Máté obtained his MSc diploma in computer science in the Security and Privacy program of EIT ICT Labs at the University of Trento (Italy) and Eötvös Loránd University (Hungary).
His bachelor degree is in mathematics from the Budapest University of Technology and Economics.
He has been doing research in the CrySyS Lab. under the guidance of prof. Levente Buttyán since 2014.
Publications and Talks:
Conferences:M. Horváth, I. Vajda
Searchable Symmetric Encryption: Sequential Scan Can Be Practical,The 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2017).
IEEE Xplore, PDF (manuscript), Bibtex
Attribute-Based Encryption Optimized for Cloud Computing,SOFSEM 2015: Theory and Practice of Computer Science, In LNCS. vol. 8939 (pp. 566-577). Springer Berlin Heidelberg.
Springer Link, PDF (ePrint), Bibtex
Private Key Delegation in Attribute-Based Encryption,Mesterpróba: Conference of the Budapest University of Technology for Garaduating Msc. and First Year Phd. Students, 2015
Attribute-Based Encryption Optimized for Cloud Computing,(Extended version of the conference publication with the same title)
Infocommunications Journal, Volume 7, Issue 2, 1 June 2015, Pages 1-9
M. Horváth, I. Vajda
Searchable Symmetric Encryption for Restricted Search,(Revised and extended version of the conference publication, entitled "Searchable Symmetric Encryption: Sequential Scan Can Be Practical")
Journal of Communications Software and Systems, Volume 14, No 1, 2018
Workshops:M. Horváth, L. Buttyán
Problem Domain Analysis of IoT-Driven Secure Data Markets,TO APPEAR IN: Gelenbe,E.,Campegiani,P., Czachorski, T., Katsikas, S., Komnios, I., Romano, L., Tzovaras, D. (eds.)
Recent Cyber-security Research in Europe: Proceedings of the 2018 ISCIS Security Workshop, Imperial College London.
Lecture Notes CCIS No. 821, Springer Verlag (2018)
Manuscripts:M. Horváth, L. Buttyán
The Birth of Cryptographic Obfuscation -- A Survey,Cryptology ePrint Archive: Report 2015/412
Talks:Title: Revocation in Distributed ABE-based Secure Storage using Indistinguishability Obfuscation
15-th Central European Conference on Cryptology (CECC)
Klagenfurt (Austria), 10th July 2015.