2009 |
61 | EE | Jan Camenisch,
Nishanth Chandran,
Victor Shoup:
A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks.
EUROCRYPT 2009: 351-368 |
60 | EE | Jan Camenisch,
Aggelos Kiayias,
Moti Yung:
On the Portability of Generalized Schnorr Proofs.
EUROCRYPT 2009: 425-442 |
59 | EE | Jan Camenisch,
Markulf Kohlweiss,
Alfredo Rial,
Caroline Sheedy:
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data.
Public Key Cryptography 2009: 196-214 |
58 | EE | Jan Camenisch,
Markulf Kohlweiss,
Claudio Soriente:
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
Public Key Cryptography 2009: 481-500 |
2008 |
57 | EE | Jan Camenisch,
Thomas Groß:
Efficient attributes for anonymous credentials.
ACM Conference on Computer and Communications Security 2008: 345-356 |
56 | EE | Jan Camenisch,
Rafik Chaabouni,
Abhi Shelat:
Efficient Protocols for Set Membership and Range Proofs.
ASIACRYPT 2008: 234-252 |
55 | EE | Jan Camenisch,
Thomas Groß,
Thomas S. Heydt-Benjamin:
Rethinking accountable privacy supporting services: extended abstract.
Digital Identity Management 2008: 1-8 |
2007 |
54 | | Jan Camenisch,
Christian S. Collberg,
Neil F. Johnson,
Phil Sallee:
Information Hiding, 8th International Workshop, IH 2006, Alexandria, VA, USA, July 10-12, 2006. Revised Selcted Papers
Springer 2007 |
53 | EE | Jan Camenisch,
Susan Hohenberger,
Michael Østergaard Pedersen:
Batch Verification of Short Signatures.
EUROCRYPT 2007: 246-263 |
52 | EE | Jan Camenisch,
Gregory Neven,
Abhi Shelat:
Simulatable Adaptive Oblivious Transfer.
EUROCRYPT 2007: 573-590 |
51 | EE | Jan Camenisch,
Anna Lysyanskaya,
Mira Meyerovich:
Endorsed E-Cash.
IEEE Symposium on Security and Privacy 2007: 101-115 |
50 | EE | Abhilasha Bhargav-Spantzel,
Jan Camenisch,
Thomas Groß,
Dieter Sommer:
User centricity: A taxonomy and open issues.
Journal of Computer Security 15(5): 493-527 (2007) |
2006 |
49 | EE | Jan Camenisch,
Susan Hohenberger,
Markulf Kohlweiss,
Anna Lysyanskaya,
Mira Meyerovich:
How to win the clonewars: efficient periodic n-times anonymous authentication.
ACM Conference on Computer and Communications Security 2006: 201-210 |
48 | EE | Abhilasha Bhargav-Spantzel,
Jan Camenisch,
Thomas Groß,
Dieter Sommer:
User centricity: a taxonomy and open issues.
Digital Identity Management 2006: 1-10 |
47 | EE | Jan Camenisch,
Abhi Shelat,
Dieter Sommer,
Roger Zimmermann:
Securing user inputs for the web.
Digital Identity Management 2006: 33-44 |
46 | EE | Jan Camenisch,
Susan Hohenberger,
Anna Lysyanskaya:
Balancing Accountability and Privacy Using E-Cash (Extended Abstract).
SCN 2006: 141-155 |
45 | EE | Jan Camenisch:
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2.
SEC 2006: 135-147 |
44 | EE | Jan Camenisch,
Dieter Sommer,
Roger Zimmermann:
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures.
SEC 2006: 25-37 |
43 | EE | Jan Camenisch:
Anonymous Credentials: Opportunities and Challenges.
SEC 2006: 460 |
42 | EE | Jan Camenisch,
Thomas Groß,
Dieter Sommer:
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security.
WPES 2006: 67-72 |
41 | EE | Jan Camenisch,
Maciej Koprowski:
Fine-grained forward-secure signature schemes without random oracles.
Discrete Applied Mathematics 154(2): 175-188 (2006) |
2005 |
40 | EE | Giuseppe Ateniese,
Jan Camenisch,
Breno de Medeiros:
Untraceable RFID tags via insubvertible encryption.
ACM Conference on Computer and Communications Security 2005: 92-101 |
39 | EE | Jan Camenisch,
Anna Lysyanskaya:
A Formal Treatment of Onion Routing.
CRYPTO 2005: 169-187 |
38 | EE | Jan Camenisch,
Abhi Shelat,
Dieter Sommer,
Simone Fischer-Hübner,
Marit Hansen,
Henry Krasemann,
Gérard Lacoste,
Ronald Leenes,
Jimmy C. Tseng:
Privacy and identity management for everyone.
Digital Identity Management 2005: 20-27 |
37 | EE | Jan Camenisch,
Susan Hohenberger,
Anna Lysyanskaya:
Compact E-Cash.
EUROCRYPT 2005: 302-321 |
36 | EE | Jan Camenisch,
Anton Mityagin:
Mix-Network with Stronger Security.
Privacy Enhancing Technologies 2005: 128-146 |
35 | EE | Endre Bangerter,
Jan Camenisch,
Ueli M. Maurer:
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order.
Public Key Cryptography 2005: 154-171 |
34 | EE | Michael Backes,
Jan Camenisch,
Dieter Sommer:
Anonymous yet accountable access control.
WPES 2005: 40-46 |
2004 |
33 | | Christian Cachin,
Jan Camenisch:
Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings
Springer 2004 |
32 | EE | Ernest F. Brickell,
Jan Camenisch,
Liqun Chen:
Direct anonymous attestation.
ACM Conference on Computer and Communications Security 2004: 132-145 |
31 | EE | Jan Camenisch,
Anna Lysyanskaya:
Signature Schemes and Anonymous Credentials from Bilinear Maps.
CRYPTO 2004: 56-72 |
30 | EE | Jan Camenisch:
Better Privacy for Trusted Computing Platforms: (Extended Abstract).
ESORICS 2004: 73-88 |
29 | EE | Jan Camenisch,
Jens Groth:
Group Signatures: Better Efficiency and New Theoretical Aspects.
SCN 2004: 120-133 |
28 | EE | Jan Camenisch,
Maciej Koprowski,
Bogdan Warinschi:
Efficient Blind Signatures Without Random Oracles.
SCN 2004: 134-148 |
27 | EE | Endre Bangerter,
Jan Camenisch,
Anna Lysyanskaya:
A Cryptographic Framework for the Controlled Release of Certified Data.
Security Protocols Workshop 2004: 20-42 |
2003 |
26 | EE | Jan Camenisch,
Victor Shoup:
Practical Verifiable Encryption and Decryption of Discrete Logarithms.
CRYPTO 2003: 126-144 |
2002 |
25 | EE | Jan Camenisch,
Els Van Herreweghen:
Design and implementation of the idemix anonymous credential system.
ACM Conference on Computer and Communications Security 2002: 21-30 |
24 | EE | Joy Algesheimer,
Jan Camenisch,
Victor Shoup:
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products.
CRYPTO 2002: 417-432 |
23 | EE | Jan Camenisch,
Anna Lysyanskaya:
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.
CRYPTO 2002: 61-76 |
22 | EE | Jan Camenisch,
Anna Lysyanskaya:
A Signature Scheme with Efficient Protocols.
SCN 2002: 268-289 |
2001 |
21 | EE | Jan Camenisch,
Anna Lysyanskaya:
An Identity Escrow Scheme with Appointed Verifiers.
CRYPTO 2001: 388-407 |
20 | EE | Jan Camenisch,
Anna Lysyanskaya:
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.
EUROCRYPT 2001: 93-118 |
19 | EE | Joy Algesheimer,
Christian Cachin,
Jan Camenisch,
Günter Karjoth:
Cryptographic Security for Mobile Code.
IEEE Symposium on Security and Privacy 2001: 2-11 |
2000 |
18 | EE | Jan Camenisch,
Ivan Damgård:
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes.
ASIACRYPT 2000: 331-345 |
17 | EE | Jan Camenisch:
Efficient Anonymous Fingerprinting with Group Signatures.
ASIACRYPT 2000: 415-428 |
16 | EE | Giuseppe Ateniese,
Jan Camenisch,
Marc Joye,
Gene Tsudik:
A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.
CRYPTO 2000: 255-270 |
15 | EE | Christian Cachin,
Jan Camenisch:
Optimistic Fair Secure Computation.
CRYPTO 2000: 93-111 |
14 | EE | Jan Camenisch,
Markus Michels:
Confirmer Signature Schemes Secure against Adaptive Adversaries.
EUROCRYPT 2000: 243-258 |
13 | EE | Christian Cachin,
Jan Camenisch,
Joe Kilian,
Joy Müller:
One-Round Secure Computation and Secure Autonomous Mobile Agents.
ICALP 2000: 512-523 |
1999 |
12 | EE | Jan Camenisch,
Markus Michels:
Separability and Efficiency for Generic Group Signature Schemes.
CRYPTO 1999: 413-430 |
11 | EE | Jan Camenisch,
Markus Michels:
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes.
EUROCRYPT 1999: 107-122 |
1998 |
10 | EE | Jan Camenisch,
Markus Michels:
A Group Signature Scheme with Improved Efficiency.
ASIACRYPT 1998: 160-174 |
1997 |
9 | EE | Jan Camenisch,
Markus Stadler:
Efficient Group Signature Schemes for Large Groups (Extended Abstract).
CRYPTO 1997: 410-424 |
8 | EE | Jan Camenisch:
Efficient and Generalized Group Signatures.
EUROCRYPT 1997: 465-479 |
7 | | Jan Camenisch,
Ueli M. Maurer,
Markus Stadler:
Digital Payment Systems With Passive Anonymity-Revoking Trustees.
Journal of Computer Security 5(1): 69-90 (1997) |
1996 |
6 | EE | Jan Camenisch,
Jean-Marc Piveteau,
Markus Stadler:
An Efficient Fair Payment System.
ACM Conference on Computer and Communications Security 1996: 88-94 |
5 | EE | Jan Camenisch,
Ueli M. Maurer,
Markus Stadler:
Digital Payment Systems with Passive Anonymity-Revoking Trustees.
ESORICS 1996: 33-43 |
1995 |
4 | EE | Markus Stadler,
Jean-Marc Piveteau,
Jan Camenisch:
Fair Blind Signatures.
EUROCRYPT 1995: 209-219 |
3 | | Jan Camenisch,
Jean-Marc Piveteau,
Markus Stadler:
Faire anonyme Zahlungssysteme.
GI Jahrestagung 1995: 254-265 |
1994 |
2 | EE | Jan Camenisch,
Jean-Marc Piveteau,
Markus Stadler:
An Efficient Electronic Payment System Protecting Privacy.
ESORICS 1994: 207-215 |
1 | EE | Jan Camenisch,
Jean-Marc Piveteau,
Markus Stadler:
Blind Signatures Based on the Discrete Logarithm Problem.
EUROCRYPT 1994: 428-432 |