Matthew D. Green


Assistant Research Professor
Department of Computer Science
Johns Hopkins University

 


I am an Assistant Research Professor at the Johns Hopkins Information Security Institute. I completed my PhD in 2008 with advisors Susan Hohenberger and Avi Rubin.  My research includes techniques for privacy-enhanced information storage, anonymous payment systems, and bilinear map-based cryptography.  I was formerly a partner in Independent Security Evaluators, a custom security evaluation and design consultancy and I currently consult independently. From 1999-2003, I served as a senior technical staff member at AT&T Laboratories/Research in Florham Park, NJ. 

Research Interests

My research focus is in the area of applied cryptography. My recent work includes developing privacy-preserving cryptographic protocols such as anonymous electronic cash and protocols that allow users to access databases without revealing which data they're accessing. Additionally, I have been working on new automation techniques to assist in the design and deployment of advanced cryptographic protocols.

I also work in the area of cryptographic engineering. This work involves understanding the practical aspects of cryptographic systems, implementing cryptographic protocols, and in some cases reverse-engineering deployed systems. I teach an introductory course on this subject. Additionally, I've designed several cryptographic tools, including Charm, a framework for rapidly prototyping cryptosystems, and a Functional Encryption library that provides implementations of several new Attribute Based Encryption schemes.

Download my Curriculum Vitae.

Teaching

650.445, 600.454: Practical Cryptographic Systems.   Spring 2014. Previously: Fall 2012, Spring 2011, 2010, 2009.
600.642: Advanced Topics in Cryptography.   Fall 2011.

My Blog

A Few Thoughts on Cryptographic Engineering. Started as a lazy man's attempt to write a book on practical crypto topics, this has gradually taken on a life of its own.

Conference Papers

"On the Practical Exploitability of Dual EC in TLS Implementations".  S. Checkoway, M. Fredrikson, R. Niederhagen, M. Green, T. Lange, T. Ristenpart, D. J. Bernstein, J. Maskeiwicz, H. Shacham.  To appear in Usenix Security 2014. (Website) (PDF)

"Automated Analysis and Synthesis of Block-Cipher Modes of Operation".  M. Green, J. Katz, A. Malozemoff.  To appear in CSF 2014.

"Zerocash: Practical Decentralized Anonymous E-Cash from Bitcoin".  E. Ben-Sasson, A. Chiesa, C. Garman, M. Green, I. Miers, E. Tromer, M. Virza.  In IEEE Symposium on Security and Privacy (Oakland) 2014.

"Rational Zero: Economic Security for Zerocoin with Everlasting Anonymity".  C. Garman, M. Green, I. Miers, A. Rubin.  In First Workshop on Bitcoin Research (BITCOIN '14). (PDF)

"Decentralized Anonymous Credentials".  C. Garman, M. Green, I. Miers.  In NDSS 2014.

"Using SMT Solvers to Automate Design Tasks for Encryption and Signature Schemes".  A. Akinyele, M. Green, S. Hohenberger.  In ACM CCS 2013.

"Zerocoin: Anonymous Distributed e-Cash from Bitcoin".  I. Miers, C. Garman, M. Green, A. Rubin.  In IEEE Symposium on Security and Privacy (Oakland) 2013. (PDF)

"Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature. Schemes".  A. Akinyele, M. Green, S. Hohenberger, M. Pagano.  In CCS 2012. (Springer) (ePrint PDF)

"Vis-a-Vis Cryptography: Private and Trustworthy In-Person Certifications".  I. Miers, M. Green, C. Lehman, A. Rubin.  In Healthsec 2012. (PDF)

"New Definitions and Separations for Circular Security".  D. Cash, M. Green, S. Hohenberger.  In PKC 2012 (ePrint PDF)

"Self-Protecting Electronic Medical Records Using Attribute-Based Encryption".  J. A. Akinyele, C. Lehmann, M. Green, M. Pagano, Z. Peterson, A. Rubin.  In ACM CCS SPSM 2011 (ePrint PDF)

"Outsourcing the Decryption of ABE Ciphertexts".  M. Green, S. Hohenberger, B. Waters.  In Usenix Security 2011.

"A Research Roadmap for Healthcare IT Security Inspired by the PCAST Health Information Technology Report".  M. Green, A. Rubin.  In HealthSec 2011. (PDF)

"Practical Oblivious Transfer from Simple Assumptions".  M. Green, S. Hohenberger.  In TCC 2011. (ePrint draft, PDF)

"Secure Blind Decryption".  M. Green.  In PKC 2011. (ePrint PDF).

"Synchronized Aggregate Signatures".  J. H. Ahn, M. Green, S. Hohenberger.  In ACM CCS 2010. (eprint PDF)

"On the Practicality of Short Signature Batch Verification".  A. L. Ferrara, M. Green, S. Hohenberger, M. O. Pedersen.  In CT-RSA 2009. (ePrint PDF)

"Securing Medical Records on Smart Phones".  R. W. Gardner, S. Garera, M. W. Pagano, M. Green and A. Rubin.  In SPIMACS 2009.

"Controlling Access to an Oblivious Database using Stateful Anonymous Credentials".  S. Coull, M. Green, S. Hohenberger.  In PKC 2009(ePrint PDF)

"Universally Composable Adaptive Oblivious Transfer".  M. Green, S. Hohenberger.  In ASIACRYPT 2008(ePrint PDF)

"Blind Identity-Based Encryption and Simulatable Oblivious Transfer".  M. Green, S. Hohenberger.  ASIACRYPT 2007. (ePrint PDF) (conference PDF)

"Identity-Based Proxy Re-encryption".  M. Green, G. Ateniese.  In ACNS 2007. (ePrint PDF)

"Security Analysis of a Cryptographically-Enabled RFID Device".  S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, M. Szydlo.  14th USENIX Security Symposium, August 2005. (PDF). "Best Student Paper", Usenix Security 2005.

"Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage" (Conference version).  G. Ateniese, K. Fu, M. Green, S. Hohenberger.  Proceedings of the 12th Annual Network and Distributed Systems Security Symposium (NDSS 2005), San Diego, California, 2005. (Full Version PDF)

"PRISM, an IP-Based Architecture for Broadband Access to TV and Other Streaming Media"  A. Basso, C. Cranor, R. Gopalakrishnan, M. Green, C.R. Kalmanek, D. Shur, S. Sibal, C.J. Sreenan, J.E. van der Merwe.  Proceedings of IEEE International Workshop of Network and Operating System Support for Digital Audio and Video (NOSSDAV), June 2000.  (PDF)

Journal Publications

"Machine-Generated Algorithms, Proofs and Software for the Batch Verification of Digital Signature Schemes". A. Akinyele, M. Green, S. Hohenberger, M. Pagano.  To appear in Journal of Computer Security (JCS).

"Charm: A Framework for Rapidly Prototyping Cryptosystems". A. Akinyele, C. Garman, I. Miers, M. Pagano, M. Rushanan, M. Green, A. Rubin  In Journal of Cryptographic Engineering (JCEN).

"The Threat in the Cloud". M. Green.  In IEEE Security & Privacy Magazine (Spring 2013).

"Access Controls for Oblivious and Anonymous Systems". G. S. Coull, M. Green, S. Hohenberger.  In ACM Transactions on Information and System Security (TISSEC).

"Improved Proxy Re-encryption Schemes with Applications to Secure Distributed Storage". G. Ateniese, K. Fu, M. Green, S. Hohenberger.  ACM Transactions on Information and System Security (TISSEC), Volume 9, Issue 1, 2006. (ACM Portal)

"Security Through Legality".  S. Bono, A. Rubin, A. Stubblefield, M. Green.  Communications of the ACM (CACM), June 2006. 

"Prism Architecture: Supporting Enhanced Streaming Services in a Content Distribution Network".  C. Cranor, M. Green,C.Kalmanek, D. Shur, S. Sibal, K. van der Merwe.  IEEE Internet Computing,pp. 66-75, July/August 2001  (PDF)

Technical Reports and Submissions

"CPA and CCA-Secure Encryption Systems that are not 2-Circular Secure".  M. Green, S. Hohenberger.  (ePrint PDF)

"Correlation-Resistant Storage via Keyword-Searchable Encryption".  L. Ballard, M. Green, B. de Medeiros, F. Monrose.  Technical Report. (PDF)

"Content Protection for Optical Media".  M. Green.  2005. (PDF)

Other Writing

"The Daunting Challenge of Secure Email".  M. Green. In The New Yorker, Elements blog.  November 2013.

Thesis

"Cryptography for Secure and Private Databases: Enabling Practical Database Access without Compromising Privacy".  M. Green; Ph. D. Thesis (PDF)

Students

I am co-advising Christina Garman and Ian Miers. I previously advised Dr. Ayo Akinyele and Dr. Matthew Pagano.

Software Projects / Misc.

NIST FOIA. Results of a Freedom of Information Act (FOIA) request to NIST (by EFF/Matthew Stoller) seeking information on the alleged NSA subversion of the Dual EC DRBG algorithm in NIST Special Publication 800-90A.

libzerocoin. A C++ implementation of the core cryptographic routines for the Zerocoin protocol.

Charm: A framework for rapidly prototyping cryptosystems. A Python-based prototyping framework to assist cryptographers and researchers in the development of new cryptographic schemes and protocols.

The Functional Encryption Library. An implementation of several modern key-policy and ciphertext-policy Attribute-Based Encryption schemes, part of the FEATURES project.

"The JHU-MIT Proxy Re-cryptography Library". A C++ implementation of two proxy re-encryption schemes.

The Advanced Crypto Software Collection. A repository of advanced crypto implementations created the community at large. Curated by my student Matthew Pagano.

"The JHU-MIT Proxy Re-cryptography Library". A C++ implementation of two proxy re-encryption schem es.

"Art for Cryptographers". Not a software project at all -- a bit of wonderful graphic art for use in security presentations.

Program Committees

PKC 2015. Website and CFP (to come).
ACM CCS 2014. Website and CFP.
Financial Cryptography 2014. Website and CFP.
ICISC 2013. Website and CFP.
Usenix Security 2013. Website and CFP.
Usenix Security 2012. Website and CFP.
PKC 2012. Website and CFP.
Usenix Security 2011. Website and CFP.
CANS 2010. Website and CFP.
EC-Web 2010. Website and CFP.
ProvSec 2010. Website and CFP.
ICISC 2009. Website and CFP.
Pairing 2009. Website and CFP.
EC-Web 2009. Website and CFP.

Invited Talks

1.13.2014    Rutgers University. "Zerocash: Decentralized Anonymous Payments from Bitcoin".
1.13.2014    Real World Crypto (RWC '14). "Toward making Bitcoin Anonymous". (Video, Slides)
8.13.2013    Usenix Summit on Hot Topics in Security (HotSec '13). "What's wrong with cryptographic API design and what we can do to fix it". (Audio, Slides)
4.24.2013    Microsoft Research. "Zerocoin: Anonymous Distributed e-Cash from Bitcoin". (Video)
2.19.2013    Dartmouth College. "Cryptography is a Systems Problem (or Should we Deploy TLS?)". (Video)
7.19.2011    Microsoft Research. "Charm: A framework for rapidly prototyping cryptosystems". (Video)
9.15.2005    National Science Foundation. "Attacking and Defending RFID Security Systems".
"Award for Outstanding Research in Privacy Enhancing Technologies (PET award)", 2007. (press release).

Industry Experience

Co-founder, Independent Security Evaluators (ISE). Custom evaluation and design of security systems.

Senior Technical Staff Member, AT&T Laboratories/Research, Florham Park, NJ. 1999-2003. Conducted research and oversaw technology transfer for audio coding, secure content delivery and content distribution network projects.

Contact Information

Postal Mail: Matthew Green, JHU Information Security Institute, 3400 North Charles Street, 208 Maryland Hall, Baltimore, MD 21218
Phone: (410) 861-0344
Fax: (410) 516-8457

PGP Key

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG/MacGPG2 v2.0.22 (Darwin)
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=
=S2LJ
-----END PGP PUBLIC KEY BLOCK-----

 

Page last updated 4/22/2014