• Intro (current)
  • Timeline
  • Research
  • Contact

Björn Tackmann

I am a cryptography researcher. I am currently the Head of Research at the DFINITY Foundation in Zürich, Switzerland.

I definitely have more grey hair, though.

Timeline

Year Activity
since 2019 Senior Researcher, since late 2022 Head of Research at DFINITY Foundation in Zürich.
2016-2019 Postdoc/Research Staff Member at IBM Research in Rüschlikon.
2014-2016 Postdoc with Mihir Bellare at the Department of Computer Science and Engineering at UC San Diego.
2014 Ph.D. thesis on "A Theory of Secure Communication" with Ueli Maurer at ETH Zürich (co-advised by Mihir Bellare and Adrian Perrig).
2008 Master's thesis on "Security Properties and Mathematical Foundations of Key Agreement Protocols" Master's with Jörn Müller-Quade and Stefan Kühnlein at the Karlsruhe Institute of Technology.

Please find my full C.V. in this pdf.

Research

Filter by tags:

  • Communication
  • Multi-Party Computation
  • Constructive Cryptography
  • Non-malleable Codes
  • TLS
  • Blockchain

No publications pertain to all selected tags. To see more publications, unselect tags.

  1. Orestis Alpos, Christian Cachin, Björn Tackmann, and Luca Zanolini Asymmetric Distributed Trust Distributed Computing 37, 247–277, 2024. link eprint
  2. Björn Tackmann and Ivan Visconti Cryptographic Tools for Blockchains Book chapter in Principles of Blockchain Systems, 2021. link
  3. Christian Cachin, Angelo De Caro, Pedro Moreno-Sanchez, Björn Tackmann, and Marko Vukolic The Transaction Graph for Modeling Blockchain Semantics Cryptoeconomic Systems, 2021. link eprint
  4. Dmytro Bogatov, Angelo De Caro, Kaoutar Elkhiyaoui, and Björn Tackmann Anonymous Transactions with Revocation and Auditing in Hyperledger Fabric Cryptology and Network Security, 2021. link eprint
  5. Christian Badertscher, Ran Canetti, Julia Hesse, Björn Tackmann, and Vassilis Zikas Universal composition with global subroutines: Capturing global setup within plain UC Theory of Cryptography, LNCS, 2020. link eprint
  6. Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann Privacy-preserving auditable token payments in a permissioned blockchain system ACM Conference on Advances in Financial Technologies, 2020. link eprint
  7. Christian Cachin and Björn Tackmann Asymmetric Distributed Trust OPODIS, 2019. link eprint
  8. Mihir Bellare, Ruth Ng, and Björn Tackmann Nonces are noticed: AEAD revisited Advances in Cryptology - CRYPTO, LNCS, 2019. link eprint
  9. Jan Camenisch, Manu Drijvers, and Björn Tackmann Multi-Protocol UC and its Use for Building Modular and Efficient Protocols IACR Cryptology ePrint Archive, 2019. eprint
  10. Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann Per-session security: Password-based cryptography revisited Journal of Computer Security 27 (1), 75-111, 2019. link conference eprint
  11. Sergiu Costea, Marios O. Choudary, Doru Gucea, Björn Tackmann, and Costin Raiciu Secure Opportunistic Multipath Key Exchange ACM Conference on Computer and Communication Security, 2018. link eprint
  12. Christian Badertscher, Ueli Maurer, and Björn Tackmann On Composable Security for Digital Signatures Public-Key Cryptography, LNCS, 2018. link eprint
  13. Christian Cachin, Esha Ghosh, Dimitris Papadopoulos, and Björn Tackmann Stateful Multi-Client Verifiable Computation Applied Cryptography and Network Security, LNCS, 2018. link eprint
  14. Christian Matt, Ueli Maurer, Christopher Portmann, Renato Renner, and Björn Tackmann Toward an algebraic theory of systems Theoretical Computer Science 747, 1-25, 2018. link eprint
  15. Anja Lehmann and Björn Tackmann Updatable Encryption with Post-Compromise Security Advances in Cryptology — EUROCRYPT 2018, Springer, LNCS, 2018. link eprint
  16. Björn Tackmann Secure event tickets on a blockchain Data Privacy Management, Cryptocurrencies and Blockchain Technology, LNCS, 2017. link
  17. Joël Alwen and Björn Tackmann Moderately hard functions: Definition, instantiations, and applications Theory of Cryptography, LNCS, 2017. link eprint
  18. Christopher Portmann, Renato Renner, Christian Matt, Ueli Maurer, and Björn Tackmann Causal Boxes: Quantum Information-Processing Systems Closed under Composition IEEE Transactions on Information Theory, 2017. link eprint
  19. Mihir Bellare and Björn Tackmann The Multi-User Security of Authenticated Encryption: AES-GCM in TLS 1.3 Advances in Cryptology — CRYPTO 2016, pp. 247-276, Springer, LNCS, 2016. link eprint
  20. Mihir Bellare and Björn Tackmann Nonce-Based Cryptography: Retaining Security when Randomness Fails Advances in Cryptology — EUROCRYPT 2016, Springer, LNCS, 2016. link pdf eprint slides
  21. Sandro Coretti, Yevgeniy Dodis, Björn Tackmann, and Daniele Venturi Non-Malleable Encryption: Simpler, Shorter, Stronger Theory of Cryptography, Springer, LNCS, 2016. link pdf eprint
  22. Juan A. Garay, Björn Tackmann, and Vassilis Zikas Fair Distributed Computation of Reactive Functions DISC, Springer, LNCS, vol. 9363, pp. 497–512, 2015. link pdf eprint
  23. Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, and Daniele Venturi (De-) Constructing TLS 1.3 INDOCRYPT, Springer, LNCS, vol. 9462, pp. 85–102, 2015. link pdf
  24. Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann Query-Complexity Amplification for Random Oracles Information Theoretic Security, Springer, LNCS, vol. 9063, pp. 159–180, 2015. link pdf eprint
  25. Juan A. Garay, Jonathan Katz, Björn Tackmann, and Vassilis Zikas How Fair is Your Protocol? A Utility-based Approach to Protocol Optimality PODC, ACM Press, 2015. link pdf eprint
  26. Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, and Björn Tackmann Robust Authenticated Encryption and the Limits of Symmetric Cryptography IMA International Conference on Cryptography and Coding, Springer, LNCS, 2015. link pdf eprint
  27. Christian Badertscher, Christian Matt, Ueli Maurer, Phillip Rogaway, and Björn Tackmann Augmented Secure Channels and the Goal of the TLS 1.3 Record Layer Provable Security, Springer, LNCS, vol. 9451, pp. 85–104, 2015. link pdf eprint
  28. Sandro Coretti, Ueli Maurer, Björn Tackmann, and Daniele Venturi From Single-Bit to Multi-Bit Public-Key Encryption via Non-Malleable Codes Theory of Cryptography, Springer, LNCS, vol. 9014, pp. 532–560, 2015. link pdf eprint
  29. Grégory Demay, Peter Gaži, Ueli Maurer, and Björn Tackmann Optimality of Non-Adaptive Strategies: The Case of Parallel Games Information Theory Proceedings — ISIT, IEEE Press, pp. 1707–1711, 2014. link pdf eprint
  30. Björn Tackmann A Theory of Secure Communication ETH Zürich, 2014. link pdf
  31. Sandro Coretti, Ueli Maurer, and Björn Tackmann Constructing Confidential Channels from Authenticated Channels—Public-Key Encryption Revisited Advances in Cryptology — ASIACRYPT 2013, Springer, LNCS, vol. 8269, pp. 134–153, 2013. link pdf eprint
  32. Sandro Coretti, Ueli Maurer, and Björn Tackmann A Constructive Perspective on Key Encapsulation Springer, LNCS, vol. 8260, pp. 226–239, 2013. link pdf
  33. Juan A. Garay, Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas Rational Protocol Design: Cryptography Against Incentive-driven Adversaries Foundations of Computer Science, IEEE Press, 2013. link pdf eprint
  34. Markulf Kohlweiss, Ueli Maurer, Cristina Onete, Björn Tackmann, and Daniele Venturi Anonymity-Preserving Public-Key Encryption: A Constructive Approach PETS 2013, Springer, LNCS, vol. 7981, pp. 19–39, 2013. link pdf eprint
  35. Jonathan Katz, Ueli Maurer, Björn Tackmann, and Vassilis Zikas Universally Composable Synchronous Computation Theory of Cryptography — TCC 2013, Springer, LNCS, vol. 7785, pp. 477–498, 2013. link pdf eprint
  36. Ueli Maurer and Björn Tackmann Synchrony Amplification Information Theory Proceedings, IEEE Press, 2012. link pdf
  37. Ueli Maurer, Andreas Rüedlinger, and Björn Tackmann Confidentiality and Integrity: A Constructive Perspective Theory of Cryptography — TCC 2012, Springer, LNCS, vol. 7194, pp. 209–229, 2012. link pdf
  38. Ueli Maurer and Björn Tackmann On the Soundness of Authenticate-then-Encrypt: Formalizing the Malleability of Symmetric Encryption ACM Conference on Computer and Communications Security, ACM Press, pp. 505–515, 2010. link pdf

Contact

Björn Tackmann
DFINITY Foundation
Genferstrasse 11
8002 Zürich
Switzerland

bjoern -at- dfinity -dot- org