Jan Camenisch  Jan Camenisch photo       

contact information

Principle Research Staff Member
IBM Research - Zurich
  +41dash44dash724dash8279

links

Professional Associations

Professional Associations:  ACM  |  Fellow, IACR  |  Fellow, IEEE  |  IBM Academy of Technology

more information

More information:  Computer Science - Zurich  |  Security - Zurich


2016

Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs
Jan Camenisch, Manu Drijvers, Jan Hajny
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 123-133

Memory erasability amplification
Camenisch, Jan and Enderlein, Robert R and Maurer, Ueli
International Conference on Security and Cryptography for Networks, pp. 104--125, 2016
Abstract


Virtual Smart Cards: How to Sign with a Password and a Server
J Camenisch, A Lehmann, G Neven, K Samelin
SCN 2016, Springer, LNCS

UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
Camenisch, Jan and Dubovitskaya, Maria and Rial, Alfredo
Advances in Cryptology - Crypto 2016, Springer, LNCS

Universally Composable Direct Anonymous Attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography - PKC 2016, Springer, LNCS
Abstract

Universal composition with responsive environments
Camenisch, Jan and Enderlein, Robert R and Krenn, Stephan and K{"u}sters, Ralf and Rausch, Daniel
Advances in Cryptology--ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II 22, pp. 807--840
Abstract


2015

Formal treatment of privacy-enhancing credential systems
Camenisch, Jan and Krenn, Stephan and Lehmann, Anja and Mikkelsen, Gert L{ae}ss{o}e and Neven, Gregory and Pedersen, Michael {O}stergaard
International Conference on Selected Areas in Cryptography, pp. 3--24, 2015
Abstract

An Architecture for Privacy-ABCs
Bichsel, Patrik and Camenisch, Jan and Dubovitskaya, Maria and Enderlein, Robert R and Krenn, Stephan and Krontiris, Ioannis and Lehmann, Anja and Neven, Gregory and Paquin, Christian and Preiss, Franz-Stefan and others
Attribute-based Credentials for Trust, pp. 11--78, Springer, 2015

(Un) linkable Pseudonyms for Governmental Databases
Camenisch, Jan and Lehmann, Anja
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1467--1479, 2015

Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
Asiacrypt 2015, Springer

Recovering Lost Device-Bound Credentials
Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
International Conference on Applied Cryptography and Network Security - ACNS, Springer, 2015

A Single Password for Everything?
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
ERCIM News, 2015

Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters
Journal of Cryptology , 2015

Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones
J. Camenisch, D. Ortiz-Yepes, Franz-Stefan Preiss
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, pp. 37--48, ACM, 2015

Optimal Distributed Password Verification
Jan Camenisch, Anja Lehmann, Gregory Neven
ACM Conference on Computer and Communications Security, 2015

(Un)linkable Pseudonyms for Governmental Databases
Jan Camenisch, Anja Lehmann
ACM Conference on Computer and Communications Security, 2015

Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch, Robert R. Enderlein, and Gregory Neven
Public-Key Cryptography--PKC 2015


2014

Composable and modular anonymous credentials: definitions and practical constructions
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
Advances in Cryptology--ASIACRYPT 2015, pp. 262--288, Springer, 2014

Formal Treatment of Privacy-Enhancing Credential Systems.
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L{ae}ss{o}e Mikkelsen, Gregory Neven, Michael {O}stergaard Pedersen
IACR Cryptology ePrint Archive2014, 708

Authentication and authorisation in entrusted unions
Ayed F Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, John Zic
2014 - ro.ecu.edu.au

Concepts and languages for privacy-preserving attribute-based authentication
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Journal of Information Security and Applications, 2014

Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven
Advances in Cryptology--ASIACRYPT 2014, pp. 551--572, Springer

Integration of Data-Minimising Authentication into Authorisation Systems
Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog
TRUST, pp. 179-187, Springer Verlag, 2014

Privacy-Preserving Auditing for Attribute-Based Credentials
J Camenisch, A Lehmann, G Neven and A Rial
European Symposium on Research in Computer Security - ESORICS, Springer, LNCS, 2014
Abstract

Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Advances in Cryptology - CRYPTO, Springer, LNCS, 2014
Abstract

On The Impossibility of Structure-Preserving Deterministic Primitives
Masayuki Abe, Jan Camenisch, Rafael Dowsley, and Maria Dubovitskaya
Theory of Cryptography Conference (TCC), pp. 713--738, Springer, 2014

Concepts Around Privacy-Preserving Attribute-Based Credentials
Jan Camenisch
Privacy and Identity Management for Emerging Services and Technologies, pp. 53--63, Springer, 2014

Research Challenges to Secure the Future Internet
Jan Camenisch
Secure Data Management, pp. 14--17, Springer, 2014


2013

Universally Composable Adaptive Oblivious Transfer (with Access Control) from Standard Assumptions
Masayuki Abe, Jan Camenisch, Maria Duboviskaya, Ryo Nishimaki
ACM CCS DIM, pp. 1--12, 2013

Anonymously sharing Flickr pictures with facebook friends
Jan Camenisch, Guenter Karjoth, Gregory Neven, and Franz-Stefan Preiss
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp. 13--24, 2013


Future Challenges in Security and Privacy for Academia and Industry
Jan Camenisch, Simone Fischer-Huebner, and Yuko Murayama
Computers & Security (Print)33, 1--170, Elsevier, 2013

Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
DBSec, pp. 128-144, 2013

Recognizing your digital friends
Patrik Bichsel, Jan Camenisch, Mario Verdicchio
Security and Privacy in Social Networks, pp. 27--46, Springer New York, 2013

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Policies and Research in Identity Management, pp. 34--52, Springer, 2013

Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn
Jan Camenisch, Robert R Enderlein, Victor Shoup
Computer Security--ESORICS 2013, pp. 19--37, Springer


2012

Information privacy?!
J. Camenisch
Computer Networks, Elsevier, 2012

Practical yet universally composable two-server password-authenticated secret sharing
J. Camenisch, A. Lysyanskaya, G. Neven
Proceedings of the 2012 ACM conference on Computer and communications security, ACM

Data-Minimizing Authentication Goes Mobile
P. Bichsel, J. Camenisch, B. De Decker, J. Lapon, V. Naessens, D. Sommer
Communications and Multimedia Security, pp. 55--71, Springer Berlin/Heidelberg, 2012

Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
J. Camenisch, M. Dubovitskaya, R. Enderlein, G. Neven
Security and Cryptography for Networks, pp. 559--579, Springer Berlin/Heidelberg, 2012

Fully Anonymous Attribute Tokens from Lattices
J. Camenisch, G. Neven, M. Rckert
Security and Cryptography for Networks, 57--75, Springer Berlin/Heidelberg, 2012

Efficient Structure-Preserving Signature Scheme from Standard Assumptions
J. Camenisch, M. Dubovitskaya, K. Haralambiev
Security and Cryptography for Networks, pp. 76--94, Springer Berlin/Heidelberg, 2012

A Calculus for Privacy-friendly Authentication
P. Bichsel, J. Camenisch, D. Sommer
Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 157--166, 2012

A language framework for privacy-preserving attribute-based authentication
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Technical Report, Technical Report RZ3818, IBM, 2012

Computing on authenticated data
J. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, B. Waters
Theory of Cryptography Conference, pp. 1--20, Springer Berlin/Heidelberg, 2012

Electronic identities need private credentials
J Camenisch, A Lehmann, G Neven
Security & Privacy, IEEE 10(1), IEEE, 2012
Abstract

Batch Verification of Short Signatures
J. Camenisch, S. Hohenberger, M.\O. Pedersen
Journal of cryptology 25(4), 723--747, Springer, 2012


2011

A framework for practical universally composable zero-knowledge protocols
J Camenisch, S Krenn, V Shoup
Advances in Cryptology--ASIACRYPT 2011, 449--467, Springer

Further privacy mechanisms
A El Kalam, C Melchor, S Berthold, J Camenisch, S Clauss, Y Deswarte, M Kohlweiss, A Panchenko, L Pimenidis, M Roy
Digital privacy, 485--555, Springer, 2011

An introduction to privacy-enhancing identity management
J Camenisch, R Leenes, M Hansen, J Schallaboeck
Digital privacy, 3--21, Springer, 2011

Provably linkable trading
C Kenyon, J Camenisch
Quantitative Finance 11(5), 641--651, Taylor & Francis, 2011

PrimeLife's Legacy
J Camenisch, M Hansen
Privacy and Identity Management for Life, 505--506, Springer, 2011

Cryptographic Mechanisms for Privacy
J Camenisch, M Dubovitskaya, M Kohlweiss, J Lapon, G Neven
Privacy and Identity Management for Life, 117--134, Springer, 2011

Trustworthiness of Online Content
J Camenisch, S Steinbrecher, R Leenes, S Poetzsch, B Kellermann, L Klaming
Privacy and Identity Management for Life, 61--85, Springer, 2011

PrimeLife
A Pfitzmann, K Borcea-Pfitzmann, J Camenisch
Privacy and Identity Management for Life, 5--26, Springer, 2011

Open Source Contributions
J Camenisch, B Kellermann, S Koepsell, S Paraboschi, F S Preiss, S Poetzsch, D Raggett, P Samarati, K Wouters
Privacy and Identity Management for Life, 459--477, Springer, 2011

Structure preserving cca secure encryption and applications
J Camenisch, K Haralambiev, M Kohlweiss, J Lapon, V Naessens
Advances in Cryptology--ASIACRYPT 2011, 89--106, Springer

Privacy and identity management for life
J Camenisch, S Fischer-Huebner, K Rannenberg
Hübner... - 2011 - books.google.com, Springer Verlag

Digital Privacy: PRIME-Privacy and Identity Management for Europe
J Camenisch, R Leenes, D Sommer
2011 - books.google.com, Springer-Verlag New York Inc

A Comprehensive Framework Enabling Data-minimizing Authentication
P. Bichsel, J. Camenisch, F.-S. Preiss
Proceedings of the 7th ACM workshop on Digital identity management, pp. 13--22, 2011

Cryptographic primitives for building secure and privacy respecting protocols
Jan Camenisch
Proceedings of the 18th ACM conference on Computer and communications security, pp. 361--362, 2011

Oblivious transfer with hidden access control policies
J. Camenisch, M. Dubovitskaya, G. Neven, G. Zaverucha
Public Key Cryptography--PKC 2011, pp. 192-209, Springer


2010


Credential authenticated identification and key exchange
J Camenisch, N Casati, T Gross, V Shoup
Advances in Cryptology--CRYPTO 2010, 255--276, Springer

A card requirements language enabling privacy-preserving access control
Jan Camenisch, Sebastian Moedersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer
ACM SACMAT 2010, pp. 119--128, ACM
Abstract

Unlinkable priced oblivious transfer with rechargeable wallets
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Financial Cryptography and Data Security, pp. 66--81, Springer, 2010

Mixing Identities with Ease
P. Bichsel and J. Camenisch
IDMAN 2010, pp. 1--17, Springer

Saving On-Line Privacy
J Camenisch, G Neven
Privacy and Identity Management for Life, 34--47, Springer, 2010

Get Shorty via Group Signatures without Encryption
P. Bichsel, J. Camenisch, G. Neven, N. Smart, B. Warinschi
SCN 2010, pp. 381--398, Springer

A Formal Model of Identity Mixer
J Camenisch, S Moedersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198--214, Springer, 2010

Encrypting Keys Securely
C Cachin, J Camenisch
IEEE Security & Privacy 8(4), 66--69, IEEE Computer Society, 2010

Solving Revocation with Efficient Update of Anonymous Credentials
J Camenisch, M Kohlweiss, C Soriente
SCN 2010, pp. 454, Springer

Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Claudio A Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio
Journal of Computer Security 18(1), 123--160, IOS Press, 2010

Efficiency limitations for Σ-protocols for group homomorphisms
E Bangerter, J Camenisch, S Krenn
Theory of Cryptography, 553--571, Springer, 2010


2009

Credential-Based Access Control Extensions to XACML
J Camenisch, S Modersheim, G Neven, F S Preiss, D Sommer
W3C Workshop on Access Control Application Scenarios, Luxembourg, 2009

Cryptographic Protocols of the Identity Mixer Library, v. 1.0
P. Bichsel, C. Binding, J. Camenisch, T. Gross, T. Heydt-Benjamin, D. Sommer, G. Zaverucha
IBM Research Report RZ3730, 2009

Anonymous Credentials on a Standard Java Card
P. Bichsel, J. Camenisch, T. Gross, V. Shoup
ACM CCS, pp. 600--610, ACM Press, 2009

Remarks on" Analysis of one popular group signature scheme" in Asiacrypt 2006
G Ateniese, J Camenisch, M Joye, G Tsudik
International Journal of Applied Cryptography 1(4), 320--322, Inderscience, 2009

Oblivious transfer with access control
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Proceedings of the 2009 ACM Conference on Computer and Communications Security, pp. 131--140, ACM Press

Accountable privacy supporting services
J Camenisch, T Gross, T S Heydt-Benjamin
Identity in the Information Society, 1--27, Springer, 2009

An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09, pp. 481--500, Springer, 2009

Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
J Camenisch, M Kohlweiss, A Rial, C Sheedy
Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09, pp. 196--214, Springer, 2009

On the portability of generalized schnorr proofs
J Camenisch, A Kiayias, M Yung
EUROCRYPT, pp. 425--442, Springer, 2009

Private intersection of certified sets
J Camenisch, G Zaverucha
Financial Cryptography and Data Security, 108--127, Springer, 2009


Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, H Shacham
Crypto 2009, pp. 125, Springer Verlag, LNCS


2008

Rethinking Accountable Privacy Supporting Services
J Camenisch, T Gross, T S Heydt-Benjamin
ACM Digital Identity Management Workshop (DIM), pp. 1--8, 2008

Efficient attributes for anonymous credentials
Jan Camenisch, Thomas Gro ss
Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS'08), pp. 345--356, ACM Press, 2008
Abstract

Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni, A Shelat
Asiacrypt 2008, LNCS, pp. 252, Springer Verlag


2007

Simulatable adaptive oblivious transfer
Jan Camenisch, Gregory Neven, abhi shelat
Advances in Cryptology -- EUROCRYPT 2007, pp. 573--590, Springer-Verlag

Federated Identity Management
J Camenisch, B Pfitzmann
Chapter from the book: Security, Privacy, and Trust in Modern Data Management. ISBN, 978--3, Springer, 2007

Endorsed e-cash
J Camenisch, A Lysyanskaya, M Meyerovich
Security and Privacy, 2007, pp. 101--115


2006

Remarks on" Analysis of One Popular Group Signature Scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Technical Report, 2006

Cryptographic Protocols, chapter Direct Anonymous Attestation Explained
J Camenisch
2006 - Addison-Wesley, Addison-Wesley

Protecting (anonymous) credentials with the trusted computing group’s trusted platform modules v1. 2
J Camenisch
Proceedings of the 21st IFIP International Information Security Conference (SEC 2006)

Balancing accountability and privacy using e-cash
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
Security and Cryptography for Networks, pp. 141--155, Springer, 2006

User Centricity: A Taxonomy and Open Issues
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gro ss, Dieter Sommer
2006 ACM Workshop on Digital Identity Management ({DIM}), pp. 1--10, ACM Press

A general certification framework with applications to privacy-enhancing certificate infrastructures
Jan Camenisch, Dieter Sommer, Roger Zimmermann
Security and Privacy in Dynamic Environments, pp. 25--37, Springer, 2006

Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security
J Camenisch, T Gross, D Sommer
Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 67--72, 2006

How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, M Meyerovich
Proceedings of the 13th ACM conference on Computer and communications security, pp. 201--210, ACM, 2006

Securing user inputs for the web
J Camenisch, D Sommer, R Zimmermann, others
Proceedings of the second ACM workshop on Digital identity management, pp. 33--44, 2006

Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1. 2
J Camenisch
International Information Security Conference (SEC 2006)201, 135--147, Springer Boston

Fine-grained forward-secure signature schemes without random oracles
J Camenisch, M Koprowski
Discrete Applied Mathematics 154(2), 175--188, Elsevier, 2006


2005

Practical Group Signatures without Random Oracles, IACR ePrint Archive, 2005/385
G Ateniese, J Camenisch, B Medeiros de, S Hohenberger
2005

Group Signatures: Better Efficiency and New Theoretical Aspects: Forth Conference on Security in Communication Networks-SCN’04. LNCS 3352
J Camenisch, J Groth
2005 - Springer-Verlag, Springer-Verlag

A formal treatment of onion routing
J Camenisch, A Lysyanskaya
Advances in Cryptology--CRYPTO 2005, pp. 169--187, Springer

Trust in PRIME
Christer Andersson, Jan Camenisch, Stephen Crane, S Fischer-Hubner, Ronald Leenes, Siani Pearsorr, John S\"oren Pettersson, Dieter Sommer
Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on, pp. 552--559

Untraceable RFID tags via insubvertible encryption
G Ateniese, J Camenisch, B Medeiros de
Proceedings of the 12th ACM conference on Computer and communications security, pp. 92--101, 2005

Privacy and identity management for everyone
J Camenisch, D Sommer, S Fischer-Huebner, M Hansen, H Krasemann, G Lacoste, R Leenes, J Tseng, others
Proceedings of the 2005 workshop on Digital identity management, pp. 20--27, ACM

Efficient blind signatures without random oracles
J Camenisch, M Koprowski, B Warinschi
SCN, pp. 134--148, Springer, 2005

Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Eurocrypt, pp. 566--566, Springer, 2005

Practical group signatures without random oracles
G Ateniese, J Camenisch, S Hohenberger, B Medeiros de
Cryptology ePrint Archive: Report 2005/385 , IACR


The DAA scheme in context
E Brickell, J Camenisch, L Chen
Trusted computing, pp. 143, IET, 2005

Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order
E Bangerter, J Camenisch, U Maurer
Public Key Cryptography, pp. 154--171, Springer, 2005

Anonymous yet accountable access control
Michael Backes, Jan Camenisch, Dieter Sommer
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 40--46, ACM

Mix-network with stronger security
J Camenisch, A Mityagin
Privacy Enhancing Technologies (PET) 2005, pp. 128-146, Springer


2004

Direct Anonymous Attestation
E Brickell, J Camenisch, Chen Liqun
Proceedings of the llth ACM Conferenceon Computer and Communication Security. New York: Association for Computing Machinery, 132--145, 2004

Signature Schemes and Anonymous Credentials from Bilinear Maps, Crypto'04, LNCS
J Camenisch, A Lysyanskaya
2004 - Springer-Verlag, Springer-Verlag

Signature Schemes and Anonymous Credentials from Bilinear Maps; Crypto 2004, LNCS 3152
J Camenisch, A Lysyanskaya
2004 - Springer, Berlin, Springer, Berlin

Efficient Blind Signatures Without Random Oracles
J Camenisch, M Koprowski, B Warinschi
Security in Communication Networks, Springer-Verlag, 2004

Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications security, pp. 132--145, ACM, 2004

Signature schemes and anonymous credentials from bilinear maps
J Camenisch, A Lysyanskaya
Advances in Cryptology - Crypto 2004, pp. 56--72, Springer

Better privacy for trusted computing platforms
Jan Camenisch
Computer Security--ESORICS 2004, pp. 73--88, Springer

A cryptographic framework for the controlled release of certified data
E Bangerter, J Camenisch, A Lysyanskaya
Security Protocols, pp. 20, Springer, 2004


2003

Practical verifiable encryption and decryption of discrete logarithms. CRYPTO 2003 vol. 2729 of LNCS
J Camenisch, V Shoup
2003 - Springer, Berlin, Springer, Berlin

A signature scheme with efficient protocols, SCN 2002, LNCS 2576
J Camenisch, A Lysyanskaya
2003 - Springer-Verlag, Springer-Verlag

Practical verifiable encryption and decryption of discrete logarithms
J Camenisch, V Shoup
Advances in Cryptology—CRYPTO, pp. 126--144, Springer, 2003


2002

Design and implementation of the idemix anonymous credential system
Jan Camenisch, Els Van Herreweghen
Proceedings of the 9th ACM conference on Computer and communications security, pp. 21--30, ACM, 2002



A signature scheme with efficient protocols
J Camenisch, A Lysyanskaya
Security in Communication Networks , pp. 268--289, Springer, 2002


2001

Cryptographic security for mobile code
Joy Algesheimer, Christian Cachin, Jan Camenisch, G\"unter Karjoth
Security and Privacy, 2001. S\&P 2001. Proceedings. 2001 IEEE Symposium on, pp. 2--11

An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
J Camenisch, A Lysyanskaya
Advances in Cryptology-Eurocrypt 2001, pp. 93-118, Springer Verlag

An identity escrow scheme with appointed verifiers
J Camenisch, A Lysyanskaya
Advances in Cryptology—CRYPTO 2001, pp. 388--407, Springer


2000

One-round secure computation and secure autonomous mobile agents
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M\"uller
Proc, pp. 512--523, Springer, 2000

Confirmer signature schemes secure against adaptive adversaries
J Camenisch, M Michels
Advances in Cryptology—EUROCRYPT 2000, pp. 243--258, Springer


A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000, pp. 255--270, Springer

Efficient anonymous fingerprinting with group signatures
J Camenisch
Advances in Cryptology—ASIACRYPT 2000, 415--428, Springer

Optimistic Fair Secure Computation
Christian Cachin, Jan Camenisch
CRYPTO 2000, pp. 94--112, Springer


1999

Proving in zero-knowledge that a number is the product of two safe primes
J Camenisch, M Michels
Eurocrypt '99, pp. 107--122, Springer, LNCS, 1999

Separability and efficiency for generic group signature schemes
J Camenisch, M Michels
Crypto '99, pp. 413--430, Springer, 1999


1998

A Group Signature Scheme Based on an RSA-Variant, Advances in Cryptology—ASIACRYPT’98, LNCS1514
J Camenisch, M Michels
1998 - Springer–Verlag, Springer--Verlag

A group signature scheme with improved efficiency, Advances in Cryptology—ASIACRYPT’98 (K. Ohta and D. Pei, eds.), LNCS, vol. 1514
J Camenisch, M Michels
1998 - Springer Verlag, Springer Verlag

Group signature schemes and payment systems based on the discrete logarithm problem
J Camenisch
ETH Series in Information Security and Cryptography, Diss. ETH No. 12520, Hartung-Gorre Verlag, Konstanz, 1998

A group signature scheme based on an RSA-variant
J Camenisch, M Michels
Technical Report, BRICS, 1998

A group signature scheme with improved efficiency
J Camenisch, M Michels
Asiacrypt '98, pp. 160--174, Springer, 1998


1997

Partially blind signature schemes
M Abe, J Camenisch
Proceedings of Symposium on Cryptography and Information Security, 1997

Proof systems for general statements about discrete logarithms
J Camenisch, M Stadler
Institute for Theoretical Computer Science, ETH Z{\\"u}rich, Tech. Rep. TR260, ETH Zurich, 1997

Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Computer Security—ESORICS 96, pp. 69--89, IOS Press, 1997

Efficient group signature schemes for large groups
J Camenisch, M Stadler
Advances in Cryptology—CRYPTO'971294, 410--424, Springer, 1997

Efficient and generalized group signatures
J Camenisch
Advances in cryptology—EUROCRYPT’97, pp. 465--479, Springer, 1997


1996

An efficient fair payment system
J Camenisch, J M Piveteau, M Stadler
Proceedings of the 3rd ACM conference on Computer and communications security, pp. 88--94, ACM, 1996


1995

Fair Anonyme Zahlungssysteme
J Camenisch, J M Piveteau, M Stadler
Eurocrypt, pp. 254--265, Springer Verlag, 1995


1994

An Efficient Electronic Payment System Protecting Privacy
J L Camenisch, J M Piveteau, M A Stadler
ESORICS 94, Springer-Verlag, Berlin, 1994

Blind signatures based on the discrete logarithm problem
J L Camenisch, J M Piveteau, M A Stadler
Advances in Cryptology—EUROCRYPT'94, pp. 428--432, Springer, 1994


Year Unknown

Universally Composable Direct Anonymous Attestation
Jan Camenisch, Manu Drijvers, Anja Lehmann
eprint.iacr.org, 0

Virtual Smart Cards: How to Sign with a Password and a Server
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
eprint.iacr.org, 0