Sarah Meiklejohn

About me

Bio

Photo of Sarah I joined UCL in September 2014 as a Lecturer (Assistant Professor) in the departments of Computer Science and Security and Crime Science. I am affiliated with the Information Security Group and have broad research interests in security and cryptography.
 
Before joining UCL, I received a PhD in Computer Science at the University of California, San Diego under the joint supervision of Mihir Bellare and Stefan Savage. During my PhD, I spent the summers of 2011 and 2013 at MSR Redmond, working in the cryptography group with Melissa Chase. In 2009, I obtained an Sc.M. in Computer Science from Brown University under the guidance of Anna Lysyanskaya. I also obtained an Sc.B. in Mathematics from Brown in 2008.  

Contact Info

s.meiklejohn [at] ucl [dot] ac [dot] uk
 
MPEB 6.06
Department of Computer Science
University College London
Gower Street
London WC1E 6BT

Research

Supervision

I am currently hiring for a postdoc position! Please look here for more details.

We welcome applications for a position as a postdoctoral researcher in cryptography. The successful candidate will work with Sarah Meiklejohn, George Danezis, and Jens Groth on zero-knowledge proofs and the privacy enhancement of distributed ledgers. The post has a flexible starting date and an initial duration of two years. Candidates must have (or be about to receive) a PhD. To enquire about the position, please feel free to contact me or Jens via email. To apply, please do so here.

I am fortunate enough to supervise the following lovely PhD students:

Publications

(Click year to show/hide)
[C = Conference] [J = Journal] [W = Workshop] [M = Miscellaneous]

2016

[C : CCS]
Transparency Overlays and Applications
Melissa Chase and Sarah Meiklejohn
ACM Conference on Computer and Communications Security
(To appear.)
[J : CACM]
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
Communications of the Association for Computing Machinery
[C : NDSS]
Centrally Banked Cryptocurrencies (slides)
George Danezis and Sarah Meiklejohn
Network and Distributed System Security Symposium
(This work has been featured in MIT Technology Review.)

2015

[C : PKC]
A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
Allison Lewko and Sarah Meiklejohn
IACR International Conference on Practice and Theory of Public-Key Cryptography
[W : Bitcoin]
Privacy-Enhancing Overlays in Bitcoin (slides)
Sarah Meiklejohn and Claudio Orlandi
The Second Workshop on Bitcoin Research

2014

[C : CCS]
Algebraic MACs and Keyed-Verification Anonymous Credentials
Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha
ACM Conference on Computer and Communications Security
[J : TCAD]
Leveraging Gate-Level Properties to Identify Hardware Timing Channels
Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and Ryan Kastner
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, September 2014
[C : CSF]
Malleable Signatures: New Definitions and Delegatable Anonymous Credentials
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
Computer Science Foundations Symposium
[C : Eurocrypt]
Key-Versatile Signatures and Applications: RKA, KDM, and Joint Enc/Sig
Mihir Bellare, Sarah Meiklejohn, and Susan Thomson
Eurocrypt
[C : Eurocrypt]
Déjà Q: Using Dual Systems to Revisit q-Type Assumptions (slides)
Melissa Chase and Sarah Meiklejohn
Eurocrypt
[M : Thesis]
Flexible Models for Secure Systems (slides)
UCSD Dissertation, April 2014
(This won UCSD's 2015 Chancellor's Dissertation Medal (see here and here). Thanks!)
[C : NDSS]
Botcoin: Monetizing Stolen Cycles
Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and Kirill Levchenko
Network and Distributed System Security Symposium
[C : CT-RSA]
Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions (slides)
Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, and Brent Waters
Cryptographer's Track at the RSA Conference

2013

[J : login]
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
USENIX ;login:, December 2013
[C : IMC]
A Fistful of Bitcoins: Characterizing Payments Among Men with No Names (slides)
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
Internet Measurement Conference
(This work has been featured in The New York Times, Wired, The Economist, Forbes, The Washington Post, and more.)
(One of two IMC papers fast-tracked for Transactions on Networking.)
[C : DATE]
A Practical Testing Framework for Isolating Hardware Timing Channels
Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and Ryan Kastner
Design, Automation, and Test in Europe
[C : TCC]
Succinct Malleable NIZKs and an Application to Compact Shuffles (slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
Theory of Cryptography Conference
[C : PKC]
Verifiable Elections That Scale for Free (slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
International Conference on Practice and Theory of Public-Key Cryptography

2012

[C : Eurocrypt]
Malleable Proof Systems and Applications (slides)
Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
Eurocrypt

2011

[C : Usenix Sec]
The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion (slides)
Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and Hovav Shacham
USENIX Security Symposium
[W : WOOT]
Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks (slides)
Keaton Mowery, Sarah Meiklejohn, and Stefan Savage
USENIX Workshop on Offensive Technologies

2010

[C : Asiacrypt]
Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures (slides)
Sarah Meiklejohn, Hovav Shacham, and David Mandell Freeman
Asiacrypt
[C : Usenix Sec]
ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash (slides)
Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, and Anna Lysyanskaya
USENIX Security Symposium
(The source code for this project can be found here, and the project homepage here.)

2009

[M : Thesis]
An Extension of the Groth-Sahai Proof System
Brown University Masters thesis, May 2009

Teaching

Activities

Events and schools

Conference (co-)chair

Programme committee member

Photo credit: Rosa Koolhoven