Sarah Meiklejohn

About Me

Bio

Photo of Sarah I am a Reader (Associate Professor) in Cryptography and Security at UCL, sitting in the departments of Computer Science and Security and Crime Science. I am affiliated with the Information Security Group and have broad research interests in security and cryptography. I am also a member of the Open Music Initiative and the Initiative for Cryptocurrencies and Contracts (IC3).
 
Before joining UCL, I received a PhD in Computer Science from the University of California, San Diego under the joint supervision of Mihir Bellare and Stefan Savage. During my PhD, I spent the summers of 2011 and 2013 at MSR Redmond, working in the cryptography group with Melissa Chase. I obtained an Sc.M. in Computer Science from Brown University under the guidance of Anna Lysyanskaya in 2009, and an Sc.B. in Mathematics from Brown in 2008.  

Contact

s.meiklejohn [at] ucl [dot] ac [dot] uk
 
MPEB 6.06
Department of Computer Science
University College London
Gower Street
London WC1E 6BT

Research

Projects

Supervision

I am hiring for a postdoc position in distributed ledgers (where you can interpret that term as liberally as you want)! For enquiries please feel free to email me, or just apply directly here.

I am fortunate to work with the following PhD students and postdocs:

Publications

(Click year to show/hide)
[C = Conference] [J = Journal] [W = Workshop] [M = Miscellaneous]

2018

[J : PETS] Möbius: Trustless Tumbling for Transaction Privacy
  • Sarah Meiklejohn and Rebekah Mercer
  • Proceedings on Privacy Enhancing Technologies
[W : BITCOIN] Egalitarian Society or Benevolent Dictatorship? The State of Cryptocurrency Governance
  • Sarah Azouvi, Mary Maller, and Sarah Meiklejohn
  • The Fifth Workshop on Bitcoin and Blockchain Research
[W : BITCOIN] Smart Contracts for Bribing Miners
  • Patrick McCorry, Alexander Hicks, and Sarah Meiklejohn
  • The Fifth Workshop on Bitcoin and Blockchain Research

2017

[W : CBT] Who Am I? Secure Identity Registration on Distributed Ledgers
  • Sarah Azouvi, Mustafa Al-Bassam, and Sarah Meiklejohn
  • International Workshop on Cryptocurrencies and Blockchain Technology

2016

[C : Asiacrypt] Déjà Q All Over Again: Tighter and Broader Reductions of q-Type Assumptions
  • Melissa Chase, Mary Maller, and Sarah Meiklejohn
  • Asiacrypt
[C : CCS] Transparency Overlays and Applications (slides)
  • Melissa Chase and Sarah Meiklejohn
  • ACM Conference on Computer and Communications Security
[J : CACM] A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
  • Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
  • Communications of the Association for Computing Machinery
[C : NDSS] Centrally Banked Cryptocurrencies (slides)
  • George Danezis and Sarah Meiklejohn
  • Network and Distributed System Security Symposium
  • (This work was featured in MIT Technology Review.)

2015

[C : PKC] A Profitable Sub-Prime Loan: Obtaining the Advantages of Composite Order in Prime-Order Bilinear Groups
  • Allison Lewko and Sarah Meiklejohn
  • IACR International Conference on Practice and Theory of Public-Key Cryptography
[W : BITCOIN] Privacy-Enhancing Overlays in Bitcoin (slides)
  • Sarah Meiklejohn and Claudio Orlandi
  • The Second Workshop on Bitcoin Research

2014

[C : CCS] Algebraic MACs and Keyed-Verification Anonymous Credentials
  • Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha
  • ACM Conference on Computer and Communications Security
[J : TCAD] Leveraging Gate-Level Properties to Identify Hardware Timing Channels
  • Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and Ryan Kastner
  • IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, September 2014
[C : CSF] Malleable Signatures: New Definitions and Delegatable Anonymous Credentials
  • Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
  • Computer Science Foundations Symposium
[C : Eurocrypt] Key-Versatile Signatures and Applications: RKA, KDM, and Joint Enc/Sig
  • Mihir Bellare, Sarah Meiklejohn, and Susan Thomson
  • Eurocrypt
[C : Eurocrypt] Déjà Q: Using Dual Systems to Revisit q-Type Assumptions (slides)
  • Melissa Chase and Sarah Meiklejohn
  • Eurocrypt
[M : Thesis] Flexible Models for Secure Systems (slides)
  • UCSD Dissertation, April 2014
  • (This won UCSD's 2015 Chancellor's Dissertation Medal (see here and here). Thanks!)
[C : NDSS] Botcoin: Monetizing Stolen Cycles
  • Danny Yuxing Huang, Hitesh Dharmdasani, Sarah Meiklejohn, Vacha Dave, Chris Grier, Damon McCoy, Stefan Savage, Nicholas Weaver, Alex C. Snoeren, and Kirill Levchenko
  • Network and Distributed System Security Symposium
[C : CT-RSA] Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions (slides)
  • Theresa Calderon, Sarah Meiklejohn, Hovav Shacham, and Brent Waters
  • Cryptographer's Track at the RSA Conference

2013

[J : login] A Fistful of Bitcoins: Characterizing Payments Among Men with No Names
  • Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage
  • USENIX ;login:, December 2013
[C : IMC] A Fistful of Bitcoins: Characterizing Payments Among Men with No Names (slides)
[C : DATE] A Practical Testing Framework for Isolating Hardware Timing Channels
  • Jason Oberg, Sarah Meiklejohn, Timothy Sherwood, and Ryan Kastner
  • Design, Automation, and Test in Europe
[C : TCC] Succinct Malleable NIZKs and an Application to Compact Shuffles (slides)
  • Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
  • Theory of Cryptography Conference
[C : PKC] Verifiable Elections That Scale for Free (slides)
  • Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
  • International Conference on Practice and Theory of Public-Key Cryptography

2012

[C : Eurocrypt] Malleable Proof Systems and Applications (slides)
  • Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Sarah Meiklejohn
  • Eurocrypt

2011

[C : Usenix Sec] The Phantom Tollbooth: Privacy-Preserving Electronic Toll Collection in the Presence of Driver Collusion (slides)
  • Sarah Meiklejohn, Keaton Mowery, Stephen Checkoway, and Hovav Shacham
  • USENIX Security Symposium
[W : WOOT] Heat of the Moment: Characterizing the Efficacy of Thermal Camera-Based Attacks (slides)
  • Keaton Mowery, Sarah Meiklejohn, and Stefan Savage
  • USENIX Workshop on Offensive Technologies

2010

[C : Asiacrypt] Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures (slides)
  • Sarah Meiklejohn, Hovav Shacham, and David Mandell Freeman
  • Asiacrypt
[C : Usenix Sec] ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash (slides)
  • Sarah Meiklejohn, C. Chris Erway, Alptekin Küpçü, Theodora Hinkle, and Anna Lysyanskaya
  • USENIX Security Symposium
  • (The source code for this project can be found here, and the project homepage here.)

2009

[M : Thesis] An Extension of the Groth-Sahai Proof System
  • Brown University Masters thesis, May 2009

Teaching

Activities

Events and schools

Program (co-)chair

Program committee member

Photo credit: Rosa Koolhoven