I now have a shiny new website at University
College London! Please go there for up-to-date information.
I am a fifth-year PhD student in Computer Science at the
University of California, San
Diego, with broad research interests in security and cryptography.
I am a member of the
Security
and Cryptography Group and am jointly advised by
Mihir Bellare and
Stefan Savage.
Before coming to UCSD, I obtained an Sc.M. in Computer Science
from Brown University in 2009 under the guidance of
Anna Lysyanskaya. I
also obtained my Sc.B. in Mathematics from Brown in 2008. I
spent the summers of 2011 and 2013 at MSR Redmond,
working in the cryptography group with
Melissa Chase.
Malleable Signatures: New Definitions and
Delegatable Anonymous Credentials
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah
Meiklejohn
CSF 2014, to appear.
Key-Versatile Signatures and Applications:
RKA, KDM, and Joint Enc/Sig
Mihir Bellare, Sarah Meiklejohn, and Susan Thomson
Eurocrypt 2014.
Déjà Q: Using Dual Systems
to Revisit q-Type Assumptions (
slides)
Melissa Chase and Sarah Meiklejohn
Eurocrypt 2014.
Botcoin: Monetizing Stolen Cycles
Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris
Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and
Kirill Levchenko
NDSS 2014.
Rethinking Verifiably Encrypted Signatures: A
Gap in Functionality and Potential Solutions (
slides)
Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, and Brent Waters
CT-RSA 2014.
A Fistful of Bitcoins: Characterizing Payments
Among Men with No Names
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon
McCoy, Geoffrey M. Voelker, and Stefan Savage
USENIX ;login:, December 2013.
A Fistful of Bitcoins: Characterizing Payments
Among Men with No Names
(
slides)
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon
McCoy, Geoffrey M. Voelker, and Stefan Savage
IMC 2013.
A Practical Testing Framework for
Isolating Hardware Timing Channels
Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and Ryan
Kastner
DATE 2013.
Succinct Malleable NIZKs and an Application
to Compact Shuffles
(
slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and
Sarah Meiklejohn
TCC 2013.
Verifiable Elections That Scale for Free
(
slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and
Sarah Meiklejohn
PKC 2013.
Malleable Proof Systems and
Applications
(
slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and
Sarah Meiklejohn
Eurocrypt 2012.
The Phantom Tollbooth:
Privacy-Preserving Electronic Toll Collection in the
Presence of Driver Collusion
(
slides)
Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and
Hovav Shacham
USENIX Security 2011.
Heat of the Moment:
Characterizing the Efficacy of Thermal Camera-Based
Attacks
(
slides)
Keaton Mowery, Sarah Meiklejohn, and Stefan Savage
WOOT 2011.
Limitations on
Transformations from Composite-Order to Prime-Order
Groups: The Case of Round-Optimal Blind
Signatures
(
slides)
Sarah Meiklejohn, Hovav Shacham, and David Mandell
Freeman
Asiacrypt 2010.
ZKPDL: A Language-Based
System for Efficient Zero-Knowledge Proofs and
Electronic Cash
(
slides)
Sarah Meiklejohn, C. Chris Erway, Alptekin
Küpçü, Theodora
Hinkle, and Anna Lysyanskaya
USENIX Security 2010.
- The source code for this project can be found here,
and the project homepage here.
Flexible Models for Secure
Systems (
slides)
UCSD Dissertation, April 2014.
An Exploration of Group
and Ring Signatures (
slides)
UCSD Research Exam, February 2011.
An Extension of the
Groth-Sahai Proof System
Brown University Masters thesis, May 2009.