Journals
  • David Mandell Freeman, Oded Goldreich, Eike Kiltz, Alon Rosen, Gil Segev. More Constructions of Lossy and Correlation-Secure Trapdoor Functions. Journal of Cryptology, Volume 26, Number 1 (2013), Pages 39--74. Full version available on Cryptology ePrint Archive.
    PDF [pdf] Springer Link [published version]

  • Rafael Pass, Alon Rosen, Wei-Lung Dustin Tseng, Julia Borghoff, Lars R Knudsen, Gregor Leander, Søren S Thomsen, Hossein Ghodosi, Eiichiro Fujisaki, Tatsuaki Okamoto, Dennis Hofheinz, Eike Kiltz, Victor Shoup, Antoine Joux, Vanessa Vitse, Andrej Bogdanov, Takanori Isobe. Our Content. Journal of Failure Analysis and Prevention, December 2012, Volume 12, Issue 6, pp. 640--642. © Springer-Verlag.
    Springer Link [published version]

  • Dennis Hofheinz, Eike Kiltz, Victor Shoup. Practical Chosen Ciphertext Secure Encryption from Factoring. Journal of Cryptology, Volume 26, Number 1 (2013), Pages 102--118.


  • David Cash, Dennis Hofheinz, Eike Kiltz, Chris Peikert. Bonsai Trees, or How to Delegate a Lattice Basis. Journal of Cryptology, Volume 25, Number 4 (2012), Pages 601--639. Full version available on Cryptology ePrint Archive.
    PDF [pdf] Springer Link [published version]

  • Dennis Hofheinz, Eike Kiltz. Programmable Hash Functions and Their Applications. Journal of Cryptology, Volume 25, Number 3 (2012), Pages 484--527. Full version available on Cryptology ePrint Archive Slides from Leiden workshop.
    PDF [pdf] Springer Link [published version] Slides [slides]

  • Masayuki Abe, Yang Cui, Hideki Imai, Eike Kiltz. Efficient Hybrid Encryption from ID-Based Encryption. Designs, Codes and Cryptography 54(3): 205-240 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • David Galindo, Eike Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Theoretical Computer Science. 410(47-49): 5093-5111 (2009).
    PDF [pdf]

  • Seung Geol Choi, Javier Herranz, Dennis Hofheinz, Jung Yeon Hwang, Eike Kiltz, Dong Hoon Lee and Moti Yung. The Kurosawa-Desmedt Key Encapsulation is not Chosen-Ciphertext Secure. Information Processing Letters, Volume 109, Issue 16, 31 July 2009, Pages 897-901.


  • David Cash, Eike Kiltz, Victor Shoup. The Twin Diffie-Hellman Problem and Applications. Journal of Cryptology, Volume 22, Issue 4 (2009), Page 470.
    Springer Link [published version]

  • Michel Abdalla, Eike Kiltz, Gregory Neven. Generalized Key Delegation for Hierarchical Identity-Based Encryption. IET Information Security, Volume 2, Issue 3, pp. 67--78, September 2008.


  • Michel Abdalla, Mihir Bellare, Dario Catalano, Eike Kiltz, Tadayoshi Kohno, Tanja Lange, John Malone-Lee, Gregory Neven, Pascal Paillier and Haixia Shi. Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions. Journal of Cryptology, Volume 21, Isuue 3, July 2008, pp. 350--391.
    Springer Link [published version]

  • Eike Kiltz, Arne Winterhof. Polynomial Interpolation of Cryptographic Functions Related to the Diffie-Hellman and Discrete Logarithm Problem. Journal of Discrete Applied Mathematics, Special Issue on Coding and Cryptography, Volume 154, Issue 2 , 1 February 2006, pp. 326-336. (Journal version of a WCC 2003 paper.).


  • Javier Herranz, Dennis Hofheinz, Eike Kiltz. Some (In)Sufficient Conditions for Secure Hybrid Encryption. Information and Computation. Journal version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Hans Ulrich Simon. Threshold Circuit Lower Bounds on Cryptographic Functions. Journal of Computer and Systems Sciences, JCSS Volume 71, Issue 2, August 2005, pp. 185-212. Full version available on Cryptology ePrint Archive.


  • Eike Kiltz, Arne Winterhof. Lower Bounds on Weight and Degree of Bivariate Polynomials Related to the Diffie-Hellman Mapping. Bulletin of the AMS, vol. 69 (2004), pp. 305-315.


  • Masayuki Abe, Eike Kiltz, Tatsuaki Okamoto. Chosen Ciphertext Security with Optimal Ciphertext Overhead. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E93-A No.1 pp.22-33.


Book Chapters
  • David Cash, Eike Kiltz, and Stefano Tessaro. Two-Round Man-in-the-Middle Security from LPN. IACR TCC 2016.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Georg Fuchsbauer, Felix Heuer, Eike Kiltz and Krzysztof Pietrzak. Standard Security Does Imply Security Against Selective Opening for Markov Distributions. IACR TCC 2016.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Daniel Masny, Jiaxin Pan. Optimal Security Proofs for Signatures from Identification Schemes. IACR Cryptology ePrint Archive 2016: 191 (2016), CRYPTO (2) 2016: 33-61.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Tightly CCA-Secure Encryption Without Pairings. EUROCRYPT (1) 2016: 1-27.
    Springer Link [published version] Bibtex [bibtex]

  • Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge. On the Selective Opening Security of Practical Public-Key Encryption Schemes. Public Key Cryptography 2015: 27-511, IACR Cryptology ePrint Archive 2016: 342 (2016).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Jiaxin Pan, Hoeteck Wee. Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptology ePrint Archive 2015: 604 (2015), CRYPTO (2) 2015: 275-295.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Alex Escala, Gottfried Herold, Eike Kiltz, Carla Rafols, Jorge Villar. An Algebraic Framework for Diffie-Hellman Assumptions. IACR Cryptology ePrint Archive 2013: 377 (2013), CRYPTO (2) 2013: 129-147.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Gregory Neven. Identity-Based Signatures. IOS Press Cryptology and Information Security Series on Identity-Based Cryptography, Dec 2008.
    PDF [pdf] URL [url]

Proceedings
  • David Cash, Eike Kiltz, and Stefano Tessaro. Two-Round Man-in-the-Middle Security from LPN. IACR TCC 2016.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Romain Gay, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Tightly Secure CCA-Secure Encryption without Pairings . IACR Cryptology ePrint Archive 2016: 94 (2016).
    PDF [pdf] Bibtex [bibtex]

  • Eike Kiltz, Daniel Masny, Jiaxin Pan. Optimal Security Proofs for Signatures from Identification Schemes. IACR Cryptology ePrint Archive 2016: 191 (2016), CRYPTO (2) 2016: 33-61.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • David Cash, Rafael Dowsley, Eike Kiltz. Digital Signatures from Strong RSA without Prime Generation. IACR PKC 2015.


  • Felix Heuer, Tibor Jager, Eike Kiltz, Sven Schäge. On the Selective Opening Security of Practical Public-Key Encryption Schemes. Public Key Cryptography 2015: 27-511, IACR Cryptology ePrint Archive 2016: 342 (2016).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Hoeteck Wee. Quasi-Adaptive NIZK for Linear Subspaces Revisited. IACR EUROCRYPT 2015.
    PDF [pdf]

  • Eike Kiltz, Jiaxin Pan, Hoeteck Wee. Structure-Preserving Signatures from Standard Assumptions, Revisited. IACR Cryptology ePrint Archive 2015: 604 (2015), CRYPTO (2) 2015: 275-295.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Christoph Bader, Dennis Hofheinz, Tibor Jager, Eike Kiltz, Yong Li. Tightly-Secure Authenticated Key Exchange. IACR TCC 2015.
    PDF [pdf]

  • Olivier Blazy, Saqib A. Kakvi, Eike Kiltz, Jiaxin Pan. Tightly-Secure Signatures from Chameleon Hash Functions. IACR PKC 2015.
    PDF [pdf] Slides [slides] Bibtex [bibtex]

  • Eike Kiltz, Daniel Masny, Jiaxin Pan. Schnorr Signatures in the Multi-User Setting. IACR Cryptology ePrint Archive 2015: 1122 (2015).
    URL [url] Bibtex [bibtex]

  • Olivier Blazy, Eike Kiltz, Jiaxin Pan. (Hierarchical) Identity-Based Encryption from Affine Message Authentication. Proceedings of IACR CRYPTO 2014, (1) 408--425. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Daniel Masny, Krzysztof Pietrzak. Simple Chosen-Ciphertext Security from Low-Noise LPN. Public Key Cryptography 2014: 1-18, IACR Cryptology ePrint Archive 2015: 401 (2015).
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Alex Escala, Gottfried Herold, Eike Kiltz, Carla Rafols, Jorge Villar. An Algebraic Framework for Diffie-Hellman Assumptions. IACR Cryptology ePrint Archive 2013: 377 (2013), CRYPTO (2) 2013: 129-147.
    PDF [pdf] Springer Link [published version] Bibtex [bibtex]

  • Eike Kiltz, Krzysztof Pietrzak, Mario Szegedy. Digital Signatures with Minimal Overhead from Indifferentiable Random Invertible Functions. Proceedings of IACR CRYPTO 2013. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eduarda S. V. Freire, Dennis Hofheinz, Eike Kiltz, Kenneth G. Paterson. Non-Interactive Key Exchange. Proceedings of IACR PKC 2013, 254-271 LNCS 7778 (2013). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Stefan Heyse, Eike Kiltz, Vadim Lyubashevsky, Krzysztof Pietrzak, Christof Paar. An Efficient Authentication Protocol Based on Ring-LPN. Proceedings of IACR FSE 2012.


  • Mihir Bellare, Eike Kiltz, Chris Peikert, Brent Waters. Identity-Based (Lossy) Trapdoor Functions and Applications. Proceedings of IACR EUROCRYPT 2012. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Yevgeniy Dodis, Eike Kiltz, Krzysztof Pietrzak, Daniel Wichs. Message Authentication, Revisited. Proceedings of IACR EUROCRYPT 2012.


  • Saqib A. Kakvi, Eike Kiltz. Optimal Security Proofs for Full Domain Hash, Revisited. Proceedings of IACR EUROCRYPT 2012.
    PDF [pdf] Slides [slides] Bibtex [bibtex]

  • Dennis Hofheinz, Eike Kiltz. Programmable Hash Functions and Their Applications. Journal of Cryptology, Volume 25, Number 3 (2012), Pages 484--527. Full version available on Cryptology ePrint Archive Slides from Leiden workshop.
    PDF [pdf] Springer Link [published version] Slides [slides]

  • Eike Kiltz, Krzysztof Pietrzak, David Cash, Abhishek Jain, Daniele Venturi. Efficient Authentication from Hard Learning Problems. Proceedings of IACR EUROCRYPT 2011, 7-26 LNCS 6632 (2011). Best paper award..


  • Dennis Hofheinz, Tibor Jager, Eike Kiltz. Short Signatures from Weaker Assumptions. Proceedings of IACR ASIACRYPT 2011, 647--666 LNCS 7073 (2011). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Ronald Cramer, Dennis Hofheinz, Eike Kiltz. A Twist on the Naor-Yung Paradigm and Its Application to Efficient CCA-Secure Encryption from Hard Search Problems. Proceedings of IACR TCC 2010, 146--164 LNCS 5978 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Payman Mohassel, Adam O'Neill. Adaptive Trapdoor Functions and Chosen-Ciphertext Security. Proceedings of IACR EUROCRYPT 2010, 673-692 LNCS 6110 (2010).
    PDF [pdf]

  • Serge Fehr, Dennis Hofheinz, Eike Kiltz, Hoeteck Wee. Encryption schemes secure against chosen-ciphertext selective opening attacks. Proceedings of IACR EUROCRYPT 2010, 381-402 LNCS 6110 (2010).
    PDF [pdf]

  • Eike Kiltz, Adam O'Neill, and Adam Smith. Instantiability of RSA-OAEP under Chosen-Plaintext Attack. Proceedings of IACR CRYPTO 2010, 295-313 LNCS 6223 (2010). Full version in preparation..


  • Eike Kiltz, Krzysztof Pietrzak. Leakage Resilient ElGamal Encryption. Proceedings of IACR ASIACRYPT 2010.
    PDF [pdf]

  • Sebastian Faust, Eike Kiltz, Krzysztof Pietrzak, Guy N. Rothblum. Leakage-Resilient Signatures. Proceedings of IACR TCC 2010, 343--360 LNCS 5978 (2010). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Kristiyan Haralambiev, Tibor Jager, Eike Kiltz, Victor Shoup. Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model. Proceedings of IACR PKC 2010, 279-295 LNCS 6056 (2010).
    PDF [pdf]

  • Eike Kiltz, Krzysztof Pietrzak, Martijn Stam, Moti Yung. A New Randomness Extraction Paradigm for Hybrid Encryption. Proceedings of IACR EUROCRYPT 2009, pp. 590--609 LNCS 5479 (2009).
    PDF [pdf]

  • Eike Kiltz, Krzysztof Pietrzak. On the Security of Padding-Based Encryption Schemes (Or: Why we cannot prove OAEP secure in the Standard Model). Proceedings of IACR EUROCRYPT 2009, pp. 389--406 LNCS 5479 (2009).
    PDF [pdf]

  • Dennis Hofheinz, Eike Kiltz. The Group of Signed Quadratic Residues and Applications. Proceedings of IACR CRYPTO 2009, 637--653 LNCS 5677 (2009).
    PDF [pdf]

  • Eike Kiltz, Yevgeniy Vahlis. CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption. Proceedings of CT-RSA 2008. pp. 221--238 LNCS 4964 (2008). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Ivan Damgaard, Dennis Hofheinz, Eike Kiltz, Rune Thorbek. Public-Key Encryption with Non-Interactive Opening. Proceedings of CT-RSA 2008. pp. 239--255 LNCS 4964 (2008).
    PDF [pdf]

  • Ronald Cramer, Eike Kiltz, C. Padró. A Note on Secure Computation of the Moore-Penrose Pseudo-Inverse and its Application to Secure Linear Algebra. Proceedings of IACR CRYPTO 2007, pp. 613--630 LNCS 4622 (2007).


  • Ronald Cramer, Goichiro Hanaoka, Dennis Hofheinz, Hideki Imai, Eike Kiltz, Rafael Pass, Abhi Shelat, Vinod Vaikuntanathan. Bounded CCA2-Secure Encryption. Proceedings of IACR ASIACRYPT 2007. (An earlier version appeared as eprint 2006/391).


  • Eike Kiltz. Chosen-Ciphertext Secure Key Encapsulation based on Hashed Gap Decisional Diffie-Hellman. Proceedings of IACR PKC 2007, pp. 282--297 LNCS 4450 (2007). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Dennis Hofheinz, Eike Kiltz. Secure Hybrid Encryption from Weakened Key Encapsulation. Proceedings of IACR CRYPTO 2007, pp. 553--571 LNCS 4622 (2007). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Payman Mohassel, Enav Weinreb, Matt Franklin. Secure Linear Algebra Using Linearly Recurrent Sequences. Proceedings of IACR TCC 2007, pp. 291--310 LNCS 4392 (2007).
    PDF [pdf]

  • Eike Kiltz. Chosen-Ciphertext Security from Tag-Based Encryption. Proceedings of IACR TCC 2006, pp. 581--600 LNCS 3876 (2006).
    PDF [pdf]

  • David Galindo, Eike Kiltz. Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Proceedings of ACISP 2006, pp. 336--347 LNCS 4058 (2006). Full version available on Cryptology ePrint Archive. See also the journal version..
    PDF [pdf]

  • David Galindo and Javier Herranz and Eike Kiltz. On the Generic Construction of Identity-Based Signatures with Additional Properties. Proceedings of IACR ASIACRYPT 2006, pp. 178 -- 193 LNCS 4284 (2006). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. On the Limitations of the Spread of an IBE-to-PKE Transformation. Proceedings of IACR PKC 2006, pp. 274--289 LNCS 3958 (2006).
    PDF [pdf]

  • David Galindo, Eike Kiltz. Threshold Chosen-Ciphertext Secure Identity-Based Key Encapsulation without Random Oracles. Proceedings of SCN 2006, pp. 173--185 LNCS 4116 (2006). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Ivan Damgaard, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft. Unconditionally Secure Constant-Rounds Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. Proceedings of IACR TCC 2006, pp. 285--304 LNCS 3876 (2006).
    PDF [pdf]

  • Eike Kiltz, Anton Mityagin, Saurabh Panjwani Barath Raghavan. Append-Only Signatures. Proceedings of ICALP 2005, pp. 435--445 LNCS 3580 (2005). © Springer-Verlag. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, Gregor Leander, John Malone-Lee. Secure Computation of the Mean and Related Statistics. Proceedings of IACR TCC 2005, pp. 283--302 LNCS 3378 (2005). © IACR. Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz, John Malone-Lee. A General Construction of IND-CCA2 Secure Public Key Encryption. Proceedings of the Ninth IMA Conference on Cryptography and Coding, pp. 152--166. LNCS 2898 (2003). .
    URL [url]

  • Eike Kiltz, Hand Ulrich Simon. Complexity Theoretic Aspects of some Cryptographic Functions. Proceedings of the Ninth International Computing and Combinatorics Conference, COCOON 2003. pp. 294--303. LNCS 2697. © Springer-Verlag.
    URL [url]

  • Eike Kiltz. On the Representation of Boolean Predicates of the Diffie-Hellman Function. Proceedings of the 20th International Symposium on Theoretical Aspects of Computer Science, STACS 2003. LNCS 2607.
    PDF [pdf] URL [url]

  • Eike Kiltz. A Primitive for Proving the Security of Every Bit and About Universal Hash Functions & Hard Core Bits. Proceedings of the 13th International Symposium on Fundamentals of Computation Theory, FCT 2001, LNCS 2138. © Springer-Verlag.
    PDF [pdf] URL [url]

  • Eike Kiltz. A Tool Box of Cryptographic Functions related to the Diffie-Hellman Function. Proceedings of the second International Conference on Cryptology in India, INDOCRYPT 2001. LNCS 2247. © Springer-Verlag.
    PDF [pdf] URL [url]

Technical Reports
  • Eike Kiltz. Chosen-Ciphertext Secure Identity-Based Encryption in the Standard Model with short Ciphertexts. pp. 1-26, preprint. An extended version of this paper appeared in CT-RSA 2008 (with Y. Vahlis). Full version available on Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. From Selective-ID to Full Security: The Case of the Inversion-Based Boneh-Boyen IBE Scheme. Cryptology ePrint Archive.
    PDF [pdf]

  • Mihir Bellare, Dennis Hofheinz, Eike Kiltz. On the No-Challenge-Decryption Condition in IND-CCA. Manuscript (2007).


  • Ronald Cramer, Dennis Hofheinz, Eike Kiltz. A Note on Bounded Chosen Ciphertext Security from Black-box Semantical Security. manuscript. Cryptology ePrint Archive.
    PDF [pdf]

  • Eike Kiltz. Unconditionally Secure Constant Round Multi-Party Computation for Equality, Comparison, Bits and Exponentiation. pp. 1-22, manuscript. Cryptology ePrint Archive. This paper has been merged and was published at TCC 2006..
    PDF [pdf]

  • Eike Kiltz. Verfahren zur Überprüfung von Bitsicherheit in Kryptosystemen. Diplomarbeit Mathematik (in German), Ruhr-Universität Bochum, May 2000.