# Jan Camenisch

## contact information

Principle Research Staff Member

IBM Research - Zurich

+41447248279

IBM Research - Zurich

+41447248279

## links

### Professional Associations

**Professional Associations:**ACM | Fellow, IACR | Fellow, IEEE | IBM Academy of Technology

### more information

**More information:**Computer Science - Zurich | Security - Zurich

**2017**

Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.

Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:

Abstract

Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:

*PKC*, Springer, 2017Abstract

Updatable Tokenization: Formal Definitions and Provably Secure Constructions

Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann

Abstract

Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann

*Financial Cryptography and Data Security*, Springer, 2017Abstract

UC-Secure Non-Interactive Public-Key Encryption

Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin

Abstract

Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin

*IEEE CSF - Computer Security Foundations Symposium,*, IEEE, 2017Abstract

Anonymous Attestation with Subverted TPMs

Jan Camenisch, Manu Drijvers, Anja Lehmann

Abstract

Jan Camenisch, Manu Drijvers, Anja Lehmann

*Advances in Cryptography - CRYPTO 2017*, SpringerAbstract

Privacy-Preserving User-Auditable Pseudonym Systems

Jan Camenisch, Anja Lehmann

Abstract

Jan Camenisch, Anja Lehmann

*IEEE EuroS&P - European Symposium on Security and Privacy*, IEEE, 2017Abstract

One TPM to bind them all: fixing TPM2. 0 for provably secure anonymous attestation

Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian

Abstract

Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian

*Proceedings of IEEE S&P 2017*Abstract

Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures

Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:

Abstract

Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:

*Australasian Conference on Information Security and Privacy*, Springer, 2017Abstract

**2016**

Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs

Jan Camenisch, Manu Drijvers, Jan Hajny

Jan Camenisch, Manu Drijvers, Jan Hajny

*Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society*,*pp. 123-133*
Memory erasability amplification

Camenisch, Jan and Enderlein, Robert R and Maurer, Ueli

Abstract

Camenisch, Jan and Enderlein, Robert R and Maurer, Ueli

*International Conference on Security and Cryptography for Networks*,*pp. 104--125*, 2016Abstract

Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited

J Camenisch, M Drijvers, A Lehmann

J Camenisch, M Drijvers, A Lehmann

*TRUST 2016*, Springer, LNCS
Virtual Smart Cards: How to Sign with a Password and a Server

J Camenisch, A Lehmann, G Neven, K Samelin

J Camenisch, A Lehmann, G Neven, K Samelin

*SCN 2016*, Springer, LNCS
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens

Camenisch, Jan and Dubovitskaya, Maria and Rial, Alfredo

Camenisch, Jan and Dubovitskaya, Maria and Rial, Alfredo

*Advances in Cryptology - Crypto 2016*, Springer, LNCS
Universally Composable Direct Anonymous Attestation

J Camenisch, M Drijvers, A Lehmann

Abstract

J Camenisch, M Drijvers, A Lehmann

*Public-Key Cryptography - PKC 2016*, Springer, LNCSAbstract

Universal composition with responsive environments

Camenisch, Jan and Enderlein, Robert R and Krenn, Stephan and K{"u}sters, Ralf and Rausch, Daniel

Abstract

Camenisch, Jan and Enderlein, Robert R and Krenn, Stephan and K{"u}sters, Ralf and Rausch, Daniel

*Advances in Cryptology--ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II 22*,*pp. 807--840*Abstract

**2015**

Formal treatment of privacy-enhancing credential systems

Camenisch, Jan and Krenn, Stephan and Lehmann, Anja and Mikkelsen, Gert L{ae}ss{o}e and Neven, Gregory and Pedersen, Michael {O}stergaard

Abstract

Camenisch, Jan and Krenn, Stephan and Lehmann, Anja and Mikkelsen, Gert L{ae}ss{o}e and Neven, Gregory and Pedersen, Michael {O}stergaard

*International Conference on Selected Areas in Cryptography*,*pp. 3--24*, 2015Abstract

An Architecture for Privacy-ABCs

Bichsel, Patrik and Camenisch, Jan and Dubovitskaya, Maria and Enderlein, Robert R and Krenn, Stephan and Krontiris, Ioannis and Lehmann, Anja and Neven, Gregory and Paquin, Christian and Preiss, Franz-Stefan and others

Bichsel, Patrik and Camenisch, Jan and Dubovitskaya, Maria and Enderlein, Robert R and Krenn, Stephan and Krontiris, Ioannis and Lehmann, Anja and Neven, Gregory and Paquin, Christian and Preiss, Franz-Stefan and others

*Attribute-based Credentials for Trust*,*pp. 11--78*, Springer, 2015
(Un) linkable Pseudonyms for Governmental Databases

Camenisch, Jan and Lehmann, Anja

Camenisch, Jan and Lehmann, Anja

*Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security*,*pp. 1467--1479*, 2015
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions

Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss

Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss

*Asiacrypt 2015*, Springer
Recovering Lost Device-Bound Credentials

Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven

Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven

*International Conference on Applied Cryptography and Network Security - ACNS*, Springer, 2015
A Single Password for Everything?

Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven

Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven

*ERCIM News*, 2015
Computing on Authenticated Data

Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters

Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters

*Journal of Cryptology*, 2015
Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones

J. Camenisch, D. Ortiz-Yepes, Franz-Stefan Preiss

J. Camenisch, D. Ortiz-Yepes, Franz-Stefan Preiss

*Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society*,*pp. 37--48*, ACM, 2015
Optimal Distributed Password Verification

Jan Camenisch, Anja Lehmann, Gregory Neven

Jan Camenisch, Anja Lehmann, Gregory Neven

*ACM Conference on Computer and Communications Security*, 2015
(Un)linkable Pseudonyms for Governmental Databases

Jan Camenisch, Anja Lehmann

Jan Camenisch, Anja Lehmann

*ACM Conference on Computer and Communications Security*, 2015
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions

Jan Camenisch, Robert R. Enderlein, and Gregory Neven

Jan Camenisch, Robert R. Enderlein, and Gregory Neven

*Public-Key Cryptography--PKC 2015***2014**

Composable and modular anonymous credentials: definitions and practical constructions

Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss

Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss

*Advances in Cryptology--ASIACRYPT 2015*,*pp. 262--288*, Springer, 2014
Formal Treatment of Privacy-Enhancing Credential Systems.

Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L{ae}ss{o}e Mikkelsen, Gregory Neven, Michael {O}stergaard Pedersen

Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L{ae}ss{o}e Mikkelsen, Gregory Neven, Michael {O}stergaard Pedersen

*IACR Cryptology ePrint Archive**2014*, 708
Authentication and authorisation in entrusted unions

Ayed F Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, John Zic

2014 - ro.ecu.edu.au

Ayed F Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, John Zic

2014 - ro.ecu.edu.au

Concepts and languages for privacy-preserving attribute-based authentication

Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss

Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss

*Journal of Information Security and Applications*, 2014
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures

Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven

Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven

*Advances in Cryptology--ASIACRYPT 2014*,*pp. 551--572*, Springer
Integration of Data-Minimising Authentication into Authorisation Systems

Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog

Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog

*TRUST*,*pp. 179-187*, Springer Verlag, 2014
Privacy-Preserving Auditing for Attribute-Based Credentials

J Camenisch, A Lehmann, G Neven and A Rial

Abstract

J Camenisch, A Lehmann, G Neven and A Rial

*European Symposium on Research in Computer Security - ESORICS*, Springer, LNCS, 2014Abstract

Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment

J Camenisch, A Lehmann, A Lysyanskaya, G Neven

Abstract

J Camenisch, A Lehmann, A Lysyanskaya, G Neven

*Advances in Cryptology - CRYPTO*, Springer, LNCS, 2014Abstract

On The Impossibility of Structure-Preserving Deterministic Primitives

Masayuki Abe, Jan Camenisch, Rafael Dowsley, and Maria Dubovitskaya

Masayuki Abe, Jan Camenisch, Rafael Dowsley, and Maria Dubovitskaya

*Theory of Cryptography Conference (TCC)*,*pp. 713--738*, Springer, 2014
Concepts Around Privacy-Preserving Attribute-Based Credentials

Jan Camenisch

Jan Camenisch

*Privacy and Identity Management for Emerging Services and Technologies*,*pp. 53--63*, Springer, 2014
Research Challenges to Secure the Future Internet

Jan Camenisch

Jan Camenisch

*Secure Data Management*,*pp. 14--17*, Springer, 2014**2013**

Universally Composable Adaptive Oblivious Transfer (with Access Control) from Standard Assumptions

Masayuki Abe, Jan Camenisch, Maria Duboviskaya, Ryo Nishimaki

Masayuki Abe, Jan Camenisch, Maria Duboviskaya, Ryo Nishimaki

*ACM CCS DIM*,*pp. 1--12*, 2013
Anonymously sharing Flickr pictures with facebook friends

Jan Camenisch, Guenter Karjoth, Gregory Neven, and Franz-Stefan Preiss

Jan Camenisch, Guenter Karjoth, Gregory Neven, and Franz-Stefan Preiss

*Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society*,*pp. 13--24*, 2013
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Z\_n.

Jan Camenisch, Robert R Enderlein, Victor Shoup

Jan Camenisch, Robert R Enderlein, Victor Shoup

*ESORICS*,*pp. 205*, 2013
Future Challenges in Security and Privacy for Academia and Industry

Jan Camenisch, Simone Fischer-Huebner, and Yuko Murayama

Jan Camenisch, Simone Fischer-Huebner, and Yuko Murayama

*Computers & Security (Print)**33*, 1--170, Elsevier, 2013
Fair Private Set Intersection with a Semi-trusted Arbiter

Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello

Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello

*DBSec*,*pp. 128-144*, 2013
Recognizing your digital friends

Patrik Bichsel, Jan Camenisch, Mario Verdicchio

Patrik Bichsel, Jan Camenisch, Mario Verdicchio

*Security and Privacy in Social Networks*,*pp. 27--46*, Springer New York, 2013
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication

Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss

Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss

*Policies and Research in Identity Management*,*pp. 34--52*, Springer, 2013
Practical and Employable Protocols for UC-Secure Circuit Evaluation over â„¤n

Jan Camenisch, Robert R Enderlein, Victor Shoup

Jan Camenisch, Robert R Enderlein, Victor Shoup

*Computer Security--ESORICS 2013*,*pp. 19--37*, Springer**2012**

Practical yet universally composable two-server password-authenticated secret sharing

J. Camenisch, A. Lysyanskaya, G. Neven

J. Camenisch, A. Lysyanskaya, G. Neven

*Proceedings of the 2012 ACM conference on Computer and communications security*, ACM
Data-Minimizing Authentication Goes Mobile

P. Bichsel, J. Camenisch, B. De Decker, J. Lapon, V. Naessens, D. Sommer

P. Bichsel, J. Camenisch, B. De Decker, J. Lapon, V. Naessens, D. Sommer

*Communications and Multimedia Security*,*pp. 55--71*, Springer Berlin/Heidelberg, 2012
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption

J. Camenisch, M. Dubovitskaya, R. Enderlein, G. Neven

J. Camenisch, M. Dubovitskaya, R. Enderlein, G. Neven

*Security and Cryptography for Networks*,*pp. 559--579*, Springer Berlin/Heidelberg, 2012
Fully Anonymous Attribute Tokens from Lattices

J. Camenisch, G. Neven, M. Rückert

J. Camenisch, G. Neven, M. Rückert

*Security and Cryptography for Networks*, 57--75, Springer Berlin/Heidelberg, 2012
Efficient Structure-Preserving Signature Scheme from Standard Assumptions

J. Camenisch, M. Dubovitskaya, K. Haralambiev

J. Camenisch, M. Dubovitskaya, K. Haralambiev

*Security and Cryptography for Networks*,*pp. 76--94*, Springer Berlin/Heidelberg, 2012
A Calculus for Privacy-friendly Authentication

P. Bichsel, J. Camenisch, D. Sommer

P. Bichsel, J. Camenisch, D. Sommer

*Proceedings of the 17th ACM symposium on Access Control Models and Technologies*,*pp. 157--166*, 2012
A language framework for privacy-preserving attribute-based authentication

Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss

Technical Report, Technical Report RZ3818, IBM, 2012

Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss

Technical Report, Technical Report RZ3818, IBM, 2012

Computing on authenticated data

J. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, B. Waters

J. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, B. Waters

*Theory of Cryptography Conference*,*pp. 1--20*, Springer Berlin/Heidelberg, 2012
Electronic identities need private credentials

J Camenisch, A Lehmann, G Neven

Abstract

J Camenisch, A Lehmann, G Neven

*Security & Privacy, IEEE**10*(*1*), IEEE, 2012Abstract

Batch Verification of Short Signatures

J. Camenisch, S. Hohenberger, M.\O. Pedersen

J. Camenisch, S. Hohenberger, M.\O. Pedersen

*Journal of cryptology**25*(*4*), 723--747, Springer, 2012**2011**

A framework for practical universally composable zero-knowledge protocols

J Camenisch, S Krenn, V Shoup

J Camenisch, S Krenn, V Shoup

*Advances in Cryptology--ASIACRYPT 2011*, 449--467, Springer
Further privacy mechanisms

A El Kalam, C Melchor, S Berthold, J Camenisch, S Clauss, Y Deswarte, M Kohlweiss, A Panchenko, L Pimenidis, M Roy

A El Kalam, C Melchor, S Berthold, J Camenisch, S Clauss, Y Deswarte, M Kohlweiss, A Panchenko, L Pimenidis, M Roy

*Digital privacy*, 485--555, Springer, 2011
An introduction to privacy-enhancing identity management

J Camenisch, R Leenes, M Hansen, J Schallaboeck

J Camenisch, R Leenes, M Hansen, J Schallaboeck

*Digital privacy*, 3--21, Springer, 2011
Provably linkable trading

C Kenyon, J Camenisch

C Kenyon, J Camenisch

*Quantitative Finance**11*(*5*), 641--651, Taylor & Francis, 2011
PrimeLife's Legacy

J Camenisch, M Hansen

J Camenisch, M Hansen

*Privacy and Identity Management for Life*, 505--506, Springer, 2011
Cryptographic Mechanisms for Privacy

J Camenisch, M Dubovitskaya, M Kohlweiss, J Lapon, G Neven

J Camenisch, M Dubovitskaya, M Kohlweiss, J Lapon, G Neven

*Privacy and Identity Management for Life*, 117--134, Springer, 2011
Trustworthiness of Online Content

J Camenisch, S Steinbrecher, R Leenes, S Poetzsch, B Kellermann, L Klaming

J Camenisch, S Steinbrecher, R Leenes, S Poetzsch, B Kellermann, L Klaming

*Privacy and Identity Management for Life*, 61--85, Springer, 2011
PrimeLife

A Pfitzmann, K Borcea-Pfitzmann, J Camenisch

A Pfitzmann, K Borcea-Pfitzmann, J Camenisch

*Privacy and Identity Management for Life*, 5--26, Springer, 2011
Open Source Contributions

J Camenisch, B Kellermann, S Koepsell, S Paraboschi, F S Preiss, S Poetzsch, D Raggett, P Samarati, K Wouters

J Camenisch, B Kellermann, S Koepsell, S Paraboschi, F S Preiss, S Poetzsch, D Raggett, P Samarati, K Wouters

*Privacy and Identity Management for Life*, 459--477, Springer, 2011
Structure preserving cca secure encryption and applications

J Camenisch, K Haralambiev, M Kohlweiss, J Lapon, V Naessens

J Camenisch, K Haralambiev, M Kohlweiss, J Lapon, V Naessens

*Advances in Cryptology--ASIACRYPT 2011*, 89--106, Springer
Privacy and identity management for life

J Camenisch, S Fischer-Huebner, K Rannenberg

HÃ¼bner... - 2011 - books.google.com, Springer Verlag

J Camenisch, S Fischer-Huebner, K Rannenberg

HÃ¼bner... - 2011 - books.google.com, Springer Verlag

Digital Privacy: PRIME-Privacy and Identity Management for Europe

J Camenisch, R Leenes, D Sommer

2011 - books.google.com, Springer-Verlag New York Inc

J Camenisch, R Leenes, D Sommer

2011 - books.google.com, Springer-Verlag New York Inc

A Comprehensive Framework Enabling Data-minimizing Authentication

P. Bichsel, J. Camenisch, F.-S. Preiss

P. Bichsel, J. Camenisch, F.-S. Preiss

*Proceedings of the 7th ACM workshop on Digital identity management*,*pp. 13--22*, 2011
Cryptographic primitives for building secure and privacy respecting protocols

Jan Camenisch

Jan Camenisch

*Proceedings of the 18th ACM conference on Computer and communications security*,*pp. 361--362*, 2011
Oblivious transfer with hidden access control policies

J. Camenisch, M. Dubovitskaya, G. Neven, G. Zaverucha

J. Camenisch, M. Dubovitskaya, G. Neven, G. Zaverucha

*Public Key Cryptography--PKC 2011*,*pp. 192-209*, Springer**2010**

Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)

J Camenisch, T Gross, P Hladky, C Hoertnagl

J Camenisch, T Gross, P Hladky, C Hoertnagl

*IDMAN 2010*, Springer
Credential authenticated identification and key exchange

J Camenisch, N Casati, T Gross, V Shoup

J Camenisch, N Casati, T Gross, V Shoup

*Advances in Cryptology--CRYPTO 2010*, 255--276, Springer
A card requirements language enabling privacy-preserving access control

Jan Camenisch, Sebastian Moedersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer

Abstract

Jan Camenisch, Sebastian Moedersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer

*ACM SACMAT 2010*,*pp. 119--128*, ACMAbstract

Unlinkable priced oblivious transfer with rechargeable wallets

Jan Camenisch, Maria Dubovitskaya, Gregory Neven

Jan Camenisch, Maria Dubovitskaya, Gregory Neven

*Financial Cryptography and Data Security*,*pp. 66--81*, Springer, 2010
Saving On-Line Privacy

J Camenisch, G Neven

J Camenisch, G Neven

*Privacy and Identity Management for Life*, 34--47, Springer, 2010
Get Shorty via Group Signatures without Encryption

P. Bichsel, J. Camenisch, G. Neven, N. Smart, B. Warinschi

P. Bichsel, J. Camenisch, G. Neven, N. Smart, B. Warinschi

*SCN 2010*,*pp. 381--398*, Springer
A Formal Model of Identity Mixer

J Camenisch, S Moedersheim, D Sommer

J Camenisch, S Moedersheim, D Sommer

*Formal Methods for Industrial Critical Systems*, 198--214, Springer, 2010
Encrypting Keys Securely

C Cachin, J Camenisch

C Cachin, J Camenisch

*IEEE Security & Privacy**8*(*4*), 66--69, IEEE Computer Society, 2010
Solving Revocation with Efficient Update of Anonymous Credentials

J Camenisch, M Kohlweiss, C Soriente

J Camenisch, M Kohlweiss, C Soriente

*SCN 2010*,*pp. 454*, Springer
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project

Claudio A Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio

Claudio A Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio

*Journal of Computer Security**18*(*1*), 123--160, IOS Press, 2010
Efficiency limitations for Î£-protocols for group homomorphisms

E Bangerter, J Camenisch, S Krenn

E Bangerter, J Camenisch, S Krenn

*Theory of Cryptography*, 553--571, Springer, 2010**2009**

Credential-Based Access Control Extensions to XACML

J Camenisch, S Modersheim, G Neven, F S Preiss, D Sommer

J Camenisch, S Modersheim, G Neven, F S Preiss, D Sommer

*W3C Workshop on Access Control Application Scenarios, Luxembourg*, 2009
Cryptographic Protocols of the Identity Mixer Library, v. 1.0

P. Bichsel, C. Binding, J. Camenisch, T. Gross, T. Heydt-Benjamin, D. Sommer, G. Zaverucha

P. Bichsel, C. Binding, J. Camenisch, T. Gross, T. Heydt-Benjamin, D. Sommer, G. Zaverucha

*IBM Research Report RZ3730*, 2009
Anonymous Credentials on a Standard Java Card

P. Bichsel, J. Camenisch, T. Gross, V. Shoup

P. Bichsel, J. Camenisch, T. Gross, V. Shoup

*ACM CCS*,*pp. 600--610*, ACM Press, 2009
Remarks on" Analysis of one popular group signature scheme" in Asiacrypt 2006

G Ateniese, J Camenisch, M Joye, G Tsudik

G Ateniese, J Camenisch, M Joye, G Tsudik

*International Journal of Applied Cryptography**1*(*4*), 320--322, Inderscience, 2009
Oblivious transfer with access control

Jan Camenisch, Maria Dubovitskaya, Gregory Neven

Jan Camenisch, Maria Dubovitskaya, Gregory Neven

*Proceedings of the 2009 ACM Conference on Computer and Communications Security*,*pp. 131--140*, ACM Press
Accountable privacy supporting services

J Camenisch, T Gross, T S Heydt-Benjamin

J Camenisch, T Gross, T S Heydt-Benjamin

*Identity in the Information Society*, 1--27, Springer, 2009
An accumulator based on bilinear maps and efficient revocation for anonymous credentials

J Camenisch, M Kohlweiss, C Soriente

J Camenisch, M Kohlweiss, C Soriente

*Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09*,*pp. 481--500*, Springer, 2009
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data

J Camenisch, M Kohlweiss, A Rial, C Sheedy

J Camenisch, M Kohlweiss, A Rial, C Sheedy

*Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09*,*pp. 196--214*, Springer, 2009
On the portability of generalized schnorr proofs

J Camenisch, A Kiayias, M Yung

J Camenisch, A Kiayias, M Yung

*EUROCRYPT*,*pp. 425--442*, Springer, 2009
Private intersection of certified sets

J Camenisch, G Zaverucha

J Camenisch, G Zaverucha

*Financial Cryptography and Data Security*, 108--127, Springer, 2009
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks

J Camenisch, N Chandran, V Shoup

J Camenisch, N Chandran, V Shoup

*Eurocrypt 2009*,*pp. 351--368*, Springer Verlag
Randomizable proofs and delegatable anonymous credentials

M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, H Shacham

M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, H Shacham

*Crypto 2009*,*pp. 125*, Springer Verlag, LNCS**2008**

Rethinking Accountable Privacy Supporting Services

J Camenisch, T Gross, T S Heydt-Benjamin

J Camenisch, T Gross, T S Heydt-Benjamin

*ACM Digital Identity Management Workshop (DIM)*,*pp. 1--8*, 2008
Efficient attributes for anonymous credentials

Jan Camenisch, Thomas Gro ss

Abstract

Jan Camenisch, Thomas Gro ss

*Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS'08)*,*pp. 345--356*, ACM Press, 2008Abstract

Efficient protocols for set membership and range proofs

J Camenisch, R Chaabouni, A Shelat

J Camenisch, R Chaabouni, A Shelat

*Asiacrypt 2008, LNCS*,*pp. 252*, Springer Verlag**2007**

Simulatable adaptive oblivious transfer

Jan Camenisch, Gregory Neven, abhi shelat

Jan Camenisch, Gregory Neven, abhi shelat

*Advances in Cryptology -- EUROCRYPT 2007*,*pp. 573--590*, Springer-Verlag
Federated Identity Management

J Camenisch, B Pfitzmann

J Camenisch, B Pfitzmann

*Chapter from the book: Security, Privacy, and Trust in Modern Data Management. ISBN*, 978--3, Springer, 2007**2006**

Remarks on" Analysis of One Popular Group Signature Scheme

G Ateniese, J Camenisch, M Joye, G Tsudik

Technical Report, 2006

G Ateniese, J Camenisch, M Joye, G Tsudik

Technical Report, 2006

Cryptographic Protocols, chapter Direct Anonymous Attestation Explained

J Camenisch

2006 - Addison-Wesley, Addison-Wesley

J Camenisch

2006 - Addison-Wesley, Addison-Wesley

Protecting (anonymous) credentials with the trusted computing groupâ€™s trusted platform modules v1. 2

J Camenisch

J Camenisch

*Proceedings of the 21st IFIP International Information Security Conference (SEC 2006)*
Balancing accountability and privacy using e-cash

Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya

Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya

*Security and Cryptography for Networks*,*pp. 141--155*, Springer, 2006
User Centricity: A Taxonomy and Open Issues

Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gro ss, Dieter Sommer

Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gro ss, Dieter Sommer

*2006 ACM Workshop on Digital Identity Management ({DIM})*,*pp. 1--10*, ACM Press
A general certification framework with applications to privacy-enhancing certificate infrastructures

Jan Camenisch, Dieter Sommer, Roger Zimmermann

Jan Camenisch, Dieter Sommer, Roger Zimmermann

*Security and Privacy in Dynamic Environments*,*pp. 25--37*, Springer, 2006
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security

J Camenisch, T Gross, D Sommer

J Camenisch, T Gross, D Sommer

*Proceedings of the 5th ACM workshop on Privacy in electronic society*,*pp. 67--72*, 2006
How to win the clonewars: efficient periodic n-times anonymous authentication

J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, M Meyerovich

J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, M Meyerovich

*Proceedings of the 13th ACM conference on Computer and communications security*,*pp. 201--210*, ACM, 2006
Securing user inputs for the web

J Camenisch, D Sommer, R Zimmermann, others

J Camenisch, D Sommer, R Zimmermann, others

*Proceedings of the second ACM workshop on Digital identity management*,*pp. 33--44*, 2006
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1. 2

J Camenisch

J Camenisch

*International Information Security Conference (SEC 2006)**201*, 135--147, Springer Boston
Fine-grained forward-secure signature schemes without random oracles

J Camenisch, M Koprowski

J Camenisch, M Koprowski

*Discrete Applied Mathematics**154*(*2*), 175--188, Elsevier, 2006**2005**

Practical Group Signatures without Random Oracles, IACR ePrint Archive, 2005/385

G Ateniese, J Camenisch, B Medeiros de, S Hohenberger

2005

G Ateniese, J Camenisch, B Medeiros de, S Hohenberger

2005

Group Signatures: Better Efficiency and New Theoretical Aspects: Forth Conference on Security in Communication Networks-SCNâ€™04. LNCS 3352

J Camenisch, J Groth

2005 - Springer-Verlag, Springer-Verlag

J Camenisch, J Groth

2005 - Springer-Verlag, Springer-Verlag

A formal treatment of onion routing

J Camenisch, A Lysyanskaya

J Camenisch, A Lysyanskaya

*Advances in Cryptology--CRYPTO 2005*,*pp. 169--187*, Springer
Trust in PRIME

Christer Andersson, Jan Camenisch, Stephen Crane, S Fischer-Hubner, Ronald Leenes, Siani Pearsorr, John S\"oren Pettersson, Dieter Sommer

Christer Andersson, Jan Camenisch, Stephen Crane, S Fischer-Hubner, Ronald Leenes, Siani Pearsorr, John S\"oren Pettersson, Dieter Sommer

*Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on*,*pp. 552--559*
Untraceable RFID tags via insubvertible encryption

G Ateniese, J Camenisch, B Medeiros de

G Ateniese, J Camenisch, B Medeiros de

*Proceedings of the 12th ACM conference on Computer and communications security*,*pp. 92--101*, 2005
Privacy and identity management for everyone

J Camenisch, D Sommer, S Fischer-Huebner, M Hansen, H Krasemann, G Lacoste, R Leenes, J Tseng, others

J Camenisch, D Sommer, S Fischer-Huebner, M Hansen, H Krasemann, G Lacoste, R Leenes, J Tseng, others

*Proceedings of the 2005 workshop on Digital identity management*,*pp. 20--27*, ACM
Efficient blind signatures without random oracles

J Camenisch, M Koprowski, B Warinschi

J Camenisch, M Koprowski, B Warinschi

*SCN*,*pp. 134--148*, Springer, 2005
Practical group signatures without random oracles

G Ateniese, J Camenisch, S Hohenberger, B Medeiros de

G Ateniese, J Camenisch, S Hohenberger, B Medeiros de

*Cryptology ePrint Archive: Report 2005/385*, IACR
Group signatures: Better efficiency and new theoretical aspects

J Camenisch, J Groth

J Camenisch, J Groth

*SCN*,*pp. 120--133*, Springer, 2005
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order

E Bangerter, J Camenisch, U Maurer

E Bangerter, J Camenisch, U Maurer

*Public Key Cryptography*,*pp. 154--171*, Springer, 2005
Anonymous yet accountable access control

Michael Backes, Jan Camenisch, Dieter Sommer

Michael Backes, Jan Camenisch, Dieter Sommer

*Proceedings of the 2005 ACM workshop on Privacy in the electronic society*,*pp. 40--46*, ACM
Mix-network with stronger security

J Camenisch, A Mityagin

J Camenisch, A Mityagin

*Privacy Enhancing Technologies (PET) 2005*,*pp. 128-146*, Springer**2004**

Direct Anonymous Attestation

E Brickell, J Camenisch, Chen Liqun

E Brickell, J Camenisch, Chen Liqun

*Proceedings of the llth ACM Conferenceon Computer and Communication Security. New York: Association for Computing Machinery*, 132--145, 2004
Signature Schemes and Anonymous Credentials from Bilinear Maps, Crypto'04, LNCS

J Camenisch, A Lysyanskaya

2004 - Springer-Verlag, Springer-Verlag

J Camenisch, A Lysyanskaya

2004 - Springer-Verlag, Springer-Verlag

Signature Schemes and Anonymous Credentials from Bilinear Maps; Crypto 2004, LNCS 3152

J Camenisch, A Lysyanskaya

2004 - Springer, Berlin, Springer, Berlin

J Camenisch, A Lysyanskaya

2004 - Springer, Berlin, Springer, Berlin

Efficient Blind Signatures Without Random Oracles

J Camenisch, M Koprowski, B Warinschi

J Camenisch, M Koprowski, B Warinschi

*Security in Communication Networks*, Springer-Verlag, 2004
Direct anonymous attestation

E Brickell, J Camenisch, L Chen

E Brickell, J Camenisch, L Chen

*Proceedings of the 11th ACM conference on Computer and communications security*,*pp. 132--145*, ACM, 2004
Signature schemes and anonymous credentials from bilinear maps

J Camenisch, A Lysyanskaya

J Camenisch, A Lysyanskaya

*Advances in Cryptology - Crypto 2004*,*pp. 56--72*, Springer
Better privacy for trusted computing platforms

Jan Camenisch

Jan Camenisch

*Computer Security--ESORICS 2004*,*pp. 73--88*, Springer
A cryptographic framework for the controlled release of certified data

E Bangerter, J Camenisch, A Lysyanskaya

E Bangerter, J Camenisch, A Lysyanskaya

*Security Protocols*,*pp. 20*, Springer, 2004**2003**

Practical verifiable encryption and decryption of discrete logarithms. CRYPTO 2003 vol. 2729 of LNCS

J Camenisch, V Shoup

2003 - Springer, Berlin, Springer, Berlin

J Camenisch, V Shoup

2003 - Springer, Berlin, Springer, Berlin

A signature scheme with efficient protocols, SCN 2002, LNCS 2576

J Camenisch, A Lysyanskaya

2003 - Springer-Verlag, Springer-Verlag

J Camenisch, A Lysyanskaya

2003 - Springer-Verlag, Springer-Verlag

Practical verifiable encryption and decryption of discrete logarithms

J Camenisch, V Shoup

J Camenisch, V Shoup

*Advances in Cryptologyâ€”CRYPTO*,*pp. 126--144*, Springer, 2003**2002**

Design and implementation of the idemix anonymous credential system

Jan Camenisch, Els Van Herreweghen

Jan Camenisch, Els Van Herreweghen

*Proceedings of the 9th ACM conference on Computer and communications security*,*pp. 21--30*, ACM, 2002
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products

J Algesheimer, J Camenisch, V Shoup

J Algesheimer, J Camenisch, V Shoup

*Crypto 2000*,*pp. 417--432*, Springer, 2002
Dynamic accumulators and application to efficient revocation of anonymous credentials

J Camenisch, A Lysyanskaya

J Camenisch, A Lysyanskaya

*Crypto 2002*,*pp. 101--120*, Springer
A signature scheme with efficient protocols

J Camenisch, A Lysyanskaya

J Camenisch, A Lysyanskaya

*Security in Communication Networks*,*pp. 268--289*, Springer, 2002**2001**

Cryptographic security for mobile code

Joy Algesheimer, Christian Cachin, Jan Camenisch, G\"unter Karjoth

Joy Algesheimer, Christian Cachin, Jan Camenisch, G\"unter Karjoth

*Security and Privacy, 2001. S\&P 2001. Proceedings. 2001 IEEE Symposium on*,*pp. 2--11*
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation

J Camenisch, A Lysyanskaya

J Camenisch, A Lysyanskaya

*Advances in Cryptology-Eurocrypt 2001*,*pp. 93-118*, Springer Verlag
An identity escrow scheme with appointed verifiers

J Camenisch, A Lysyanskaya

J Camenisch, A Lysyanskaya

*Advances in Cryptologyâ€”CRYPTO 2001*,*pp. 388--407*, Springer**2000**

One-round secure computation and secure autonomous mobile agents

Christian Cachin, Jan Camenisch, Joe Kilian, Joy M\"uller

Christian Cachin, Jan Camenisch, Joe Kilian, Joy M\"uller

*Proc*,*pp. 512--523*, Springer, 2000
Confirmer signature schemes secure against adaptive adversaries

J Camenisch, M Michels

J Camenisch, M Michels

*Advances in Cryptologyâ€”EUROCRYPT 2000*,*pp. 243--258*, Springer
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes

J Camenisch, I Damg{aa}rd

J Camenisch, I Damg{aa}rd

*Advances in Cryptologyâ€”ASIACRYPT 2000*, 331--345, Springer
A practical and provably secure coalition-resistant group signature scheme

G Ateniese, J Camenisch, M Joye, G Tsudik

G Ateniese, J Camenisch, M Joye, G Tsudik

*Advances in Cryptologyâ€”CRYPTO 2000*,*pp. 255--270*, Springer
Efficient anonymous fingerprinting with group signatures

J Camenisch

J Camenisch

*Advances in Cryptologyâ€”ASIACRYPT 2000*, 415--428, Springer
Optimistic Fair Secure Computation

Christian Cachin, Jan Camenisch

Christian Cachin, Jan Camenisch

*CRYPTO 2000*,*pp. 94--112*, Springer**1999**

Proving in zero-knowledge that a number is the product of two safe primes

J Camenisch, M Michels

J Camenisch, M Michels

*Eurocrypt '99*,*pp. 107--122*, Springer, LNCS, 1999
Separability and efficiency for generic group signature schemes

J Camenisch, M Michels

J Camenisch, M Michels

*Crypto '99*,*pp. 413--430*, Springer, 1999**1998**

A Group Signature Scheme Based on an RSA-Variant, Advances in Cryptologyâ€”ASIACRYPTâ€™98, LNCS1514

J Camenisch, M Michels

1998 - Springerâ€“Verlag, Springer--Verlag

J Camenisch, M Michels

1998 - Springerâ€“Verlag, Springer--Verlag

A group signature scheme with improved efficiency, Advances in Cryptologyâ€”ASIACRYPTâ€™98 (K. Ohta and D. Pei, eds.), LNCS, vol. 1514

J Camenisch, M Michels

1998 - Springer Verlag, Springer Verlag

J Camenisch, M Michels

1998 - Springer Verlag, Springer Verlag

Group signature schemes and payment systems based on the discrete logarithm problem

J Camenisch

J Camenisch

*ETH Series in Information Security and Cryptography, Diss. ETH No. 12520*, Hartung-Gorre Verlag, Konstanz, 1998
A group signature scheme based on an RSA-variant

J Camenisch, M Michels

J Camenisch, M Michels

*Technical Report*, BRICS, 1998
A group signature scheme with improved efficiency

J Camenisch, M Michels

J Camenisch, M Michels

*Asiacrypt '98*,*pp. 160--174*, Springer, 1998**1997**

Partially blind signature schemes

M Abe, J Camenisch

M Abe, J Camenisch

*Proceedings of Symposium on Cryptography and Information Security*, 1997
Proof systems for general statements about discrete logarithms

J Camenisch, M Stadler

J Camenisch, M Stadler

*Institute for Theoretical Computer Science, ETH Z{\\"u}rich, Tech. Rep. TR**260*, ETH Zurich, 1997
Digital payment systems with passive anonymity-revoking trustees

J Camenisch, U Maurer, M Stadler

J Camenisch, U Maurer, M Stadler

*Computer Securityâ€”ESORICS 96*,*pp. 69--89*, IOS Press, 1997
Efficient group signature schemes for large groups

J Camenisch, M Stadler

J Camenisch, M Stadler

*Advances in Cryptologyâ€”CRYPTO'97**1294*, 410--424, Springer, 1997
Efficient and generalized group signatures

J Camenisch

J Camenisch

*Advances in cryptologyâ€”EUROCRYPTâ€™97*,*pp. 465--479*, Springer, 1997**1996**

An efficient fair payment system

J Camenisch, J M Piveteau, M Stadler

J Camenisch, J M Piveteau, M Stadler

*Proceedings of the 3rd ACM conference on Computer and communications security*,*pp. 88--94*, ACM, 1996**1995**

Fair Anonyme Zahlungssysteme

J Camenisch, J M Piveteau, M Stadler

J Camenisch, J M Piveteau, M Stadler

*Eurocrypt*,*pp. 254--265*, Springer Verlag, 1995**1994**

An Efficient Electronic Payment System Protecting Privacy

J L Camenisch, J M Piveteau, M A Stadler

J L Camenisch, J M Piveteau, M A Stadler

*ESORICS 94*, Springer-Verlag, Berlin, 1994
Blind signatures based on the discrete logarithm problem

J L Camenisch, J M Piveteau, M A Stadler

J L Camenisch, J M Piveteau, M A Stadler

*Advances in Cryptologyâ€”EUROCRYPT'94*,*pp. 428--432*, Springer, 1994**Year Unknown**

Universally Composable Direct Anonymous Attestation

Jan Camenisch, Manu Drijvers, Anja Lehmann

eprint.iacr.org, 0

Jan Camenisch, Manu Drijvers, Anja Lehmann

eprint.iacr.org, 0

Virtual Smart Cards: How to Sign with a Password and a Server

Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin

eprint.iacr.org, 0

Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin

eprint.iacr.org, 0