboration
An Ultra-Scalable Blockchain Platform for Universal Asset Tokenization: Design and Implementation
View online
Academic Paper Collaboration
Unsatisfiability of Comparison-Based Non-malleability for Commitments
View online
In: H. Seidl, Z. Liu, C. S. Pasareanu, eds., Proc. of 19th Int. Coll. on Theoretical Aspects of Computing, ICTAC 2022 (Tbilisi, Sept. 2022), v. 13572 of Lect. Notes in Comput. Sci., pp. 305-323. Springer, 2022.
Authors' version available HERE
Academic Paper Collaboration
Reflection, Rewinding, and Coin-Toss in EasyCrypt
View online
Denis Firsov, Dominique Unruh
In: Proceedings of the 11th ACM SIGPLAN International Conference on Certified Programs and Proofs (CPP 2022). Association for Computing Machinery, New York, NY, USA, 166–179.
Authors' version available HERE.Academic Paper KSI Security
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
View online
In: Sherman S. M. Chow, Joseph K. Liu, Lucas Chi Kwong Hui, Siu-Ming Yiu. Provable Security - 8th International Conference, ProvSec 2014, Proceedings. LNCS 8782, pp. 130-145. Springer, 2014.
Academic Paper KSI Security
Security Proofs for Hash-Tree Time-Stamping Using Hash Functions with Small Output Size
View online
In: Colin Boyd, Leonie Simpson. Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Proceedings. LNCS 7959, pp. 235-250. Springer, 2013.
Academic Paper KSI Security
Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.
View online
Ahto Buldas, Margus Niitsoo
In: Ron Steinfeld, Philip Hawkes. Information Security and Privacy - 15th Australasian Conference, ACISP 2010, Proceedings. LNCS 6168, pp. 318-335. Springer, 2010.
Academic Paper KSI Security
Knowledge-Binding Commitments with Applications in Time-Stamping
View online
In: Okamoto T., Wang X. (eds) Public Key Cryptography – PKC 2007. PKC 2007. Lecture Notes in Computer Science, vol 4450. Springer, 2007.
Academic Paper KSI Security
Does Secure Time-Stamping Imply Collision-Free Hash Functions?
View online
In: Susilo W., Liu J.K., Mu Y. (eds) Provable Security. ProvSec 2007. Lecture Notes in Computer Science, vol 4784. Springer, 2007.
Academic Paper KSI Security
Do Broken Hash Functions Affect the Security of Time-Stamping Schemes?
View online
In: Zhou J., Yung M., Bao F. (eds) Applied Cryptography and Network Security. ACNS 2006. Lecture Notes in Computer Science, vol 3989. Springer, 2006.
Academic Paper KSI Security
Universally Composable Time-Stamping Schemes with Audit
View online
In: Zhou J., Lopez J., Deng R.H., Bao F. (eds) Information Security. ISC 2005. Lecture Notes in Computer Science, vol 3650. Springer, 2005.
Extended version available HERE.
Academic Paper KSI Security
On Provably Secure Time-Stamping Schemes
View online
Ahto Buldas, Märt Saarepera
In: Pil Joong Lee. Advances in Cryptology - ASIACRYPT 2004, 10th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. LNCS 3329, pp. 500-514. Springer, 2004.
Academic Paper KSI Engineering
Verifiable Multi-Party Business Process Automation
View online
In: A. Del Río Ortega, H. Leopold, F.M. Santoro. Business Process Management Workshops. BPM 2020. LNBIP 397, pp. 30-41. Springer, 2021.
Author's manuscript available HERE.
Academic Paper KSI Engineering
Keyless Signature Infrastructure and PKI: Hash-Tree Signatures in Pre- and Post-Quantum World
View online
In: International Journal of Services Technology and Management, Vol. 23, Nos. 1/2, pp. 117-130. Inderscience publishers, 2017.
Academic Paper KSI Engineering
Efficient Record-Level Keyless Signatures for Audit Logs
View online
In: Karin Bernsmed, Simone Fischer-Hübner. Secure IT Systems - 19th Nordic Conference, NordSec 2014, Proceedings. LNCS 8788, pp. 149-164. Springer, 2014.
Pre-print version available HERE.
Academic Paper KSI Engineering
Keyless Signatures' Infrastructure: How to Build Global Distributed Hash-Trees
View online
In: Hanne Riis Nielson, Dieter Gollmann. Secure IT Systems - 18th Nordic Conference, NordSec 2013, Proceedings. LNCS 8208, pp 313-320. Springer, 2013.
Pre-print version available HERE.
Academic Paper BLT
BLT+L: Efficient Signatures from Timestamping and Endorsements
View online
Denis Firsov, Henri Lakk, Sven Laur, Ahto Truu
In Proceedings of the 18th International Conference on Security and Cryptography (SECRYPT), pp. 75–86, SciTePress, 2021
Pre-print version available HERE.
Academic Paper BLT
Verified Multiple-Time Signature Scheme from One-Time Signatures and Timestamping
View online
Academic Paper BLT
Verified Security of BLT Signature Scheme
View online
Academic Paper BLT
A New Approach to Constructing Digital Signature Schemes
View online
In: Attrapadung N., Yagi T. (eds) Advances in Information and Computer Security. IWSEC 2019. Lecture Notes in Computer Science, vol 11689. Springer, 2019.
Extended version available HERE.
Academic Paper BLT
A Blockchain-Assisted Hash-Based Signature Scheme
View online
In: Nils Gruschka. Secure IT Systems - 23rd Nordic Conference, NordSec 2018, Proceedings. LNCS 11252, pp. 138-153. Springer, 2018.
Pre-print available HERE.
Academic Paper BLT
A Server-Assisted Hash-Based Signature Scheme
View online
In: Helger Lipmaa, Aikaterini Mitrokotsa, Raimundas Matulevičius. Secure IT Systems - 22nd Nordic Conference, NordSec 2017, Proceedings. LNCS 10674, pp. 3-17. Springer, 2017.
Pre-print version available HERE.
Academic Paper Policy
The Technological Sovereignty Dilemma – and How New Technology Can Offer a Way Out
View online
In: European Cybersecurity Journal, Vol. 6, No. 1, 2020, pp. 24-35.
Academic Paper Policy
Blockchain Industry, Regulations and Policy in Estonia
View online
In: Asian Research Policy , Vol. 9, No. 2, 2018 (special issue on Science and Technology Trends - Blockchain Industries, Regulations and Policy), pp. 45-55.
Academic Paper Collaboration
A Unifying Theory of Electronic Money and Payment Systems
View online
Ahto Buldas, Märt Saarepera, Jamie Steiner, Dirk Draheim
In: TechRxiv (2021)
PDF version available HERE.
Academic Paper Collaboration
A privacy-preserving statistics marketplace using local differential privacy and blockchain: An application to smart-grid measurements sharing
View online
Nikos Fotiou, Iakovos Pittaras, Vasilios A. Siris, George C. Polyzos, Priit Anton
In Blockchain: Research and Applications, Vol. 2, No. 1, April 2021
Academic Paper Collaboration
SST Data Trust as a Service - Towards Secure Decentralised Management and Exchange of Space Surveillance and Tracking Data
View online
M. Popp, V. Rogojin, M.C.Boysan, and M. Wallum.
In 8th European Conference on Space Debris, 20-23.04.2021, vol 8/1, ESA Space Debris Office, 2021.
Whitepaper
Blockchain Receipts using History Trees
View online
Guardtime Whitepaper by Risto Alas and Hema Krishnamurthy, 2020