# Anja Lehmann

## contact information

Research Staff Member

IBM Research - Zurich, Switzerland

+41447248351

IBM Research - Zurich, Switzerland

+41447248351

## links

**2017**

UC-Secure Non-Interactive Public-Key Encryption

J Camenisch, A Lehmann, G Neven, K Samelin

Abstract

J Camenisch, A Lehmann, G Neven, K Samelin

*IEEE CSF - Computer Security Foundations Symposium*, 2017Abstract

One TPM to Bind Them All: Fixing TPM2.0 for Provably Secure Anonymous Attestation

J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian

Abstract

J Camenisch, L Chen, M Drijvers, A Lehmann, D Novick, R Urian

*IEEE S&P - Symposium on Security and Privacy*, 2017Abstract

Privacy-Preserving User-Auditable Pseudonym Systems

J Camenisch, A Lehmann

Abstract

J Camenisch, A Lehmann

*IEEE EuroS&P - European Symposium on Security and Privacy*, 2017Abstract

Updatable Tokenization: Formal Definitions and Provably Secure Constructions

C Cachin, J Camenisch, E Freire-Stoegbuchner, A Lehmann

Abstract

C Cachin, J Camenisch, E Freire-Stoegbuchner, A Lehmann

*Financial Cryptography and Data Security*, 2017Abstract

**2016**

Virtual Smart Cards: How to Sign with a Password and a Server

J Camenisch, A Lehmann, G Neven, K Samelin

Abstract

J Camenisch, A Lehmann, G Neven, K Samelin

*10th Conference on Security and Cryptography for Networks - SCN 2016*, Springer, LNCSAbstract

Universally Composable Direct Anonymous Attestation

J Camenisch, M Drijvers, A Lehmann

Abstract

J Camenisch, M Drijvers, A Lehmann

*Public-Key Cryptography - PKC 2016*, Springer, LNCSAbstract

Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited

J Camenisch, M Drijvers, A Lehmann

Abstract

J Camenisch, M Drijvers, A Lehmann

*9th International Conference on Trust & Trustworthy Computing - TRUST 2016*, Springer, LNCSAbstract

**2015**

Privacy for Distributed Databases via (Un)linkable Pseudonyms

J Camenisch, A Lehmann

Abstract

J Camenisch, A Lehmann

*ACM CCS*, 2015Abstract

Formal Treatment of Privacy-Enhancing Credential Systems

J Camenisch, S Krenn, A Lehmann, G Mikkelsen, G Neven, M Pedersen

Abstract

J Camenisch, S Krenn, A Lehmann, G Mikkelsen, G Neven, M Pedersen

*Selected Areas in Cryptography - SAC*, 2015Abstract

Recovering Lost Device-Bound Credentials

F Baldimtsi, J Camenisch, L Hanzlik, S Krenn, A Lehmann, G Neven

Abstract

F Baldimtsi, J Camenisch, L Hanzlik, S Krenn, A Lehmann, G Neven

*International Conference on Applied Cryptography and Network Security - ACNS*, Springer, LNCS, 2015Abstract

[Book Chapter] Cryptographic Protocols Underlying Privacy-ABCs

P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss

P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss

*Attribute-based Credentials for Trust - Identity in the Information Society*, Springer, 2015
[Book Chapter] An Architecture for Privacy-ABCs

P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss

P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, A Lehmann, G Neven, F-S Preiss

*Attribute-based Credentials for Trust - Identity in the Information Society*, Springer, 2015**2014**

Privacy-Preserving Auditing for Attribute-Based Credentials

J Camenisch, A Lehmann, G Neven and A Rial

Abstract

J Camenisch, A Lehmann, G Neven and A Rial

*European Symposium on Research in Computer Security - ESORICS*, Springer, LNCS, 2014Abstract

Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment

J Camenisch, A Lehmann, A Lysyanskaya, G Neven

Abstract

J Camenisch, A Lehmann, A Lysyanskaya, G Neven

*Advances in Cryptology - CRYPTO*, Springer, LNCS, 2014Abstract

Robust Multi-Property Combiners for Hash Functions

M Fischlin, A Lehmann, K Pietrzak

Abstract

M Fischlin, A Lehmann, K Pietrzak

*Journal of Cryptology**27*(*3*), 2014Abstract

**2013**

Authentisierung mit der Open eCard App - Von Ausweiskarten zu datenschutzfreundlichen Credentials

M Horsch, D Huehnlein, A Lehmann, J Schmoelz, T Wich

M Horsch, D Huehnlein, A Lehmann, J Schmoelz, T Wich

*Datenschutz und Datensicherheit**(Ausgabe 8/13)*, 2013
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.

J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin and F Preiss.

Abstract

J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin and F Preiss.

*IFIP IDMAN 2013: Policies & Research in Identity Management*Abstract

**2012**

History-free sequential aggregate signatures

M Fischlin, A Lehmann, D Schroeder

Abstract

M Fischlin, A Lehmann, D Schroeder

*Security and Cryptography for Networks - SCN*, Springer, LNCS, 2012Abstract

On the Joint Security of Encryption and Signature in EMV

J Degabriele, A Lehmann, K Paterson, N Smart, M Strefler

Abstract

J Degabriele, A Lehmann, K Paterson, N Smart, M Strefler

*Topics in Cryptology - CT-RSA*, Springer, LNCS, 2012Abstract

Electronic identities need private credentials

J Camenisch, A Lehmann, G Neven

Abstract

J Camenisch, A Lehmann, G Neven

*Security & Privacy, IEEE**10*(*1*), IEEE, 2012Abstract

**2011**

Random Oracles in a Quantum World

D Boneh, O Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry

Abstract

D Boneh, O Dagdelen, M Fischlin, A Lehmann, C Schaffner, M Zhandry

*Advances in Cryptology - ASIACRYPT*, Springer, LNCS, 2011Abstract

**2010**

Hash Function Combiners in TLS and SSL

M Fischlin, A Lehmann, D Wagner

Abstract

M Fischlin, A Lehmann, D Wagner

*Topics in Cryptology - CT-RSA*, Springer, LNCS, 2010Abstract

Delayed-key message authentication for streams

M Fischlin, A Lehmann

Abstract

M Fischlin, A Lehmann

*Theory of Cryptography - TCC*, Springer, LNCS, 2010Abstract

Public-key encryption with non-interactive opening: New constructions and stronger definitions

D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, D Schroeder

Abstract

D Galindo, B Libert, M Fischlin, G Fuchsbauer, A Lehmann, M Manulis, D Schroeder

*Progress in Cryptology - AFRICACRYPT*, Springer, LNCS, 2010Abstract

Unlinkability of sanitizable signatures

C Brzuska, M Fischlin, A Lehmann, D Schroeder

Abstract

C Brzuska, M Fischlin, A Lehmann, D Schroeder

*Public Key Cryptography - PKC*, Springer, LNCS, 2010Abstract

History-free aggregate message authentication codes

O Eikemeier, M Fischlin, J-F Goetzmann, A Lehmann, D Schroeder, P Schroeder, D Wagner

Abstract

O Eikemeier, M Fischlin, J-F Goetzmann, A Lehmann, D Schroeder, P Schroeder, D Wagner

*Security and Cryptography for Networks - SCN*, Springer, LNCS, 2010Abstract

Random oracles with(out) programmability

M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro

Abstract

M Fischlin, A Lehmann, T Ristenpart, T Shrimpton, M Stam, S Tessaro

*Advances in Cryptology - ASIACRYPT*, Springer, LNCS, 2010Abstract

**2009**

Sanitizable signatures: how to partially delegate control for authenticated data

C Brzuska, M Fischlin, A Lehmann, D Schroeder

Abstract

C Brzuska, M Fischlin, A Lehmann, D Schroeder

*BIOSIG - Proceedings of the Special Interest Group on Biometrics and Electronic Signatures*, Citeseer, 2009Abstract

Security of sanitizable signatures revisited

C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, D Schroeder, F Volk

Abstract

C Brzuska, M Fischlin, T Freudenreich, A Lehmann, M Page, J Schelbert, D Schroeder, F Volk

*Public Key Cryptography - PKC*, Springer, LNCS, 2009Abstract

A modular design for hash functions: Towards making the mix-compress-mix approach practical

A Lehmann, S Tessaro

Abstract

A Lehmann, S Tessaro

*Advances in Cryptology - ASIACRYPT*, Springer, LNCS, 2009Abstract

**2008**

Multi-property preserving combiners for hash functions

M Fischlin, A Lehmann

Abstract

M Fischlin, A Lehmann

*Theory of Cryptography - TCC*, Springer, LNCS, 2008Abstract

Robust multi-property combiners for hash functions revisited

M Fischlin, A Lehmann, K Pietrzak

Abstract

M Fischlin, A Lehmann, K Pietrzak

*35th International Colloquium on Automata, Languages and Programming - ICALP*, Springer, LNCS, 2008Abstract

**2007**

Security of invertible media authentication schemes revisited

D Doenigus, S Endler, M Fischlin, A Huelsing, P Jaeger, A Lehmann, S Podrazhansky, S Schipp, E Tews, S Vowe, M Walthart, F Weidemann

Abstract

D Doenigus, S Endler, M Fischlin, A Huelsing, P Jaeger, A Lehmann, S Podrazhansky, S Schipp, E Tews, S Vowe, M Walthart, F Weidemann

*9th International Conference on Information Hiding*, Springer, LNCS, 2007Abstract

Security-amplifying combiners for collision-resistant hash functions

M Fischlin, A Lehmann

Abstract

M Fischlin, A Lehmann

*Advances in Cryptology - CRYPTO*, Springer, LNCS, 2007Abstract