Anja Lehmann  Anja Lehmann photo       

contact information

Research Staff Member
IBM Research - Zurich, Switzerland
  +41dash44dash724dash83dash51

links



2017

Anonymous Attestation with Subverted TPMs
J Camenisch, M Drijvers, A Lehmann
CRYPTO, 2017
Abstract

UC-Secure Non-Interactive Public-Key Encryption
J Camenisch, A Lehmann, G Neven, K Samelin
IEEE CSF - Computer Security Foundations Symposium, 2017
Abstract

One TPM to Bind Them All: Fixing TPM2.0 for Provably Secure Anonymous Attestation
J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian
IEEE S&P - Symposium on Security and Privacy, 2017
Abstract

Privacy-Preserving User-Auditable Pseudonym Systems
J Camenisch, A Lehmann
IEEE EuroS&P - European Symposium on Security and Privacy, 2017
Abstract

Updatable Tokenization: Formal Definitions and Provably Secure Constructions
C Cachin, J Camenisch, E Freire-Stoegbuchner, A Lehmann
Financial Cryptography and Data Security , 2017
Abstract


2016

Virtual Smart Cards: How to Sign with a Password and a Server
J Camenisch, A Lehmann, G Neven, K Samelin
10th Conference on Security and Cryptography for Networks - SCN 2016, Springer, LNCS
Abstract

Universally Composable Direct Anonymous Attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography - PKC 2016, Springer, LNCS
Abstract

Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
J Camenisch, M Drijvers, A Lehmann
9th International Conference on Trust & Trustworthy Computing - TRUST 2016, Springer, LNCS
Abstract


2015

Privacy for Distributed Databases via (Un)linkable Pseudonyms
J Camenisch, A Lehmann
ACM CCS, 2015
Abstract

Optimal Distributed Password Verification
J Camenisch, A Lehmann, G Neven
ACM CCS, 2015
Abstract

Formal Treatment of Privacy-Enhancing Credential Systems
J Camenisch, S Krenn, A Lehmann, G Mikkelsen, G Neven, M Pedersen
Selected Areas in Cryptography - SAC, 2015
Abstract

Recovering Lost Device-Bound Credentials
F Baldimtsi, J Camenisch, L Hanzlik, S Krenn, A Lehmann, G Neven
International Conference on Applied Cryptography and Network Security - ACNS, Springer, LNCS, 2015
Abstract

[Book Chapter] Cryptographic Protocols Underlying Privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015

[Book Chapter] An Architecture for Privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss
Attribute-based Credentials for Trust - Identity in the Information Society, Springer, 2015


2014

Privacy-Preserving Auditing for Attribute-Based Credentials
J Camenisch, A Lehmann, G Neven and A Rial
European Symposium on Research in Computer Security - ESORICS, Springer, LNCS, 2014
Abstract

Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Advances in Cryptology - CRYPTO, Springer, LNCS, 2014
Abstract

Robust Multi-Property Combiners for Hash Functions
M Fischlin, A Lehmann, K Pietrzak
Journal of Cryptology 27(3), 2014
Abstract


2013

Authentisierung mit der Open eCard App - Von Ausweiskarten zu datenschutzfreundlichen Credentials
M Horsch, D Huehnlein, A Lehmann, J Schmoelz, T Wich
Datenschutz und Datensicherheit(Ausgabe 8/13), 2013

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin and F Preiss.
IFIP IDMAN 2013: Policies & Research in Identity Management
Abstract


2012

History-free sequential aggregate signatures
M Fischlin, A Lehmann, D Schroeder
Security and Cryptography for Networks - SCN, Springer, LNCS, 2012
Abstract

On the Joint Security of Encryption and Signature in EMV
J Degabriele, A Lehmann, K Paterson, N Smart, M Strefler
Topics in Cryptology - CT-RSA, Springer, LNCS, 2012
Abstract

Electronic identities need private credentials
J Camenisch, A Lehmann, G Neven
Security & Privacy, IEEE 10(1), IEEE, 2012
Abstract


2011

Random Oracles in a Quantum World
D Boneh, O Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry
Advances in Cryptology - ASIACRYPT, Springer, LNCS, 2011
Abstract


2010


Hash Function Combiners in TLS and SSL
M Fischlin, A Lehmann, D Wagner
Topics in Cryptology - CT-RSA, Springer, LNCS, 2010
Abstract

Delayed-key message authentication for streams
M Fischlin, A Lehmann
Theory of Cryptography - TCC, Springer, LNCS, 2010
Abstract

Public-key encryption with non-interactive opening: New constructions and stronger definitions
D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, D Schroeder
Progress in Cryptology - AFRICACRYPT, Springer, LNCS, 2010
Abstract

Unlinkability of sanitizable signatures
C Brzuska, M Fischlin, A Lehmann, D Schroeder
Public Key Cryptography - PKC, Springer, LNCS, 2010
Abstract

History-free aggregate message authentication codes
O Eikemeier, M Fischlin, J-F Goetzmann, A Lehmann, D Schroeder, P Schroeder, D Wagner
Security and Cryptography for Networks - SCN, Springer, LNCS, 2010
Abstract

Random oracles with(out) programmability
M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro
Advances in Cryptology - ASIACRYPT, Springer, LNCS, 2010
Abstract


2009

Sanitizable signatures: how to partially delegate control for authenticated data
C Brzuska, M Fischlin, A Lehmann, D Schroeder
BIOSIG - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures, Citeseer, 2009
Abstract

Security of sanitizable signatures revisited
C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, D Schroeder, F Volk
Public Key Cryptography - PKC, Springer, LNCS, 2009
Abstract

A modular design for hash functions: Towards making the mix-compress-mix approach practical
A Lehmann, S Tessaro
Advances in Cryptology - ASIACRYPT, Springer, LNCS, 2009
Abstract


2008

Multi-property preserving combiners for hash functions
M Fischlin, A Lehmann
Theory of Cryptography - TCC, Springer, LNCS, 2008
Abstract

Robust multi-property combiners for hash functions revisited
M Fischlin, A Lehmann, K Pietrzak
35th International Colloquium on Automata, Languages and Programming - ICALP, Springer, LNCS, 2008
Abstract


2007

Security of invertible media authentication schemes revisited
D Doenigus, S Endler, M Fischlin, A Huelsing, P Jaeger, A Lehmann, S Podrazhansky, S Schipp, E Tews, S Vowe, M Walthart, F Weidemann
9th International Conference on Information Hiding, Springer, LNCS, 2007
Abstract

Security-amplifying combiners for collision-resistant hash functions
M Fischlin, A Lehmann
Advances in Cryptology - CRYPTO , Springer, LNCS, 2007
Abstract




Projects and Groups


Technical Areas