Green, Matthew

Associate Professor
Computer Science
http://spar.isi.jhu.edu/~mgreen/

Malone 160
(410) 516-3871
mgreen47@jhu.edu

Jump to:

News

About

Education
  • Ph.D. 2008, The Johns Hopkins University
Research Areas
  • Anonymous electronic cash
  • Anonymous electronic identification
  • Applied cryptography
  • Atrribute Based Encryption
  • Automation techniques to assist in the design and deployment of advnaced cryptographic protocols
  • Cryptograhic protocols
  • Cryptographic engineering
  • Cryptographic protocols
  • Cryptographic systems
  • Cryptographic tools, including Charm, a framework for rapidly prototyping cryptosystems
  • Encryption
  • Functional encryption library
  • Privacy-preserving cryptograhic protocols
  • Protocols that allow users to access databases without revealing which data they're accessing
  • Reverse-engineering deployed systems
Awards
  • 2007:  Award for Outstanding Research in Privacy Enhancing Technologies (PET award)

Publications

Journal Articles
  • Chator A, Green M (2018).  How to Squeeze a Crowd: Reducing Bandwidth in Mixing Cryptocurrencies.  Proceedings - 3rd IEEE European Symposium on Security and Privacy Workshops, EURO S and PW 2018.
  • Chator A, Green M (2018).  Don’t talk to strangers on the challenges of intelligent vehicle authentication.  VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems.  2018-March.
  • Green M, Miers I (2017).  Bolt: Anonymous payment channels for decentralized currencies.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Choudhuri AR, Green M, Jain A, Kaptchuk G, Miers I (2017).  Fairness in an unfair world: Fair multiparty computation from public bulletin boards.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Ye KQ, Green M, Sanguansin N, Beringer L, Petcher A, Appel AW (2017).  Verified correctness and security of mbed TLS HMAC-DRBG.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Kaptchuk G, Green M, Rubin A (2017).  Outsourcing medical dataset analysis: A possible solution.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  10322 LNCS.
  • Garman C, Green M, Miers I (2017).  Accountable privacy for decentralized anonymous payments.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  9603 LNCS.
  • Chiesa A, Green M, Liu J, Miao P, Miers I, Mishra P (2017).  Decentralized anonymous micropayments.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  10211 LNCS.
  • Checkoway S, Maskiewicz J, Garman C, Fried J, Cohney S, Green M, Heninger N, Weinmann RP, Rescorla E, Shacham H (2016).  A systematic analysis of the Juniper Dual EC incident.  Proceedings of the ACM Conference on Computer and Communications Security.  24-28-October-2016.
  • Green M, Ladd W, Miers I (2016).  A protocol for privately reporting ad impressions at scale.  Proceedings of the ACM Conference on Computer and Communications Security.  24-28-October-2016.
  • Green M, Smith M (2016).  Developers are Not the Enemy!: The Need for Usable Security APIs.  IEEE Security and Privacy.  14(5).
  • Bhargavan K, Brzuska C, Fournet C, Green M, Kohlweiss M, Zanella-Beguelin S (2016).  Downgrade Resilience in Key-Exchange Protocols.  Proceedings - 2016 IEEE Symposium on Security and Privacy, SP 2016.
  • Green MD, Katz J, Malozemoff AJ, Zhou HS (2016).  A unified approach to idealized model separations via indistinguishability obfuscation.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  9841 LNCS.
  • Adrian D, Bhargavan K, Durumeric Z, Gaudry P, Green M, Halderman JA, Heninger N, Springall D, Thomé E, Valenta L, VanderSloot B, Wustrow E, Zanella-Béguelin S, Zimmermann P (2015).  Imperfect forward secrecy: How diffie-hellman fails in practice.  Proceedings of the ACM Conference on Computer and Communications Security.  2015-October.
  • Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ (2015).  Keys under doormats: Mandating insecurity by requiring government access to all data and communications.  Journal of Cybersecurity.  1(1).
  • Abelson H, Anderson R, Bellovin SM, Benaloh J, Blaze M, Diffie W, Gilmore J, Green M, Landau S, Neumann PG, Rivest RL, Schiller JI, Schneier B, Specter MA, Weitzner DJ (2015).  Inside risks: Keys under doormats.  Communications of the ACM.  58(10).
  • Green MD, Miers I (2015).  Forward secure asynchronous messaging from puncturable encryption.  Proceedings - IEEE Symposium on Security and Privacy.  2015-July.
  • Ben-Sasson E, Chiesa A, Green M, Tromer E, Virza M (2015).  Secure sampling of public parameters for succinct zero knowledge proofs.  Proceedings - IEEE Symposium on Security and Privacy.  2015-July.
  • Green M (2015).  From strong mathematics to weak cryptography.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  9092.
  • Akinyele JA, Green M, Hohenberger S, Pagano M (2014).  Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes.  Journal of Computer Security.  22(6).
  • Ben-Sasson E, Chiesa A, Garman C, Green M, Miers I, Tromer E, Virza M (2014).  Zerocash: Decentralized anonymous payments from bitcoin.  Proceedings - IEEE Symposium on Security and Privacy.
  • Malozemoff AJ, Katz J, Green MD (2014).  Automated analysis and synthesis of block-cipher modes of operation.  Proceedings of the Computer Security Foundations Workshop.  2014-January.
  • Garman C, Green M, Miers I, Rubin AD (2014).  Rational zero: Economic security for zerocoin with everlasting anonymity.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  8438.
  • Akinyele JA, Green M, Hohenberger S (2013).  Using SMT solvers to automate design tasks for encryption and signature schemes.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Miers I, Garman C, Green M, Rubin AD (2013).  Zerocoin: Anonymous distributed e-cash from bitcoin.  Proceedings - IEEE Symposium on Security and Privacy.
  • Akinyele JA, Garman C, Miers I, Pagano MW, Rushanan M, Green M, Rubin AD (2013).  Charm: A framework for rapidly prototyping cryptosystems.  Journal of Cryptographic Engineering.  3(2).
  • Green M (2013).  The threat in the cloud.  IEEE Security and Privacy.  11(1).
  • Akinyele JA, Green M, Hohenberger S, Pagano MW (2012).  Machine-generated algorithms, proofs and software for the batch verification of digital signature schemes.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Cash D, Green M, Hohenberger S (2012).  New definitions and separations for circular security.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  7293 LNCS.
  • Akinyele JA, Pagano MW, Green MD, Lehmann CU, Peterson ZNJ, Rubin AD (2011).  Securing electronic medical records using attribute-based encryption on mobile devices.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Coull SE, Green M, Hohenberger S (2011).  Access controls for oblivious and anonymous systems.  ACM Transactions on Information and System Security.  14(1).
  • Green M, Hohenberger S (2011).  Practical adaptive oblivious transfer from simple assumptions.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  6597 LNCS.
  • Green M (2011).  Secure blind decryption.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  6571 LNCS.
  • Ahn JH, Green M, Hohenberger S (2010).  Synchronized aggregate signatures: New definitions, constructions and applications.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Gardner RW, Garera S, Pagano MW, Green M, Rubin AD (2009).  Securing medical records on smart phones.  Proceedings of the ACM Conference on Computer and Communications Security.
  • Ferrara AL, Green M, Hohenberger S, Pedersen MO (2009).  Practical short signature batch verification.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  5473.
  • Coull S, Green M, Hohenberger S (2009).  Controlling access to an oblivious database using stateful anonymous credentials.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  5443.
  • Green M, Hohenberger S (2008).  Universally composable adaptive oblivious transfer.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  5350 LNCS.
  • Green M, Ateniese G (2007).  Identity-based proxy re-encryption.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  4521 LNCS.
  • Green M, Hohenberger S (2007).  Blind identity-based encryption and simulatable oblivious transfer.  Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics).  4833 LNCS.
  • Bono S, Rubin A, Stubblefield A, Green M (2006).  Security through legality.  Communications of the ACM.  49(6).
  • Ateniese G, Fu K, Green M, Hohenberger S (2006).  Improved proxy re-encryption schemes with applications to secure distributed storage.  ACM Transactions on Information and System Security.  9(1).
Other Publications
  • Martin PD, Rushanan M, Checkoway S, Rubin A, Green M (2013).  Classifying Network Protocol Implementation Versions: An OpenSSL Case Study.  Johns Hopkins University Department of Computer Science.  (13-01).
Conference Proceedings
  • Checkoway S, Fredrikson M, Niederhagen R, Everspaugh A, Green M, Lange T, Ristenpart T, Bernstein DJ, Maskiewicz J, Shacham H (2014).  On the Practical Exploitability of DualEC in TLS Implementations.  Proceedings of the USENIX Security Symposium 2014.  USENIX.
  • Garman C, Green M, Miers I, Rubin A (2014).  Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity.  1st Workshop on Bitcoin Research.
Back to top