Máté obtained his MSc diploma in computer science in the Security and Privacy program of EIT ICT Labs (called EIT Digital now) at the University of Trento (Italy) and Eötvös Loránd University (Hungary). His bachelor degree is in mathematics from the Budapest University of Technology and Economics. During his PhD studies, he has been doing research in the CrySyS Lab. under the guidance of prof. Levente Buttyán. He obtained the PhD degree in May, 2021.
My primary interests are in cryptography, especially in public-key cryptography. I am fascinated by the open questions of securing functionalities and by the related cryptographic primitives such as indistinguishability obfuscation, functional encryption, private function evaluation etc. I am also interested in privacy problems posed by the spread of IoT devices or the advancement of machine learning. Moreover, I would like to learn more about how to solve the above problems in a post-quantum secure way.
Publications and Talks:
ManuscriptsI. A. Seres, M. Horváth, P. Burcsi
The Legendre Pseudorandom Function as a Multivariate Quadratic Cryptosystem: Security and Applications,Cryptology ePrint Archive, Report 2021/182
Conferences and WorkshopsG. Biczók, M. Horváth, Sz. Szebeni, I. Lám and L. Buttyán
The cost of having been pwned: a security service provider's perspective,In: Saracino A., Mori P. (eds) Emerging Technologies for Authorization and Authentication (ETAA@ESORICS 2020), LNCS, vol 12515 (pp 154-167). Springer Cham
Springer Link, PDF, Bibtex
M. Horváth, L. Buttyán, G. Székely and D. Neubrandt
There Is Always an Exception: Controlling Partial Information Leakage in Secure Computation,22nd Annual International Conference on Information Security and Cryptology (ICISC 2019), In LNCS vol. 11975 (pp 133-149). Springer Cham
Springer Link, PDF, Bibtex, Slides
M. Horváth, L. Buttyán
Problem Domain Analysis of IoT-Driven Secure Data Markets,In: Gelenbe E. et al. (eds) Security in Computer and Information Sciences. Euro-CYBERSEC 2018.
Communications in Computer and Information Science, vol. 821 (pp 57-67). Springer, Cham
Springer Link, PDF, Bibtex
M. Horváth, I. Vajda
Searchable Symmetric Encryption: Sequential Scan Can Be Practical,The 25th International Conference on Software, Telecommunications and Computer Networks (SoftCOM 2017).
IEEE Xplore, PDF (manuscript), Bibtex
Attribute-Based Encryption Optimized for Cloud Computing,SOFSEM 2015: Theory and Practice of Computer Science, In LNCS. vol. 8939 (pp. 566-577). Springer Berlin Heidelberg.
Springer Link, PDF (ePrint), Bibtex
Private Key Delegation in Attribute-Based Encryption,Mesterpróba: Conference of the Budapest University of Technology and Economics for Garaduating Msc and First Year Phd Students, 2015
JournalsM. Horváth, I. Vajda
Searchable Symmetric Encryption for Restricted Search,(Revised and extended version of the conference publication, entitled "Searchable Symmetric Encryption: Sequential Scan Can Be Practical")
Journal of Communications Software and Systems, Volume 14, No 1, 2018
Attribute-Based Encryption Optimized for Cloud Computing,(Extended version of the conference publication with the same title)
Infocommunications Journal, Volume 7, Issue 2, 1 June 2015, Pages 1-9
BookM. Horváth, L. Buttyán
Cryptographic Obfuscation: A Survey,SpringerBriefs in Computer Science, ISBN 978-3-319-98040-9, 2020
Order, Manuscript, Bibtex, Errata
Colloquium of the PriSec Group at Karlstad University
Karlstad (Sweden), 23rd August 2018.
Title: Revocation in Distributed ABE-based Secure Storage using Indistinguishability Obfuscation,
15-th Central European Conference on Cryptology (CECC)
Klagenfurt (Austria), 10th July 2015.
Programok titkai -- A kriptográfiai obfuszkáció születése (In Hungarian),In: Élet és Tudomány, ISSN 0013-6077, 2018. (73. évf.), 34. sz., 1065-1067. p.
PDF, Bibtex, Radio interview with me about the paper (in Hungarian)
Post-Quantum Cryptography: What and Why Needs to be Changed Soon?Microsec PKI Blog, CrySyS Blog
Post-Quantum Cryptography: The First StepsMicrosec PKI Blog, CrySyS Blog