default search action
Jan Camenisch
Person information
- affiliation: IBM Research Zurich, Switzerland
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2022
- [c136]Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams:
Internet Computer Consensus. PODC 2022: 81-91 - 2021
- [c135]Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:
Concise UC Zero-Knowledge Proofs for Oblivious Updatable Databases. CSF 2021: 1-16 - [i66]Jan Camenisch, Manu Drijvers, Timo Hanke, Yvonne-Anne Pignolet, Victor Shoup, Dominic Williams:
Internet Computer Consensus. IACR Cryptol. ePrint Arch. 2021: 632 (2021) - 2020
- [c134]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. AFT 2020: 255-267 - [c133]Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Zone Encryption with Anonymous Authentication for V2V Communication. EuroS&P 2020: 405-424 - [c132]Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner:
Efficient Post-quantum SNARKs for RSIS and RLWE and Their Applications to Privacy. PQCrypto 2020: 247-267 - [c131]Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Short Threshold Dynamic Group Signatures. SCN 2020: 401-423 - [i65]Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Short Threshold Dynamic Group Signatures. IACR Cryptol. ePrint Arch. 2020: 16 (2020) - [i64]Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa:
Zone Encryption with Anonymous Authentication for V2V Communication. IACR Cryptol. ePrint Arch. 2020: 43 (2020) - [i63]Cecilia Boschini, Jan Camenisch, Max Ovsiankin, Nicholas Spooner:
Efficient Post-Quantum SNARKs for RSIS and RLWE and their Applications to Privacy. IACR Cryptol. ePrint Arch. 2020: 1190 (2020)
2010 – 2019
- 2019
- [j17]Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough, Paulo Martins, Leonel Sousa:
More efficient, provably-secure direct anonymous attestation from lattices. Future Gener. Comput. Syst. 99: 425-458 (2019) - [j16]Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya:
On the Impossibility of Structure-Preserving Deterministic Primitives. J. Cryptol. 32(1): 239-264 (2019) - [c130]Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. ACNS 2019: 442-462 - [c129]Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. ASIACRYPT (3) 2019: 191-221 - [c128]Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. Financial Cryptography 2019: 337-356 - [c127]Jan Camenisch, Maria Dubovitskaya, Patrick Towa:
Efficient Fully Secure Leakage-Deterring Encryption. IMACC 2019: 102-127 - [c126]Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny:
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. SEC 2019: 286-298 - [i62]Jan Camenisch, Ralf Küsters, Anna Lysyanskaya, Alessandra Scafuro:
Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl Seminar 19042). Dagstuhl Reports 9(1): 88-103 (2019) - [i61]Jan Camenisch, Manu Drijvers, Björn Tackmann:
Multi-Protocol UC and its Use for Building Modular and Efficient Protocols. IACR Cryptol. ePrint Arch. 2019: 65 (2019) - [i60]Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu:
Password-Authenticated Public-Key Encryption. IACR Cryptol. ePrint Arch. 2019: 199 (2019) - [i59]Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti:
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. IACR Cryptol. ePrint Arch. 2019: 438 (2019) - [i58]Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny:
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. IACR Cryptol. ePrint Arch. 2019: 460 (2019) - [i57]Elli Androulaki, Jan Camenisch, Angelo De Caro, Maria Dubovitskaya, Kaoutar Elkhiyaoui, Björn Tackmann:
Privacy-preserving auditable token payments in a permissioned blockchain system. IACR Cryptol. ePrint Arch. 2019: 1058 (2019) - [i56]Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch:
iUC: Flexible Universal Composability Made Simple. IACR Cryptol. ePrint Arch. 2019: 1073 (2019) - [i55]Jan Camenisch, Maria Dubovitskaya, Patrick Towa:
Efficient Fully Secure Leakage-Deterring Encryption. IACR Cryptol. ePrint Arch. 2019: 1472 (2019) - 2018
- [c125]Cecilia Boschini, Jan Camenisch, Gregory Neven:
Floppy-Sized Group Signatures from Lattices. ACNS 2018: 163-182 - [c124]Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven:
The Wonderful World of Global Random Oracles. EUROCRYPT (1) 2018: 280-312 - [c123]Cecilia Boschini, Jan Camenisch, Gregory Neven:
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs. ISC 2018: 3-22 - [e17]Jan Camenisch, Panos Papadimitratos:
Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings. Lecture Notes in Computer Science 11124, Springer 2018, ISBN 978-3-030-00433-0 [contents] - [e16]Carlisle Adams, Jan Camenisch:
Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10719, Springer 2018, ISBN 978-3-319-72564-2 [contents] - [i54]Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven:
The Wonderful World of Global Random Oracles. IACR Cryptol. ePrint Arch. 2018: 165 (2018) - [i53]Nada El Kassem, Liqun Chen, Rachid El Bansarkhani, Ali El Kaafarani, Jan Camenisch, Patrick Hough:
L-DAA: Lattice-Based Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2018: 401 (2018) - [i52]Cecilia Boschini, Jan Camenisch, Gregory Neven:
Floppy-Sized Group Signatures from Lattices. IACR Cryptol. ePrint Arch. 2018: 453 (2018) - 2017
- [c122]Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. ACISP (1) 2017: 437-452 - [c121]Jan Camenisch, Manu Drijvers, Maria Dubovitskaya:
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain. CCS 2017: 683-699 - [c120]Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation with Subverted TPMs. CRYPTO (3) 2017: 427-461 - [c119]Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:
UC-Secure Non-interactive Public-Key Encryption. CSF 2017: 217-233 - [c118]Jan Camenisch, Anja Lehmann:
Privacy-Preserving User-Auditable Pseudonym Systems. EuroS&P 2017: 269-284 - [c117]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. EuroS&P 2017: 301-315 - [c116]Christian Cachin, Jan Camenisch, Eduarda Freire-Stögbuchner, Anja Lehmann:
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. Financial Cryptography 2017: 59-75 - [c115]Jan Camenisch:
Directions in Security Research. DCNET 2017: 7 - [c114]Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures. Public Key Cryptography (2) 2017: 152-182 - [c113]Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IEEE Symposium on Security and Privacy 2017: 901-920 - [c112]Gregory Neven, Gianmarco Baldini, Jan Camenisch, Ricardo Neisse:
Privacy-preserving attribute-based credentials in cooperative intelligent transport systems. VNC 2017: 131-138 - [i51]Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2017: 11 (2017) - [i50]Jan Camenisch, Anja Lehmann:
Privacy for Distributed Databases via (Un)linkable Pseudonyms. IACR Cryptol. ePrint Arch. 2017: 22 (2017) - [i49]Foteini Baldimtsi, Jan Camenisch, Maria Dubovitskaya, Anna Lysyanskaya, Leonid Reyzin, Kai Samelin, Sophia Yakoubov:
Accumulators with Applications to Anonymity-Preserving Revocation. IACR Cryptol. ePrint Arch. 2017: 43 (2017) - [i48]Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation with Subverted TPMs. IACR Cryptol. ePrint Arch. 2017: 200 (2017) - [i47]Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Pöhls, Kai Samelin, Daniel Slamanig:
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures. IACR Cryptol. ePrint Arch. 2017: 445 (2017) - [i46]Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian:
One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IACR Cryptol. ePrint Arch. 2017: 639 (2017) - [i45]Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann:
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. IACR Cryptol. ePrint Arch. 2017: 695 (2017) - [i44]Cecilia Boschini, Jan Camenisch, Gregory Neven:
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs. IACR Cryptol. ePrint Arch. 2017: 1123 (2017) - 2016
- [c111]Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. ASIACRYPT (2) 2016: 807-840 - [c110]Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. CRYPTO (3) 2016: 208-239 - [c109]Jan Camenisch, Manu Drijvers, Anja Lehmann:
Universally Composable Direct Anonymous Attestation. Public Key Cryptography (2) 2016: 234-264 - [c108]Jan Camenisch, Robert R. Enderlein, Ueli Maurer:
Memory Erasability Amplification. SCN 2016: 104-125 - [c107]Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:
Virtual Smart Cards: How to Sign with a Password and a Server. SCN 2016: 353-371 - [c106]Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. TRUST 2016: 1-20 - [c105]Jan Camenisch, Manu Drijvers, Jan Hajny:
Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs. WPES@CCS 2016: 123-133 - [e15]Jan Camenisch, Dogan Kesdogan:
Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised Selected Papers. Lecture Notes in Computer Science 9591, Springer 2016, ISBN 978-3-319-39027-7 [contents] - [e14]David Aspinall, Jan Camenisch, Marit Hansen, Simone Fischer-Hübner, Charles D. Raab:
Privacy and Identity Management. Time for a Revolution? - 10th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers. IFIP Advances in Information and Communication Technology 476, Springer 2016, ISBN 978-3-319-41762-2 [contents] - [i43]Jan Camenisch, Robert R. Enderlein, Stephan Krenn, Ralf Küsters, Daniel Rausch:
Universal Composition with Responsive Environments. IACR Cryptol. ePrint Arch. 2016: 34 (2016) - [i42]Jan Camenisch, Maria Dubovitskaya, Alfredo Rial:
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. IACR Cryptol. ePrint Arch. 2016: 581 (2016) - [i41]Jan Camenisch, Manu Drijvers, Anja Lehmann:
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. IACR Cryptol. ePrint Arch. 2016: 663 (2016) - [i40]Jan Camenisch, Robert R. Enderlein, Ueli Maurer:
Memory Erasability Amplification. IACR Cryptol. ePrint Arch. 2016: 706 (2016) - 2015
- [j15]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. J. Cryptol. 28(2): 351-395 (2015) - [c104]Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven:
Recovering Lost Device-Bound Credentials. ACNS 2015: 307-327 - [c103]Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss:
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions. ASIACRYPT (2) 2015: 262-288 - [c102]Jan Camenisch, Anja Lehmann, Gregory Neven:
Optimal Distributed Password Verification. CCS 2015: 182-194 - [c101]Jan Camenisch, Anja Lehmann:
(Un)linkable Pseudonyms for Governmental Databases. CCS 2015: 1467-1479 - [c100]Jan Camenisch, Robert R. Enderlein, Gregory Neven:
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. Public Key Cryptography 2015: 283-307 - [c99]Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen:
Formal Treatment of Privacy-Enhancing Credential Systems. SAC 2015: 3-24 - [c98]Jan Camenisch, Diego Alejandro Ortiz-Yepes, Franz-Stefan Preiss:
Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones. WPES@CCS 2015: 37-48 - [p13]Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri:
An Architecture for Privacy-ABCs. Attribute-based Credentials for Trust 2015: 11-78 - [p12]Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Anja Lehmann, Gregory Neven, Franz-Stefan Preiss:
Cryptographic Protocols Underlying Privacy-ABCs. Attribute-based Credentials for Trust 2015: 79-108 - [p11]Kai Rannenberg, Jan Camenisch, Ahmad Sabouri, Welderufael Tesfay:
Further Challenges. Attribute-based Credentials for Trust 2015: 361-367 - [e13]Kai Rannenberg, Jan Camenisch, Ahmad Sabouri:
Attribute-based Credentials for Trust: Identity in the Information Society. Springer 2015, ISBN 978-3-319-14438-2 [contents] - [e12]Jan Camenisch, Simone Fischer-Hübner, Marit Hansen:
Privacy and Identity Management for the Future Internet in the Age of Globalisation - 9th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Patras, Greece, September 7-12, 2014, Revised Selected Papers. IFIP Advances in Information and Communication Technology 457, Springer 2015, ISBN 978-3-319-18620-7 [contents] - [i39]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
A Single Password for Everything? ERCIM News 2015(100) (2015) - [i38]Jan Camenisch, Robert R. Enderlein, Gregory Neven:
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. IACR Cryptol. ePrint Arch. 2015: 6 (2015) - [i37]Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss:
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions. IACR Cryptol. ePrint Arch. 2015: 580 (2015) - [i36]Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin:
Virtual Smart Cards: How to Sign with a Password and a Server. IACR Cryptol. ePrint Arch. 2015: 1101 (2015) - [i35]Jan Camenisch, Manu Drijvers, Anja Lehmann:
Universally Composable Direct Anonymous Attestation. IACR Cryptol. ePrint Arch. 2015: 1246 (2015) - 2014
- [j14]Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss:
Concepts and languages for privacy-preserving attribute-based authentication. J. Inf. Secur. Appl. 19(1): 25-44 (2014) - [c97]Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven:
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures. ASIACRYPT (1) 2014: 551-572 - [c96]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment. CRYPTO (2) 2014: 256-275 - [c95]Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial:
Privacy-Preserving Auditing for Attribute-Based Credentials. ESORICS (2) 2014: 109-127 - [c94]Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya:
On the Impossibility of Structure-Preserving Deterministic Primitives. TCC 2014: 713-738 - [c93]Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog:
Integration of Data-Minimising Authentication into Authorisation Systems. TRUST 2014: 179-187 - [e11]Sherman S. M. Chow, Jan Camenisch, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Information Security - 17th International Conference, ISC 2014, Hong Kong, China, October 12-14, 2014. Proceedings. Lecture Notes in Computer Science 8783, Springer 2014, ISBN 978-3-319-13256-3 [contents] - [i34]Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven:
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment. IACR Cryptol. ePrint Arch. 2014: 429 (2014) - [i33]Jan Camenisch, Anja Lehmann, Gregory Neven, Alfredo Rial:
Privacy-Preserving Auditing for Attribute-Based Credentials. IACR Cryptol. ePrint Arch. 2014: 468 (2014) - [i32]Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, Michael Østergaard Pedersen:
Formal Treatment of Privacy-Enhancing Credential Systems. IACR Cryptol. ePrint Arch. 2014: 708 (2014) - 2013
- [j13]Jan Camenisch, Costas Lambrinoudakis:
Guest editors' introduction. Math. Comput. Model. 57(7-8): 1577 (2013) - [c92]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter. DBSec 2013: 128-144 - [c91]Masayuki Abe, Jan Camenisch, Maria Dubovitskaya, Ryo Nishimaki:
Universally composable adaptive oblivious transfer (with access control) from standard assumptions. Digital Identity Management 2013: 1-12 - [c90]Jan Camenisch, Robert R. Enderlein, Victor Shoup:
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. ESORICS 2013: 19-37 - [c89]Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss:
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. IDMAN 2013: 34-52 - [c88]Jan Camenisch:
Concepts Around Privacy-Preserving Attribute-Based Credentials - Making Authentication with Anonymous Credentials Practical. Privacy and Identity Management 2013: 53-63 - [c87]Jan Camenisch:
Research Challenges to Secure the Future Internet. Secure Data Management 2013: 14-17 - [c86]Jan Camenisch, Günter Karjoth, Gregory Neven, Franz-Stefan Preiss:
Anonymously sharing Flickr pictures with facebook friends. WPES 2013: 13-24 - [i31]Jan Camenisch, Robert R. Enderlein, Victor Shoup:
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn. IACR Cryptol. ePrint Arch. 2013: 205 (2013) - 2012
- [j12]Jan Camenisch:
Information privacy?! Comput. Networks 56(18): 3834-3848 (2012) - [j11]Jan Camenisch, Anja Lehmann, Gregory Neven:
Electronic Identities Need Private Credentials. IEEE Secur. Priv. 10(1): 80-83 (2012) - [j10]Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen:
Batch Verification of Short Signatures. J. Cryptol. 25(4): 723-747 (2012) - [j9]Jan Camenisch, Thomas Groß:
Efficient Attributes for Anonymous Credentials. ACM Trans. Inf. Syst. Secur. 15(1): 4:1-4:30 (2012) - [c85]Jan Camenisch, Anna Lysyanskaya, Gregory Neven:
Practical yet universally composable two-server password-authenticated secret sharing. CCS 2012: 525-536 - [c84]Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer:
Data-Minimizing Authentication Goes Mobile. Communications and Multimedia Security 2012: 55-71 - [c83]Patrik Bichsel, Jan Camenisch, Dieter Sommer:
A calculus for privacy-friendly authentication. SACMAT 2012: 157-166 - [c82]Jan Camenisch, Gregory Neven, Markus Rückert:
Fully Anonymous Attribute Tokens from Lattices. SCN 2012: 57-75 - [c81]Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev:
Efficient Structure-Preserving Signature Scheme from Standard Assumptions. SCN 2012: 76-94 - [c80]Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Gregory Neven:
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. SCN 2012: 559-579 - [c79]Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters:
Computing on Authenticated Data. TCC 2012: 1-20 - [e10]Jan Camenisch, Dogan Kesdogan:
Open Problems in Network Security - IFIP WG 11.4 International Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised Selected Papers. Lecture Notes in Computer Science 7039, Springer 2012, ISBN 978-3-642-27584-5 [contents] - [e9]Jan Camenisch, Bruno Crispo, Simone Fischer-Hübner, Ronald Leenes, Giovanni Russello:
Privacy and Identity Management for Life - 7th IFIP WG 9.2, 9.6/11.7, 11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September 5-9, 2011, Revised Selected Papers. IFIP Advances in Information and Communication Technology 375, Springer 2012, ISBN 978-3-642-31667-8 [contents] - [i30]Jan Camenisch, Mark Manulis, Gene Tsudik, Rebecca N. Wright:
Privacy-Oriented Cryptography (Dagstuhl Seminar 12381). Dagstuhl Reports 2(9): 165-183 (2012) - [i29]Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello:
Fair Private Set Intersection with a Semi-trusted Arbiter.