2009 | ||
---|---|---|
61 | EE | Jan Camenisch, Nishanth Chandran, Victor Shoup: A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks. EUROCRYPT 2009: 351-368 |
60 | EE | Jan Camenisch, Aggelos Kiayias, Moti Yung: On the Portability of Generalized Schnorr Proofs. EUROCRYPT 2009: 425-442 |
59 | EE | Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy: Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data. Public Key Cryptography 2009: 196-214 |
58 | EE | Jan Camenisch, Markulf Kohlweiss, Claudio Soriente: An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials. Public Key Cryptography 2009: 481-500 |
2008 | ||
57 | EE | Jan Camenisch, Thomas Groß: Efficient attributes for anonymous credentials. ACM Conference on Computer and Communications Security 2008: 345-356 |
56 | EE | Jan Camenisch, Rafik Chaabouni, Abhi Shelat: Efficient Protocols for Set Membership and Range Proofs. ASIACRYPT 2008: 234-252 |
55 | EE | Jan Camenisch, Thomas Groß, Thomas S. Heydt-Benjamin: Rethinking accountable privacy supporting services: extended abstract. Digital Identity Management 2008: 1-8 |
2007 | ||
54 | Jan Camenisch, Christian S. Collberg, Neil F. Johnson, Phil Sallee: Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers Springer 2007 | |
53 | EE | Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen: Batch Verification of Short Signatures. EUROCRYPT 2007: 246-263 |
52 | EE | Jan Camenisch, Gregory Neven, Abhi Shelat: Simulatable Adaptive Oblivious Transfer. EUROCRYPT 2007: 573-590 |
51 | EE | Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich: Endorsed E-Cash. IEEE Symposium on Security and Privacy 2007: 101-115 |
50 | EE | Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Groß, Dieter Sommer: User centricity: A taxonomy and open issues. Journal of Computer Security 15(5): 493-527 (2007) |
2006 | ||
49 | EE | Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich: How to win the clonewars: efficient periodic n-times anonymous authentication. ACM Conference on Computer and Communications Security 2006: 201-210 |
48 | EE | Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Groß, Dieter Sommer: User centricity: a taxonomy and open issues. Digital Identity Management 2006: 1-10 |
47 | EE | Jan Camenisch, Abhi Shelat, Dieter Sommer, Roger Zimmermann: Securing user inputs for the web. Digital Identity Management 2006: 33-44 |
46 | EE | Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya: Balancing Accountability and Privacy Using E-Cash (Extended Abstract). SCN 2006: 141-155 |
45 | EE | Jan Camenisch: Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. SEC 2006: 135-147 |
44 | EE | Jan Camenisch, Dieter Sommer, Roger Zimmermann: A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures. SEC 2006: 25-37 |
43 | EE | Jan Camenisch: Anonymous Credentials: Opportunities and Challenges. SEC 2006: 460 |
42 | EE | Jan Camenisch, Thomas Groß, Dieter Sommer: Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. WPES 2006: 67-72 |
41 | EE | Jan Camenisch, Maciej Koprowski: Fine-grained forward-secure signature schemes without random oracles. Discrete Applied Mathematics 154(2): 175-188 (2006) |
2005 | ||
40 | EE | Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros: Untraceable RFID tags via insubvertible encryption. ACM Conference on Computer and Communications Security 2005: 92-101 |
39 | EE | Jan Camenisch, Anna Lysyanskaya: A Formal Treatment of Onion Routing. CRYPTO 2005: 169-187 |
38 | EE | Jan Camenisch, Abhi Shelat, Dieter Sommer, Simone Fischer-Hübner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy C. Tseng: Privacy and identity management for everyone. Digital Identity Management 2005: 20-27 |
37 | EE | Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya: Compact E-Cash. EUROCRYPT 2005: 302-321 |
36 | EE | Jan Camenisch, Anton Mityagin: Mix-Network with Stronger Security. Privacy Enhancing Technologies 2005: 128-146 |
35 | EE | Endre Bangerter, Jan Camenisch, Ueli M. Maurer: Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. Public Key Cryptography 2005: 154-171 |
34 | EE | Michael Backes, Jan Camenisch, Dieter Sommer: Anonymous yet accountable access control. WPES 2005: 40-46 |
2004 | ||
33 | Christian Cachin, Jan Camenisch: Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings Springer 2004 | |
32 | EE | Ernest F. Brickell, Jan Camenisch, Liqun Chen: Direct anonymous attestation. ACM Conference on Computer and Communications Security 2004: 132-145 |
31 | EE | Jan Camenisch, Anna Lysyanskaya: Signature Schemes and Anonymous Credentials from Bilinear Maps. CRYPTO 2004: 56-72 |
30 | EE | Jan Camenisch: Better Privacy for Trusted Computing Platforms: (Extended Abstract). ESORICS 2004: 73-88 |
29 | EE | Jan Camenisch, Jens Groth: Group Signatures: Better Efficiency and New Theoretical Aspects. SCN 2004: 120-133 |
28 | EE | Jan Camenisch, Maciej Koprowski, Bogdan Warinschi: Efficient Blind Signatures Without Random Oracles. SCN 2004: 134-148 |
27 | EE | Endre Bangerter, Jan Camenisch, Anna Lysyanskaya: A Cryptographic Framework for the Controlled Release of Certified Data. Security Protocols Workshop 2004: 20-42 |
2003 | ||
26 | EE | Jan Camenisch, Victor Shoup: Practical Verifiable Encryption and Decryption of Discrete Logarithms. CRYPTO 2003: 126-144 |
2002 | ||
25 | EE | Jan Camenisch, Els Van Herreweghen: Design and implementation of the idemix anonymous credential system. ACM Conference on Computer and Communications Security 2002: 21-30 |
24 | EE | Joy Algesheimer, Jan Camenisch, Victor Shoup: Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products. CRYPTO 2002: 417-432 |
23 | EE | Jan Camenisch, Anna Lysyanskaya: Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. CRYPTO 2002: 61-76 |
22 | EE | Jan Camenisch, Anna Lysyanskaya: A Signature Scheme with Efficient Protocols. SCN 2002: 268-289 |
2001 | ||
21 | EE | Jan Camenisch, Anna Lysyanskaya: An Identity Escrow Scheme with Appointed Verifiers. CRYPTO 2001: 388-407 |
20 | EE | Jan Camenisch, Anna Lysyanskaya: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. EUROCRYPT 2001: 93-118 |
19 | EE | Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth: Cryptographic Security for Mobile Code. IEEE Symposium on Security and Privacy 2001: 2-11 |
2000 | ||
18 | EE | Jan Camenisch, Ivan Damgård: Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes. ASIACRYPT 2000: 331-345 |
17 | EE | Jan Camenisch: Efficient Anonymous Fingerprinting with Group Signatures. ASIACRYPT 2000: 415-428 |
16 | EE | Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik: A Practical and Provably Secure Coalition-Resistant Group Signature Scheme. CRYPTO 2000: 255-270 |
15 | EE | Christian Cachin, Jan Camenisch: Optimistic Fair Secure Computation. CRYPTO 2000: 93-111 |
14 | EE | Jan Camenisch, Markus Michels: Confirmer Signature Schemes Secure against Adaptive Adversaries. EUROCRYPT 2000: 243-258 |
13 | EE | Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller: One-Round Secure Computation and Secure Autonomous Mobile Agents. ICALP 2000: 512-523 |
1999 | ||
12 | EE | Jan Camenisch, Markus Michels: Separability and Efficiency for Generic Group Signature Schemes. CRYPTO 1999: 413-430 |
11 | EE | Jan Camenisch, Markus Michels: Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes. EUROCRYPT 1999: 107-122 |
1998 | ||
10 | EE | Jan Camenisch, Markus Michels: A Group Signature Scheme with Improved Efficiency. ASIACRYPT 1998: 160-174 |
1997 | ||
9 | EE | Jan Camenisch, Markus Stadler: Efficient Group Signature Schemes for Large Groups (Extended Abstract). CRYPTO 1997: 410-424 |
8 | EE | Jan Camenisch: Efficient and Generalized Group Signatures. EUROCRYPT 1997: 465-479 |
7 | Jan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems With Passive Anonymity-Revoking Trustees. Journal of Computer Security 5(1): 69-90 (1997) | |
1996 | ||
6 | EE | Jan Camenisch, Jean-Marc Piveteau, Markus Stadler: An Efficient Fair Payment System. ACM Conference on Computer and Communications Security 1996: 88-94 |
5 | EE | Jan Camenisch, Ueli M. Maurer, Markus Stadler: Digital Payment Systems with Passive Anonymity-Revoking Trustees. ESORICS 1996: 33-43 |
1995 | ||
4 | EE | Markus Stadler, Jean-Marc Piveteau, Jan Camenisch: Fair Blind Signatures. EUROCRYPT 1995: 209-219 |
3 | Jan Camenisch, Jean-Marc Piveteau, Markus Stadler: Faire anonyme Zahlungssysteme. GI Jahrestagung 1995: 254-265 | |
1994 | ||
2 | EE | Jan Camenisch, Jean-Marc Piveteau, Markus Stadler: An Efficient Electronic Payment System Protecting Privacy. ESORICS 1994: 207-215 |
1 | EE | Jan Camenisch, Jean-Marc Piveteau, Markus Stadler: Blind Signatures Based on the Discrete Logarithm Problem. EUROCRYPT 1994: 428-432 |