Veronika Kuchta received her Diploma degree in Mathematics at the Heidelberg University in Germany in 2010. She reseived her PhD in applied cryptography at the University of Surrey, United Kingdom in 2016. She worked as a postdoc at the Universite libre de Bruxelles in Belgium from 2016-2018. From 2018 till 2020 she has been a Research Fellow at Monash University in Melbourne, Australia. FromDecember 2020 to July 2022 she was employed by The University of Queensland, School of Mathematics and Physics as a lecturer in mathematical cryptography. From November 2022 she is Assistant Professor at Florida Atlantic University (Boca Raton, USA), department of mathematical sciences. Her research interst focus on the different areas of mathematical cryptography, post-quantum cryptography and its applications to the real-world.
Conference Publication: A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
Esgin, Muhammed F., Ersoy, Oguzhan, Kuchta, Veronika, Loss, Julian, Sakzad, Amin, Steinfeld, Ron, Yang, Xiangwen and Zhao, Raymond K. (2023). A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. New York, NY, USA: ACM. doi: 10.1145/3579856.3595792
Journal Article: A survey on exotic signatures for post-quantum blockchain: challenges and research directions
Buser, Maxime, Dowsley, Rafael, Esgin, Muhammed F., Gritti, Clémentine, Kermanshahi, Shabnam Kasra, Kuchta, Veronika, LeGrow, Jason T., Liu, Joseph K., Phan, Raphaël C.-W., Sakzad, Amin, Steinfeld, Ron and Yu, Jiangshan (2022). A survey on exotic signatures for post-quantum blockchain: challenges and research directions. ACM Computing Surveys, 55 (12) 251, 1-32. doi: 10.1145/3572771
Conference Publication: Lattice-Based Inner Product Argument
Kuchta, Veronika, Sahu, Rajeev Anand and Sharma, Gaurav (2022). Lattice-Based Inner Product Argument. 13th International Conference on Cryptology in Africa AFRICACRYPT 2022, Fes, Morocco, 18–20 July 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-031-17433-9_11
(2022–2027) Monash University
A survey on exotic signatures for post-quantum blockchain: challenges and research directions
Buser, Maxime, Dowsley, Rafael, Esgin, Muhammed F., Gritti, Clémentine, Kermanshahi, Shabnam Kasra, Kuchta, Veronika, LeGrow, Jason T., Liu, Joseph K., Phan, Raphaël C.-W., Sakzad, Amin, Steinfeld, Ron and Yu, Jiangshan (2022). A survey on exotic signatures for post-quantum blockchain: challenges and research directions. ACM Computing Surveys, 55 (12) 251, 1-32. doi: 10.1145/3572771
Improving unlinkability of attribute-based authentication through game theory
Zolotavkin, Yevhen, Jeong, Jongkil Jay, Kuchta, Veronika, Slavnenko, Maksym and Doss, Robin (2022). Improving unlinkability of attribute-based authentication through game theory. ACM Transactions on Privacy and Security, 25 (2) 12, 1-36. doi: 10.1145/3501260
Improving unlinkability of attribute-based authentication through game theory
Yevhen Zolotavkin, Jongkil Jay Jeong, Veronika Kuchta, Maksym Slavnenko and Robin Doss (2022). Improving unlinkability of attribute-based authentication through game theory. ACM Transactions on Privacy and Security, 25 (2). doi: 10.1145/3501260
Lattice-based zero-knowledge arguments for additive and multiplicative relations
Kuchta, Veronika, Sakzad, Amin, Steinfeld, Ron and Liu, Joseph K. (2021). Lattice-based zero-knowledge arguments for additive and multiplicative relations. Designs, Codes and Cryptography, 89 (5), 925-963. doi: 10.1007/s10623-021-00851-1
Torres, Wilson Abel Alberto, Steinfeld, Ron, Sakzad, Amin and Kuchta, Veronika (2020). Post-quantum linkable ring signature enabling distributed authorised ring confidential transactions in blockchain.
A twofold group key agreement protocol for NoC‐based MPSoCs
Sharma, Gaurav, Kuchta, Veronika, Anand Sahu, Rajeev, Ellinidou, Soultana, Bala, Suman, Markowitch, Olivier and Dricot, Jean‐Michel (2019). A twofold group key agreement protocol for NoC‐based MPSoCs. Transactions on Emerging Telecommunications Technologies, 30 (6) e3633, 1-18. doi: 10.1002/ett.3633
Public-key encryption with integrated keyword search
Saraswat, Vishal, Sahu, Rajeev Anand, Sharma, Gaurav, Kuchta, Veronika and Markowitch, Olivier (2019). Public-key encryption with integrated keyword search. Journal of Hardware and Systems Security, 3 (1), 12-25. doi: 10.1007/s41635-019-00066-w
A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum
Esgin, Muhammed F., Ersoy, Oguzhan, Kuchta, Veronika, Loss, Julian, Sakzad, Amin, Steinfeld, Ron, Yang, Xiangwen and Zhao, Raymond K. (2023). A New Look at Blockchain Leader Election: Simple, Efficient, Sustainable and Post-Quantum. New York, NY, USA: ACM. doi: 10.1145/3579856.3595792
Lattice-Based Inner Product Argument
Kuchta, Veronika, Sahu, Rajeev Anand and Sharma, Gaurav (2022). Lattice-Based Inner Product Argument. 13th International Conference on Cryptology in Africa AFRICACRYPT 2022, Fes, Morocco, 18–20 July 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-031-17433-9_11
Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain
Buser, Maxime, Dowsley, Rafael, Esgin, Muhammed F., Kasra Kermanshahi, Shabnam, Kuchta, Veronika, Liu, Joseph K., Phan, Raphaël C.-W. and Zhang, Zhenfei (2022). Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain. 27th European Symposium on Research in Computer Security (ESORICS), Copenhagen, Denmark, 26-30 September 2022. Cham, Switzerland: Springer. doi: 10.1007/978-3-031-17140-6_2
Efficient lattice-based polynomial evaluation and batch ZK arguments
Kuchta, Veronika, Sakzad, Amin, Steinfeld, Ron and Liu, Joseph K. (2021). Efficient lattice-based polynomial evaluation and batch ZK arguments. 27th International Conference on Selected Areas in Cryptography, SAC 2020, Halifax, NS, Canada, 21-23 October 2020. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-81652-0_1
Enhancing privacy through DMMA: decision-making method for authentication
Slavnenko, Maksym, Zolotavkin, Yevhen, Jeong, Jay, Kuchta, Veronika and Doss, Robin (2021). Enhancing privacy through DMMA: decision-making method for authentication. 20th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom), Shenyang, Peoples Republic of China, 20-22 October 2021. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/TrustCom53373.2021.00055
Practical post-quantum few-time verifiable random function with applications to algorand
Esgin, Muhammed F., Kuchta, Veronika, Sakzad, Amin, Steinfeld, Ron, Zhang, Zhenfei, Sun, Shifeng and Chu, Shumo (2021). Practical post-quantum few-time verifiable random function with applications to algorand. 25th International Conference on Financial Cryptography and Data Security (FC), Virtual, 1-5 March 2021. Heidelberg, Germany: Springer. doi: 10.1007/978-3-662-64331-0_29
Kuchta, Veronika, Sakzad, Amin, Stehle, Damien, Steinfeld, Ron and Sun, Shifeng (2020). Measure-rewind-measure: tighter quantum random oracle model proofs for one-way to hiding and CCA security. Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, 10-14 May 2020. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-45727-3_24
Revocable and linkable ring signature
Zhang, Xinyu, Liu, Joseph K., Steinfeld, Ron, Kuchta, Veronika and Yu, Jiangshan (2019). Revocable and linkable ring signature. International Conference on Information Security and Cryptology, Nanjing, China, 6-8 December 2019. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-42921-8_1
Incentives for harvesting attack in proof of work mining pools
Zolotavkin, Yevhen and Kuchta, Veronika (2019). Incentives for harvesting attack in proof of work mining pools. 24th European Symposium on Research in Computer Security, ESORICS 2019, Luxembourg, 23-27 September 2019. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-29959-0_34
Lattice RingCT V2.0 with multiple input and multiple output wallets
Alberto Torres, Wilson, Kuchta, Veronika, Steinfeld, Ron, Sakzad, Amin, Liu, Joseph K. and Cheng, Jacob (2019). Lattice RingCT V2.0 with multiple input and multiple output wallets. 24th Australasian Conference, ACISP 2019, Christchurch, New Zealand, July 3–5, 2019. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-030-21548-4_9
Anonymous yet traceable strong designated verifier signature
Kuchta, Veronika, Anand Sahu, Rajeev, Saraswat, Vishal, Sharma, Gaurav, Sharma, Neetu and Markowitch, Olivier (2018). Anonymous yet traceable strong designated verifier signature. 21st Information Security Conference, ISC 2018, Guildford, United Kingdom, 9-12 September 2018. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-99136-8_22
A twofold group key agreement protocol for NoC based MPSoCs
Sharma, Gaurav, Kuchta, Veronika, Anand Sahu, Rajeev, Ellinidou, Soultana, Markowitch, Olivier and Dricot, Jean-Michel (2018). A twofold group key agreement protocol for NoC based MPSoCs. 16th Annual Conference on Privacy, Security and Trust, PST 2018, Belfast, Northern Ireland, 28-30 August 2018. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/PST.2018.8514117
Secure communication on NoC based MPSoC
Sharma, Gaurav, Ellinidou, Soultana, Kuchta, Veronika, Anand Sahu, Rajeev, Markowitch, Olivier and Dricot, Jean-Michel (2018). Secure communication on NoC based MPSoC. 14th International EAI Conference on Security and Privacy in Communication Networks, SecureComm 2018, Singapore, 8-10 August 2018. Cham, Switzerland: Springer. doi: 10.1007/978-3-030-01704-0_23
Gerard, Francois, Kuchta, Veronika, Anand Sahu, Rajeev, Sharma, Gaurav and Markowitch, Olivier (2018). Fully homomorphic distributed identity-based encryption resilient to continual auxiliary input leakage. 15th International Joint Conference on e-Business and Telecommunications, ICETE 2018, Porto, Portugal, 26-28 July 2018. Setúbal, Portugal: SciTePress. doi: 10.5220/0006832200410052
Abel Alberto Torres, Wilson, Steinfeld, Ron, Sakzad, Amin, Liu, Joseph K, Kuchta, Veronika, Bhattacharjee, Nandita, Man Ho Au, Alan and Cheng, Au (2018). Post-quantum one-time linkable ring signature and application to ring confidential transactions in blockchain (Lattice RingCT v1.0). 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, Wollongong, NSW, Australia, 11-13 July 2018. Cham, Switzerland: Springer. doi: 10.1007/978-3-319-93638-3_32
Authenticated group key agreement protocol without pairing
Sharma, Gaurav, Sahu, Rajeev Anand, Kuchta, Veronika, Markowitch, Olivier and Bala, Suman (2018). Authenticated group key agreement protocol without pairing. 19th International Conference on Information and Communications Security (ICICS), Beijing, China, Dec 06-08, 2017. CHAM: Springer. doi: 10.1007/978-3-319-89500-0_52
Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings
Kuchta, Veronika, Sharma, Gaurav, Sahu, Rajeev Anand and Markowitch, Olivier (2018). Multi-party (leveled) homomorphic encryption on identity-based and attribute-based settings. 20th International Conference on Information Security and Cryptology (ICISC), Seoul South Korea, Nov 29-Dec 01, 2017. CHAM: Springer. doi: 10.1007/978-3-319-78556-1_5
On new zero-knowledge arguments for attribute-based group signatures from lattices
Kuchta, Veronika, Sahu, Rajeev Anand, Sharma, Gaurav and Markowitch, Olivier (2018). On new zero-knowledge arguments for attribute-based group signatures from lattices. 20th International Conference on Information Security and Cryptology (ICISC), Seoul South Korea, Nov 29-Dec 01, 2017. CHAM: Springer. doi: 10.1007/978-3-319-78556-1_16
Generic framework for attribute-based group signature
Kuchta, Veronika, Sharma, Gaurav, Sahu, Rajeev Anand and Markowitch, Olivier (2017). Generic framework for attribute-based group signature. 13th International Conference on Information Security Practice and Experience (ISPEC), Melbourne, Australia, Dec 13-15, 2017. CHAM: Springer. doi: 10.1007/978-3-319-72359-4_51
Secure certificateless proxy re-encryption without pairing
Kuchta, Veronika, Sharma, Gaurav, Sahu, Rajeev Anand, Bhatia, Tarunpreet and Markowitch, Olivier (2017). Secure certificateless proxy re-encryption without pairing. 12th International Workshop on Security (IWSEC), Hiroshima, Japan, Aug 30-Sep 01, 2017. CHAM: Springer. doi: 10.1007/978-3-319-64200-0_6
A categorical approach in handling event-ordering in distributed systems
Sisiaridis, Dimitrios , Kuchta, Veronika and Markowitch, Olivier (2016). A categorical approach in handling event-ordering in distributed systems. 22nd International Conference on Parallel and Distributed Systems (ICPADS), Wuhan, China, 13-16 December 2016. Piscataway, NJ, United States: Institute of Electrical and Electronics Engineers. doi: 10.1109/ICPADS.2016.0150
Kuchta, Veronika and Markowitch, Olivier (2016). Multi-authority distributed attribute-based encryption with application to searchable encryption on lattices. Mycrypt 2016: Paradigms in Cryptology – Mycrypt 2016. Malicious and Exploratory Cryptology, Kuala-Lumpur, Malaysia, 1-2 December 2016. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-61273-7_20
Identity-based threshold encryption on lattices with application to searchable encryption
Kuchta, Veronika and Markowitch, Olivier (2016). Identity-based threshold encryption on lattices with application to searchable encryption. 7th International Conference on Applications and Techniques in Information Security (ATIS), Cairns, Australia, Oct 26-28, 2016. Singapore: Springer. doi: 10.1007/978-981-10-2741-3_10
Public key encryption with distributed keyword search
Kuchta, Veronika and Manulis, Mark (2015). Public key encryption with distributed keyword search. INTRUST 2015: Trusted Systems , Beijing, China, 7-8 December 2015. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-31550-8_5
Rerandomizable threshold blind signatures
Kuchta, Veronika and Manulis, Mark (2014). Rerandomizable threshold blind signatures. INTRUST 2014: Trusted Systems, Beijing, China, 16-17 December 2014. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-27998-5_5
Unique aggregate signatures with applications to distributed verifiable random functions
Kuchta, Veronika and Manulis, Mark (2013). Unique aggregate signatures with applications to distributed verifiable random functions. CANS 2013: Cryptology and Network Security, Paraty, Brazil, 20-22 November 2013. Cham, Switzerland: Springer International Publishing. doi: 10.1007/978-3-319-02937-5_14
Post-quantum verifiable random function from symmetric primitives in PoS Blockchain
Buser, Maxime, Dowsley, Rafael, Esgin, Muhammed F., Kermanshahi, Shabnam Kasra, Kuchta, Veronika, Liu, Joseph K., Phan, Raphael and Zhang, Zhenfei (2021). Post-quantum verifiable random function from symmetric primitives in PoS Blockchain.
Practical post-quantum few-time verifiable random function with applications to algorand
Esgin, Muhammed F., Kuchta, Veronika, Sakzad, Amin, Steinfeld, Ron, Zhang, Zhenfei, Sun, Shifeng and Chu, Shumo (2020). Practical post-quantum few-time verifiable random function with applications to algorand.
Distributed protocols for digital signatures and public key encryption
Veronika Kuchta (2016). Distributed protocols for digital signatures and public key encryption. PhD Thesis, Department of Computer Science, University of Surrey .
(2022–2027) Monash University