Máté obtained his MSc diploma in computer science in the Security and Privacy program of EIT ICT Labs (called EIT Digital now) at the University of Trento (Italy) and Eötvös Loránd University (Hungary).
His bachelor degree is in mathematics from the Budapest University of Technology and Economics.
During his PhD studies, he has been doing research in the CrySyS Lab. under the guidance of Levente Buttyán. He obtained the PhD degree in May, 2021.
Currently, he is a post-doctoral researcher hosted by Tibor Jager.
Research interests:
My primary interests are in cryptography, especially in public-key cryptography. I am fascinated by the open questions of securing functionalities and by the related cryptographic primitives such as indistinguishability obfuscation, functional encryption, private function evaluation etc. I am also interested in privacy problems posed by the spread of IoT devices or the advancement of machine learning. Moreover, I would like to learn more about how to solve the above problems in a post-quantum secure way.
News:
- Our analysis of WhatsApp's E2EE backup protocol was published at CRYPTO'23 (joint work with Gareth T. Davies, Sebastian Faller, Kai Gellert, Tobias Handirk, Julia Hesse, and Tibor Jager)
- Our joint work with István András Seres and Péter Burcsi on the Legendre PRF is published in AAECC. Any feedback is welcome!
- From January 2022, I have started a new job in the ITSC research group of Tibor Jager.
- I have successfully defended my PhD theses! Thanks for everyone who supported me during this adventurous journey.
Our book on the first two generations of cryptographic obfuscation has just been published as part of the SpringerBriefs in Computer Science series.
You can order the softcover or eBook version here.
For the manuscript click here!
Almost every book contains errors, and this one will hardly be an exception. Please let me know about any errors you find. I will maintain an errata here.
|
Publications and Talks:
Conferences and Workshops
G. T. Davies, S. Faller, K. Gellert, T. Handirk, J. Hesse, M. Horváth, T. Jager
Security Analysis of the WhatsApp End-to-End Encrypted Backup Protocol,
Advances in Cryptology – CRYPTO 2023,
In LNCS. vol. 14084 (pp. 330–361). Springer, Cham.
Springer Link,
PDF (ePrint),
Bibtex
G. Biczók, M. Horváth, Sz. Szebeni, I. Lám and L. Buttyán
The cost of having been pwned: a security service provider's perspective,
In: Saracino A., Mori P. (eds) Emerging Technologies for Authorization and Authentication (ETAA@ESORICS 2020), LNCS, vol 12515 (pp 154-167). Springer Cham
Springer Link,
PDF,
Bibtex
M. Horváth, L. Buttyán, G. Székely and D. Neubrandt
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation,
22nd Annual International Conference on Information Security and Cryptology (ICISC 2019), In LNCS vol. 11975 (pp 133-149). Springer Cham
Springer Link,
PDF,
Bibtex,
Slides
M. Horváth, L. Buttyán
Problem Domain Analysis of IoT-Driven Secure Data Markets,
In: Gelenbe E. et al. (eds) Security in Computer and Information Sciences. Euro-CYBERSEC 2018.
Communications in Computer and Information Science, vol. 821 (pp 57-67). Springer, Cham
Springer Link,
PDF,
Bibtex
M. Horváth, I. Vajda
Searchable Symmetric Encryption: Sequential Scan Can Be Practical,
The 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2017).
IEEE Xplore,
PDF (manuscript),
Bibtex
M. Horváth
Attribute-Based Encryption Optimized for Cloud Computing,
SOFSEM 2015: Theory and Practice of Computer Science,
In LNCS. vol. 8939 (pp. 566-577). Springer Berlin Heidelberg.
Springer Link,
PDF (ePrint),
Bibtex
M. Horváth
Private Key Delegation in Attribute-Based Encryption,
Mesterpróba: Conference of the Budapest University of Technology and Economics for Garaduating Msc and First Year Phd Students, 2015
PDF,
Bibtex
Journals
I. A. Seres, M. Horváth, P. Burcsi
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications,
Applicable Algebra in Engineering, Communication and Computing (AAECC), 2023
Springer Link,
ePrint,
Bibtex,
M. Horváth, I. Vajda
Searchable Symmetric Encryption for Restricted Search,
(Revised and extended version of the conference publication, entitled "Searchable Symmetric Encryption: Sequential Scan Can Be Practical")
Journal of Communications Software and Systems, Volume 14, No 1, 2018
PDF,
Bibtex
M. Horváth
Attribute-Based Encryption Optimized for Cloud Computing,
(Extended version of the conference publication with the same title)
Infocommunications Journal, Volume 7, Issue 2, 1 June 2015, Pages 1-9
PDF,
Bibtex
Book
M. Horváth, L. Buttyán
Cryptographic Obfuscation: A Survey,
SpringerBriefs in Computer Science, ISBN 978-3-319-98040-9, 2020
Order,
Manuscript,
Bibtex,
Errata
Miscellaneous
Title: Controlled Private Function Evaluation from Functional Encryption,
Colloquium of the PriSec Group at Karlstad University
Karlstad (Sweden), 23rd August 2018.
Title: Revocation in Distributed ABE-based Secure Storage using Indistinguishability Obfuscation,
15-th Central European Conference on Cryptology (CECC)
Klagenfurt (Austria), 10th July 2015.
M. Horváth
Programok titkai -- A kriptográfiai obfuszkáció születése (In Hungarian),
In: Élet és Tudomány, ISSN 0013-6077, 2018. (73. évf.), 34. sz., 1065-1067. p.
PDF,
Bibtex,
Radio interview with me about the paper (in Hungarian)
Blog posts on post-quantum cryptography:
|