Jan Camenisch
contact information
Principle Research Staff MemberIBM Research - Zurich +41
44
724
8279



links
Professional Associations
Professional Associations: ACM | Fellow, IACR | Fellow, IEEE | IBM Academy of Technologymore information
More information: Computer Science - Zurich | Security - Zurich2017
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain
Jan Camenisch, Manu Drijvers, Maria Dubovitskaya
ACM Conference on Computer and Communications Security, 2017
Jan Camenisch, Manu Drijvers, Maria Dubovitskaya
ACM Conference on Computer and Communications Security, 2017
Accumulators with Applications to Anonymity-Preserving Revocation
Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov
IEEE European Symposium on Security and Privacy, EuroS&P 2017, IEEE
Abstract
Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov
IEEE European Symposium on Security and Privacy, EuroS&P 2017, IEEE
Abstract
Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible Sanitizable Signatures.
Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:
PKC, Springer, 2017
Abstract
Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:
PKC, Springer, 2017
Abstract
Updatable Tokenization: Formal Definitions and Provably Secure Constructions
Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
Financial Cryptography and Data Security, Springer, 2017
Abstract
Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann
Financial Cryptography and Data Security, Springer, 2017
Abstract
UC-Secure Non-Interactive Public-Key Encryption
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
IEEE CSF - Computer Security Foundations Symposium, , IEEE, 2017
Abstract
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
IEEE CSF - Computer Security Foundations Symposium, , IEEE, 2017
Abstract
Anonymous Attestation with Subverted TPMs
Jan Camenisch, Manu Drijvers, Anja Lehmann
Advances in Cryptography - CRYPTO 2017, Springer
Abstract
Jan Camenisch, Manu Drijvers, Anja Lehmann
Advances in Cryptography - CRYPTO 2017, Springer
Abstract
Privacy-Preserving User-Auditable Pseudonym Systems
Jan Camenisch, Anja Lehmann
IEEE EuroS&P - European Symposium on Security and Privacy, IEEE, 2017
Abstract
Jan Camenisch, Anja Lehmann
IEEE EuroS&P - European Symposium on Security and Privacy, IEEE, 2017
Abstract
One TPM to bind them all: fixing TPM2. 0 for provably secure anonymous attestation
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
Proceedings of IEEE S&P 2017
Abstract
Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian
Proceedings of IEEE S&P 2017
Abstract
Practical Strongly Invisible and Strongly Accountable Sanitizable Signatures
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:
Australasian Conference on Information Security and Privacy, Springer, 2017
Abstract
Michael Till Beck, Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig:
Australasian Conference on Information Security and Privacy, Springer, 2017
Abstract
2016
Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs
Jan Camenisch, Manu Drijvers, Jan Hajny
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 123-133
Jan Camenisch, Manu Drijvers, Jan Hajny
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 123-133
Memory erasability amplification
Camenisch, Jan and Enderlein, Robert R and Maurer, Ueli
International Conference on Security and Cryptography for Networks, pp. 104--125, 2016
Abstract
Camenisch, Jan and Enderlein, Robert R and Maurer, Ueli
International Conference on Security and Cryptography for Networks, pp. 104--125, 2016
Abstract
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited
J Camenisch, M Drijvers, A Lehmann
TRUST 2016, Springer, LNCS
J Camenisch, M Drijvers, A Lehmann
TRUST 2016, Springer, LNCS
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens
Camenisch, Jan and Dubovitskaya, Maria and Rial, Alfredo
Advances in Cryptology - Crypto 2016, Springer, LNCS
Camenisch, Jan and Dubovitskaya, Maria and Rial, Alfredo
Advances in Cryptology - Crypto 2016, Springer, LNCS
Universally Composable Direct Anonymous Attestation
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography - PKC 2016, Springer, LNCS
Abstract
J Camenisch, M Drijvers, A Lehmann
Public-Key Cryptography - PKC 2016, Springer, LNCS
Abstract
Virtual Smart Cards: How to Sign with a Password and a Server
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
SCN 2016
Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin
SCN 2016
Universal composition with responsive environments
Camenisch, Jan and Enderlein, Robert R and Krenn, Stephan and K{"u}sters, Ralf and Rausch, Daniel
Advances in Cryptology--ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II 22, pp. 807--840
Abstract
Camenisch, Jan and Enderlein, Robert R and Krenn, Stephan and K{"u}sters, Ralf and Rausch, Daniel
Advances in Cryptology--ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II 22, pp. 807--840
Abstract
2015
Formal treatment of privacy-enhancing credential systems
Camenisch, Jan and Krenn, Stephan and Lehmann, Anja and Mikkelsen, Gert L{ae}ss{o}e and Neven, Gregory and Pedersen, Michael {O}stergaard
International Conference on Selected Areas in Cryptography, pp. 3--24, 2015
Abstract
Camenisch, Jan and Krenn, Stephan and Lehmann, Anja and Mikkelsen, Gert L{ae}ss{o}e and Neven, Gregory and Pedersen, Michael {O}stergaard
International Conference on Selected Areas in Cryptography, pp. 3--24, 2015
Abstract
An Architecture for Privacy-ABCs
Bichsel, Patrik and Camenisch, Jan and Dubovitskaya, Maria and Enderlein, Robert R and Krenn, Stephan and Krontiris, Ioannis and Lehmann, Anja and Neven, Gregory and Paquin, Christian and Preiss, Franz-Stefan and others
Attribute-based Credentials for Trust, pp. 11--78, Springer, 2015
Bichsel, Patrik and Camenisch, Jan and Dubovitskaya, Maria and Enderlein, Robert R and Krenn, Stephan and Krontiris, Ioannis and Lehmann, Anja and Neven, Gregory and Paquin, Christian and Preiss, Franz-Stefan and others
Attribute-based Credentials for Trust, pp. 11--78, Springer, 2015
(Un) linkable Pseudonyms for Governmental Databases
Camenisch, Jan and Lehmann, Anja
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1467--1479, 2015
Camenisch, Jan and Lehmann, Anja
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 1467--1479, 2015
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
Asiacrypt 2015, Springer
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
Asiacrypt 2015, Springer
Recovering Lost Device-Bound Credentials
Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
International Conference on Applied Cryptography and Network Security - ACNS, Springer, 2015
Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, Gregory Neven
International Conference on Applied Cryptography and Network Security - ACNS, Springer, 2015
A Single Password for Everything?
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
ERCIM News, 2015
Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven
ERCIM News, 2015
Computing on Authenticated Data
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters
Journal of Cryptology , 2015
Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, Brent Waters
Journal of Cryptology , 2015
Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones
J. Camenisch, D. Ortiz-Yepes, Franz-Stefan Preiss
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, pp. 37--48, ACM, 2015
J. Camenisch, D. Ortiz-Yepes, Franz-Stefan Preiss
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, pp. 37--48, ACM, 2015
Optimal Distributed Password Verification
Jan Camenisch, Anja Lehmann, Gregory Neven
ACM Conference on Computer and Communications Security, 2015
Jan Camenisch, Anja Lehmann, Gregory Neven
ACM Conference on Computer and Communications Security, 2015
(Un)linkable Pseudonyms for Governmental Databases
Jan Camenisch, Anja Lehmann
ACM Conference on Computer and Communications Security, 2015
Jan Camenisch, Anja Lehmann
ACM Conference on Computer and Communications Security, 2015
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions
Jan Camenisch, Robert R. Enderlein, and Gregory Neven
Public-Key Cryptography--PKC 2015
Jan Camenisch, Robert R. Enderlein, and Gregory Neven
Public-Key Cryptography--PKC 2015
2014
Composable and modular anonymous credentials: definitions and practical constructions
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
Advances in Cryptology--ASIACRYPT 2015, pp. 262--288, Springer, 2014
Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss
Advances in Cryptology--ASIACRYPT 2015, pp. 262--288, Springer, 2014
Formal Treatment of Privacy-Enhancing Credential Systems.
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L{ae}ss{o}e Mikkelsen, Gregory Neven, Michael {O}stergaard Pedersen
IACR Cryptology ePrint Archive2014, 708
Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert L{ae}ss{o}e Mikkelsen, Gregory Neven, Michael {O}stergaard Pedersen
IACR Cryptology ePrint Archive2014, 708
Authentication and authorisation in entrusted unions
Ayed F Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, John Zic
2014 - ro.ecu.edu.au
Ayed F Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, John Zic
2014 - ro.ecu.edu.au
Concepts and languages for privacy-preserving attribute-based authentication
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Journal of Information Security and Applications, 2014
Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Journal of Information Security and Applications, 2014
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures
Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven
Advances in Cryptology--ASIACRYPT 2014, pp. 551--572, Springer
Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, Gregory Neven
Advances in Cryptology--ASIACRYPT 2014, pp. 551--572, Springer
Integration of Data-Minimising Authentication into Authorisation Systems
Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog
TRUST, pp. 179-187, Springer Verlag, 2014
Dhouha Ayed, Patrik Bichsel, Jan Camenisch, Jerry den Hartog
TRUST, pp. 179-187, Springer Verlag, 2014
Privacy-Preserving Auditing for Attribute-Based Credentials
J Camenisch, A Lehmann, G Neven and A Rial
European Symposium on Research in Computer Security - ESORICS, Springer, LNCS, 2014
Abstract
J Camenisch, A Lehmann, G Neven and A Rial
European Symposium on Research in Computer Security - ESORICS, Springer, LNCS, 2014
Abstract
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Advances in Cryptology - CRYPTO, Springer, LNCS, 2014
Abstract
J Camenisch, A Lehmann, A Lysyanskaya, G Neven
Advances in Cryptology - CRYPTO, Springer, LNCS, 2014
Abstract
On The Impossibility of Structure-Preserving Deterministic Primitives
Masayuki Abe, Jan Camenisch, Rafael Dowsley, and Maria Dubovitskaya
Theory of Cryptography Conference (TCC), pp. 713--738, Springer, 2014
Masayuki Abe, Jan Camenisch, Rafael Dowsley, and Maria Dubovitskaya
Theory of Cryptography Conference (TCC), pp. 713--738, Springer, 2014
Concepts Around Privacy-Preserving Attribute-Based Credentials
Jan Camenisch
Privacy and Identity Management for Emerging Services and Technologies, pp. 53--63, Springer, 2014
Jan Camenisch
Privacy and Identity Management for Emerging Services and Technologies, pp. 53--63, Springer, 2014
Research Challenges to Secure the Future Internet
Jan Camenisch
Secure Data Management, pp. 14--17, Springer, 2014
Jan Camenisch
Secure Data Management, pp. 14--17, Springer, 2014
2013
Universally Composable Adaptive Oblivious Transfer (with Access Control) from Standard Assumptions
Masayuki Abe, Jan Camenisch, Maria Duboviskaya, Ryo Nishimaki
ACM CCS DIM, pp. 1--12, 2013
Masayuki Abe, Jan Camenisch, Maria Duboviskaya, Ryo Nishimaki
ACM CCS DIM, pp. 1--12, 2013
Anonymously sharing Flickr pictures with facebook friends
Jan Camenisch, Guenter Karjoth, Gregory Neven, and Franz-Stefan Preiss
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp. 13--24, 2013
Jan Camenisch, Guenter Karjoth, Gregory Neven, and Franz-Stefan Preiss
Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp. 13--24, 2013
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Z\_n.
Jan Camenisch, Robert R Enderlein, Victor Shoup
ESORICS, pp. 205, 2013
Jan Camenisch, Robert R Enderlein, Victor Shoup
ESORICS, pp. 205, 2013
Future Challenges in Security and Privacy for Academia and Industry
Jan Camenisch, Simone Fischer-Huebner, and Yuko Murayama
Computers & Security (Print)33, 1--170, Elsevier, 2013
Jan Camenisch, Simone Fischer-Huebner, and Yuko Murayama
Computers & Security (Print)33, 1--170, Elsevier, 2013
Fair Private Set Intersection with a Semi-trusted Arbiter
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
DBSec, pp. 128-144, 2013
Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello
DBSec, pp. 128-144, 2013
Recognizing your digital friends
Patrik Bichsel, Jan Camenisch, Mario Verdicchio
Security and Privacy in Social Networks, pp. 27--46, Springer New York, 2013
Patrik Bichsel, Jan Camenisch, Mario Verdicchio
Security and Privacy in Social Networks, pp. 27--46, Springer New York, 2013
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Policies and Research in Identity Management, pp. 34--52, Springer, 2013
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Policies and Research in Identity Management, pp. 34--52, Springer, 2013
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn
Jan Camenisch, Robert R Enderlein, Victor Shoup
Computer Security--ESORICS 2013, pp. 19--37, Springer
Jan Camenisch, Robert R Enderlein, Victor Shoup
Computer Security--ESORICS 2013, pp. 19--37, Springer
2012
Practical yet universally composable two-server password-authenticated secret sharing
J. Camenisch, A. Lysyanskaya, G. Neven
Proceedings of the 2012 ACM conference on Computer and communications security, ACM
J. Camenisch, A. Lysyanskaya, G. Neven
Proceedings of the 2012 ACM conference on Computer and communications security, ACM
Data-Minimizing Authentication Goes Mobile
P. Bichsel, J. Camenisch, B. De Decker, J. Lapon, V. Naessens, D. Sommer
Communications and Multimedia Security, pp. 55--71, Springer Berlin/Heidelberg, 2012
P. Bichsel, J. Camenisch, B. De Decker, J. Lapon, V. Naessens, D. Sommer
Communications and Multimedia Security, pp. 55--71, Springer Berlin/Heidelberg, 2012
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption
J. Camenisch, M. Dubovitskaya, R. Enderlein, G. Neven
Security and Cryptography for Networks, pp. 559--579, Springer Berlin/Heidelberg, 2012
J. Camenisch, M. Dubovitskaya, R. Enderlein, G. Neven
Security and Cryptography for Networks, pp. 559--579, Springer Berlin/Heidelberg, 2012
Fully Anonymous Attribute Tokens from Lattices
J. Camenisch, G. Neven, M. Rückert
Security and Cryptography for Networks, 57--75, Springer Berlin/Heidelberg, 2012
J. Camenisch, G. Neven, M. Rückert
Security and Cryptography for Networks, 57--75, Springer Berlin/Heidelberg, 2012
Efficient Structure-Preserving Signature Scheme from Standard Assumptions
J. Camenisch, M. Dubovitskaya, K. Haralambiev
Security and Cryptography for Networks, pp. 76--94, Springer Berlin/Heidelberg, 2012
J. Camenisch, M. Dubovitskaya, K. Haralambiev
Security and Cryptography for Networks, pp. 76--94, Springer Berlin/Heidelberg, 2012
A Calculus for Privacy-friendly Authentication
P. Bichsel, J. Camenisch, D. Sommer
Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 157--166, 2012
P. Bichsel, J. Camenisch, D. Sommer
Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 157--166, 2012
A language framework for privacy-preserving attribute-based authentication
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Technical Report, Technical Report RZ3818, IBM, 2012
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
Technical Report, Technical Report RZ3818, IBM, 2012
Computing on authenticated data
J. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, B. Waters
Theory of Cryptography Conference, pp. 1--20, Springer Berlin/Heidelberg, 2012
J. Ahn, D. Boneh, J. Camenisch, S. Hohenberger, A. Shelat, B. Waters
Theory of Cryptography Conference, pp. 1--20, Springer Berlin/Heidelberg, 2012
Electronic identities need private credentials
J Camenisch, A Lehmann, G Neven
Security & Privacy, IEEE 10(1), IEEE, 2012
Abstract
J Camenisch, A Lehmann, G Neven
Security & Privacy, IEEE 10(1), IEEE, 2012
Abstract
Batch Verification of Short Signatures
J. Camenisch, S. Hohenberger, M.\O. Pedersen
Journal of cryptology 25(4), 723--747, Springer, 2012
J. Camenisch, S. Hohenberger, M.\O. Pedersen
Journal of cryptology 25(4), 723--747, Springer, 2012
2011
A framework for practical universally composable zero-knowledge protocols
J Camenisch, S Krenn, V Shoup
Advances in Cryptology--ASIACRYPT 2011, 449--467, Springer
J Camenisch, S Krenn, V Shoup
Advances in Cryptology--ASIACRYPT 2011, 449--467, Springer
Further privacy mechanisms
A El Kalam, C Melchor, S Berthold, J Camenisch, S Clauss, Y Deswarte, M Kohlweiss, A Panchenko, L Pimenidis, M Roy
Digital privacy, 485--555, Springer, 2011
A El Kalam, C Melchor, S Berthold, J Camenisch, S Clauss, Y Deswarte, M Kohlweiss, A Panchenko, L Pimenidis, M Roy
Digital privacy, 485--555, Springer, 2011
An introduction to privacy-enhancing identity management
J Camenisch, R Leenes, M Hansen, J Schallaboeck
Digital privacy, 3--21, Springer, 2011
J Camenisch, R Leenes, M Hansen, J Schallaboeck
Digital privacy, 3--21, Springer, 2011
Provably linkable trading
C Kenyon, J Camenisch
Quantitative Finance 11(5), 641--651, Taylor & Francis, 2011
C Kenyon, J Camenisch
Quantitative Finance 11(5), 641--651, Taylor & Francis, 2011
PrimeLife's Legacy
J Camenisch, M Hansen
Privacy and Identity Management for Life, 505--506, Springer, 2011
J Camenisch, M Hansen
Privacy and Identity Management for Life, 505--506, Springer, 2011
Cryptographic Mechanisms for Privacy
J Camenisch, M Dubovitskaya, M Kohlweiss, J Lapon, G Neven
Privacy and Identity Management for Life, 117--134, Springer, 2011
J Camenisch, M Dubovitskaya, M Kohlweiss, J Lapon, G Neven
Privacy and Identity Management for Life, 117--134, Springer, 2011
Trustworthiness of Online Content
J Camenisch, S Steinbrecher, R Leenes, S Poetzsch, B Kellermann, L Klaming
Privacy and Identity Management for Life, 61--85, Springer, 2011
J Camenisch, S Steinbrecher, R Leenes, S Poetzsch, B Kellermann, L Klaming
Privacy and Identity Management for Life, 61--85, Springer, 2011
PrimeLife
A Pfitzmann, K Borcea-Pfitzmann, J Camenisch
Privacy and Identity Management for Life, 5--26, Springer, 2011
A Pfitzmann, K Borcea-Pfitzmann, J Camenisch
Privacy and Identity Management for Life, 5--26, Springer, 2011
Open Source Contributions
J Camenisch, B Kellermann, S Koepsell, S Paraboschi, F S Preiss, S Poetzsch, D Raggett, P Samarati, K Wouters
Privacy and Identity Management for Life, 459--477, Springer, 2011
J Camenisch, B Kellermann, S Koepsell, S Paraboschi, F S Preiss, S Poetzsch, D Raggett, P Samarati, K Wouters
Privacy and Identity Management for Life, 459--477, Springer, 2011
Structure preserving cca secure encryption and applications
J Camenisch, K Haralambiev, M Kohlweiss, J Lapon, V Naessens
Advances in Cryptology--ASIACRYPT 2011, 89--106, Springer
J Camenisch, K Haralambiev, M Kohlweiss, J Lapon, V Naessens
Advances in Cryptology--ASIACRYPT 2011, 89--106, Springer
Privacy and identity management for life
J Camenisch, S Fischer-Huebner, K Rannenberg
Hübner... - 2011 - books.google.com, Springer Verlag
J Camenisch, S Fischer-Huebner, K Rannenberg
Hübner... - 2011 - books.google.com, Springer Verlag
Digital Privacy: PRIME-Privacy and Identity Management for Europe
J Camenisch, R Leenes, D Sommer
2011 - books.google.com, Springer-Verlag New York Inc
J Camenisch, R Leenes, D Sommer
2011 - books.google.com, Springer-Verlag New York Inc
A Comprehensive Framework Enabling Data-minimizing Authentication
P. Bichsel, J. Camenisch, F.-S. Preiss
Proceedings of the 7th ACM workshop on Digital identity management, pp. 13--22, 2011
P. Bichsel, J. Camenisch, F.-S. Preiss
Proceedings of the 7th ACM workshop on Digital identity management, pp. 13--22, 2011
Cryptographic primitives for building secure and privacy respecting protocols
Jan Camenisch
Proceedings of the 18th ACM conference on Computer and communications security, pp. 361--362, 2011
Jan Camenisch
Proceedings of the 18th ACM conference on Computer and communications security, pp. 361--362, 2011
Oblivious transfer with hidden access control policies
J. Camenisch, M. Dubovitskaya, G. Neven, G. Zaverucha
Public Key Cryptography--PKC 2011, pp. 192-209, Springer
J. Camenisch, M. Dubovitskaya, G. Neven, G. Zaverucha
Public Key Cryptography--PKC 2011, pp. 192-209, Springer
2010
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version)
J Camenisch, T Gross, P Hladky, C Hoertnagl
IDMAN 2010, Springer
J Camenisch, T Gross, P Hladky, C Hoertnagl
IDMAN 2010, Springer
Credential authenticated identification and key exchange
J Camenisch, N Casati, T Gross, V Shoup
Advances in Cryptology--CRYPTO 2010, 255--276, Springer
J Camenisch, N Casati, T Gross, V Shoup
Advances in Cryptology--CRYPTO 2010, 255--276, Springer
A card requirements language enabling privacy-preserving access control
Jan Camenisch, Sebastian Moedersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer
ACM SACMAT 2010, pp. 119--128, ACM
Abstract
Jan Camenisch, Sebastian Moedersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer
ACM SACMAT 2010, pp. 119--128, ACM
Abstract
Unlinkable priced oblivious transfer with rechargeable wallets
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Financial Cryptography and Data Security, pp. 66--81, Springer, 2010
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Financial Cryptography and Data Security, pp. 66--81, Springer, 2010
Saving On-Line Privacy
J Camenisch, G Neven
Privacy and Identity Management for Life, 34--47, Springer, 2010
J Camenisch, G Neven
Privacy and Identity Management for Life, 34--47, Springer, 2010
Get Shorty via Group Signatures without Encryption
P. Bichsel, J. Camenisch, G. Neven, N. Smart, B. Warinschi
SCN 2010, pp. 381--398, Springer
P. Bichsel, J. Camenisch, G. Neven, N. Smart, B. Warinschi
SCN 2010, pp. 381--398, Springer
A Formal Model of Identity Mixer
J Camenisch, S Moedersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198--214, Springer, 2010
J Camenisch, S Moedersheim, D Sommer
Formal Methods for Industrial Critical Systems, 198--214, Springer, 2010
Encrypting Keys Securely
C Cachin, J Camenisch
IEEE Security & Privacy 8(4), 66--69, IEEE Computer Society, 2010
C Cachin, J Camenisch
IEEE Security & Privacy 8(4), 66--69, IEEE Computer Society, 2010
Solving Revocation with Efficient Update of Anonymous Credentials
J Camenisch, M Kohlweiss, C Soriente
SCN 2010, pp. 454, Springer
J Camenisch, M Kohlweiss, C Soriente
SCN 2010, pp. 454, Springer
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project
Claudio A Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio
Journal of Computer Security 18(1), 123--160, IOS Press, 2010
Claudio A Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio
Journal of Computer Security 18(1), 123--160, IOS Press, 2010
Efficiency limitations for Σ-protocols for group homomorphisms
E Bangerter, J Camenisch, S Krenn
Theory of Cryptography, 553--571, Springer, 2010
E Bangerter, J Camenisch, S Krenn
Theory of Cryptography, 553--571, Springer, 2010
2009
Randomizable Proofs and Delegatable Anonymous Credentials.
Belenkiy, Mira and Camenisch, Jan and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna and Shacham, Hovav
Crypto, pp. 108--125, 2009
Abstract
Belenkiy, Mira and Camenisch, Jan and Chase, Melissa and Kohlweiss, Markulf and Lysyanskaya, Anna and Shacham, Hovav
Crypto, pp. 108--125, 2009
Abstract
Credential-Based Access Control Extensions to XACML
J Camenisch, S Modersheim, G Neven, F S Preiss, D Sommer
W3C Workshop on Access Control Application Scenarios, Luxembourg, 2009
J Camenisch, S Modersheim, G Neven, F S Preiss, D Sommer
W3C Workshop on Access Control Application Scenarios, Luxembourg, 2009
Cryptographic Protocols of the Identity Mixer Library, v. 1.0
P. Bichsel, C. Binding, J. Camenisch, T. Gross, T. Heydt-Benjamin, D. Sommer, G. Zaverucha
IBM Research Report RZ3730, 2009
P. Bichsel, C. Binding, J. Camenisch, T. Gross, T. Heydt-Benjamin, D. Sommer, G. Zaverucha
IBM Research Report RZ3730, 2009
Anonymous Credentials on a Standard Java Card
P. Bichsel, J. Camenisch, T. Gross, V. Shoup
ACM CCS, pp. 600--610, ACM Press, 2009
P. Bichsel, J. Camenisch, T. Gross, V. Shoup
ACM CCS, pp. 600--610, ACM Press, 2009
Remarks on" Analysis of one popular group signature scheme" in Asiacrypt 2006
G Ateniese, J Camenisch, M Joye, G Tsudik
International Journal of Applied Cryptography 1(4), 320--322, Inderscience, 2009
G Ateniese, J Camenisch, M Joye, G Tsudik
International Journal of Applied Cryptography 1(4), 320--322, Inderscience, 2009
Oblivious transfer with access control
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Proceedings of the 2009 ACM Conference on Computer and Communications Security, pp. 131--140, ACM Press
Jan Camenisch, Maria Dubovitskaya, Gregory Neven
Proceedings of the 2009 ACM Conference on Computer and Communications Security, pp. 131--140, ACM Press
Accountable privacy supporting services
J Camenisch, T Gross, T S Heydt-Benjamin
Identity in the Information Society, 1--27, Springer, 2009
J Camenisch, T Gross, T S Heydt-Benjamin
Identity in the Information Society, 1--27, Springer, 2009
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09, pp. 481--500, Springer, 2009
J Camenisch, M Kohlweiss, C Soriente
Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09, pp. 481--500, Springer, 2009
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data
J Camenisch, M Kohlweiss, A Rial, C Sheedy
Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09, pp. 196--214, Springer, 2009
J Camenisch, M Kohlweiss, A Rial, C Sheedy
Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC'09, pp. 196--214, Springer, 2009
On the portability of generalized schnorr proofs
J Camenisch, A Kiayias, M Yung
EUROCRYPT, pp. 425--442, Springer, 2009
J Camenisch, A Kiayias, M Yung
EUROCRYPT, pp. 425--442, Springer, 2009
Private intersection of certified sets
J Camenisch, G Zaverucha
Financial Cryptography and Data Security, 108--127, Springer, 2009
J Camenisch, G Zaverucha
Financial Cryptography and Data Security, 108--127, Springer, 2009
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks
J Camenisch, N Chandran, V Shoup
Eurocrypt 2009, pp. 351--368, Springer Verlag
J Camenisch, N Chandran, V Shoup
Eurocrypt 2009, pp. 351--368, Springer Verlag
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, H Shacham
Crypto 2009, pp. 125, Springer Verlag, LNCS
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, H Shacham
Crypto 2009, pp. 125, Springer Verlag, LNCS
2008
Rethinking Accountable Privacy Supporting Services
J Camenisch, T Gross, T S Heydt-Benjamin
ACM Digital Identity Management Workshop (DIM), pp. 1--8, 2008
J Camenisch, T Gross, T S Heydt-Benjamin
ACM Digital Identity Management Workshop (DIM), pp. 1--8, 2008
Efficient attributes for anonymous credentials
Jan Camenisch, Thomas Gro ss
Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS'08), pp. 345--356, ACM Press, 2008
Abstract
Jan Camenisch, Thomas Gro ss
Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS'08), pp. 345--356, ACM Press, 2008
Abstract
Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni, A Shelat
Asiacrypt 2008, LNCS, pp. 252, Springer Verlag
J Camenisch, R Chaabouni, A Shelat
Asiacrypt 2008, LNCS, pp. 252, Springer Verlag
2007
Simulatable adaptive oblivious transfer
Jan Camenisch, Gregory Neven, abhi shelat
Advances in Cryptology -- EUROCRYPT 2007, pp. 573--590, Springer-Verlag
Jan Camenisch, Gregory Neven, abhi shelat
Advances in Cryptology -- EUROCRYPT 2007, pp. 573--590, Springer-Verlag
Federated Identity Management
J Camenisch, B Pfitzmann
Chapter from the book: Security, Privacy, and Trust in Modern Data Management. ISBN, 978--3, Springer, 2007
J Camenisch, B Pfitzmann
Chapter from the book: Security, Privacy, and Trust in Modern Data Management. ISBN, 978--3, Springer, 2007
2006
Remarks on" Analysis of One Popular Group Signature Scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Technical Report, 2006
G Ateniese, J Camenisch, M Joye, G Tsudik
Technical Report, 2006
Cryptographic Protocols, chapter Direct Anonymous Attestation Explained
J Camenisch
2006 - Addison-Wesley, Addison-Wesley
J Camenisch
2006 - Addison-Wesley, Addison-Wesley
Protecting (anonymous) credentials with the trusted computing group’s trusted platform modules v1. 2
J Camenisch
Proceedings of the 21st IFIP International Information Security Conference (SEC 2006)
J Camenisch
Proceedings of the 21st IFIP International Information Security Conference (SEC 2006)
Balancing accountability and privacy using e-cash
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
Security and Cryptography for Networks, pp. 141--155, Springer, 2006
Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya
Security and Cryptography for Networks, pp. 141--155, Springer, 2006
User Centricity: A Taxonomy and Open Issues
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gro ss, Dieter Sommer
2006 ACM Workshop on Digital Identity Management ({DIM}), pp. 1--10, ACM Press
Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gro ss, Dieter Sommer
2006 ACM Workshop on Digital Identity Management ({DIM}), pp. 1--10, ACM Press
A general certification framework with applications to privacy-enhancing certificate infrastructures
Jan Camenisch, Dieter Sommer, Roger Zimmermann
Security and Privacy in Dynamic Environments, pp. 25--37, Springer, 2006
Jan Camenisch, Dieter Sommer, Roger Zimmermann
Security and Privacy in Dynamic Environments, pp. 25--37, Springer, 2006
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security
J Camenisch, T Gross, D Sommer
Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 67--72, 2006
J Camenisch, T Gross, D Sommer
Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 67--72, 2006
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, M Meyerovich
Proceedings of the 13th ACM conference on Computer and communications security, pp. 201--210, ACM, 2006
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, M Meyerovich
Proceedings of the 13th ACM conference on Computer and communications security, pp. 201--210, ACM, 2006
Securing user inputs for the web
J Camenisch, D Sommer, R Zimmermann, others
Proceedings of the second ACM workshop on Digital identity management, pp. 33--44, 2006
J Camenisch, D Sommer, R Zimmermann, others
Proceedings of the second ACM workshop on Digital identity management, pp. 33--44, 2006
Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1. 2
J Camenisch
International Information Security Conference (SEC 2006)201, 135--147, Springer Boston
J Camenisch
International Information Security Conference (SEC 2006)201, 135--147, Springer Boston
Fine-grained forward-secure signature schemes without random oracles
J Camenisch, M Koprowski
Discrete Applied Mathematics 154(2), 175--188, Elsevier, 2006
J Camenisch, M Koprowski
Discrete Applied Mathematics 154(2), 175--188, Elsevier, 2006
2005
Practical Group Signatures without Random Oracles, IACR ePrint Archive, 2005/385
G Ateniese, J Camenisch, B Medeiros de, S Hohenberger
2005
G Ateniese, J Camenisch, B Medeiros de, S Hohenberger
2005
Group Signatures: Better Efficiency and New Theoretical Aspects: Forth Conference on Security in Communication Networks-SCN’04. LNCS 3352
J Camenisch, J Groth
2005 - Springer-Verlag, Springer-Verlag
J Camenisch, J Groth
2005 - Springer-Verlag, Springer-Verlag
A formal treatment of onion routing
J Camenisch, A Lysyanskaya
Advances in Cryptology--CRYPTO 2005, pp. 169--187, Springer
J Camenisch, A Lysyanskaya
Advances in Cryptology--CRYPTO 2005, pp. 169--187, Springer
Trust in PRIME
Christer Andersson, Jan Camenisch, Stephen Crane, S Fischer-Hubner, Ronald Leenes, Siani Pearsorr, John S\"oren Pettersson, Dieter Sommer
Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on, pp. 552--559
Christer Andersson, Jan Camenisch, Stephen Crane, S Fischer-Hubner, Ronald Leenes, Siani Pearsorr, John S\"oren Pettersson, Dieter Sommer
Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on, pp. 552--559
Untraceable RFID tags via insubvertible encryption
G Ateniese, J Camenisch, B Medeiros de
Proceedings of the 12th ACM conference on Computer and communications security, pp. 92--101, 2005
G Ateniese, J Camenisch, B Medeiros de
Proceedings of the 12th ACM conference on Computer and communications security, pp. 92--101, 2005
Privacy and identity management for everyone
J Camenisch, D Sommer, S Fischer-Huebner, M Hansen, H Krasemann, G Lacoste, R Leenes, J Tseng, others
Proceedings of the 2005 workshop on Digital identity management, pp. 20--27, ACM
J Camenisch, D Sommer, S Fischer-Huebner, M Hansen, H Krasemann, G Lacoste, R Leenes, J Tseng, others
Proceedings of the 2005 workshop on Digital identity management, pp. 20--27, ACM
Efficient blind signatures without random oracles
J Camenisch, M Koprowski, B Warinschi
SCN, pp. 134--148, Springer, 2005
J Camenisch, M Koprowski, B Warinschi
SCN, pp. 134--148, Springer, 2005
Practical group signatures without random oracles
G Ateniese, J Camenisch, S Hohenberger, B Medeiros de
Cryptology ePrint Archive: Report 2005/385 , IACR
G Ateniese, J Camenisch, S Hohenberger, B Medeiros de
Cryptology ePrint Archive: Report 2005/385 , IACR
Group signatures: Better efficiency and new theoretical aspects
J Camenisch, J Groth
SCN, pp. 120--133, Springer, 2005
J Camenisch, J Groth
SCN, pp. 120--133, Springer, 2005
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order
E Bangerter, J Camenisch, U Maurer
Public Key Cryptography, pp. 154--171, Springer, 2005
E Bangerter, J Camenisch, U Maurer
Public Key Cryptography, pp. 154--171, Springer, 2005
Anonymous yet accountable access control
Michael Backes, Jan Camenisch, Dieter Sommer
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 40--46, ACM
Michael Backes, Jan Camenisch, Dieter Sommer
Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 40--46, ACM
Mix-network with stronger security
J Camenisch, A Mityagin
Privacy Enhancing Technologies (PET) 2005, pp. 128-146, Springer
J Camenisch, A Mityagin
Privacy Enhancing Technologies (PET) 2005, pp. 128-146, Springer
2004
Efficient Blind Signatures Without Random Oracles.
Camenisch, Jan and Koprowski, Maciej and Warinschi, Bogdan
SCN, pp. 134--148, 2004
Abstract
Camenisch, Jan and Koprowski, Maciej and Warinschi, Bogdan
SCN, pp. 134--148, 2004
Abstract
Group Signatures: Better Efficiency and New Theoretical Aspects.
Camenisch, Jan and Groth, Jens
SCN, pp. 120--133, 2004
Abstract
Camenisch, Jan and Groth, Jens
SCN, pp. 120--133, 2004
Abstract
Direct Anonymous Attestation
E Brickell, J Camenisch, Chen Liqun
Proceedings of the llth ACM Conferenceon Computer and Communication Security. New York: Association for Computing Machinery, 132--145, 2004
E Brickell, J Camenisch, Chen Liqun
Proceedings of the llth ACM Conferenceon Computer and Communication Security. New York: Association for Computing Machinery, 132--145, 2004
Signature Schemes and Anonymous Credentials from Bilinear Maps, Crypto'04, LNCS
J Camenisch, A Lysyanskaya
2004 - Springer-Verlag, Springer-Verlag
J Camenisch, A Lysyanskaya
2004 - Springer-Verlag, Springer-Verlag
Signature Schemes and Anonymous Credentials from Bilinear Maps; Crypto 2004, LNCS 3152
J Camenisch, A Lysyanskaya
2004 - Springer, Berlin, Springer, Berlin
J Camenisch, A Lysyanskaya
2004 - Springer, Berlin, Springer, Berlin
Efficient Blind Signatures Without Random Oracles
J Camenisch, M Koprowski, B Warinschi
Security in Communication Networks, Springer-Verlag, 2004
J Camenisch, M Koprowski, B Warinschi
Security in Communication Networks, Springer-Verlag, 2004
Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications security, pp. 132--145, ACM, 2004
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications security, pp. 132--145, ACM, 2004
Signature schemes and anonymous credentials from bilinear maps
J Camenisch, A Lysyanskaya
Advances in Cryptology - Crypto 2004, pp. 56--72, Springer
J Camenisch, A Lysyanskaya
Advances in Cryptology - Crypto 2004, pp. 56--72, Springer
Better privacy for trusted computing platforms
Jan Camenisch
Computer Security--ESORICS 2004, pp. 73--88, Springer
Jan Camenisch
Computer Security--ESORICS 2004, pp. 73--88, Springer
A cryptographic framework for the controlled release of certified data
E Bangerter, J Camenisch, A Lysyanskaya
Security Protocols, pp. 20, Springer, 2004
E Bangerter, J Camenisch, A Lysyanskaya
Security Protocols, pp. 20, Springer, 2004
2003
Practical verifiable encryption and decryption of discrete logarithms. CRYPTO 2003 vol. 2729 of LNCS
J Camenisch, V Shoup
2003 - Springer, Berlin, Springer, Berlin
J Camenisch, V Shoup
2003 - Springer, Berlin, Springer, Berlin
A signature scheme with efficient protocols, SCN 2002, LNCS 2576
J Camenisch, A Lysyanskaya
2003 - Springer-Verlag, Springer-Verlag
J Camenisch, A Lysyanskaya
2003 - Springer-Verlag, Springer-Verlag
Practical verifiable encryption and decryption of discrete logarithms
J Camenisch, V Shoup
Advances in Cryptology—CRYPTO, pp. 126--144, Springer, 2003
J Camenisch, V Shoup
Advances in Cryptology—CRYPTO, pp. 126--144, Springer, 2003
2002
Design and implementation of the idemix anonymous credential system
Jan Camenisch, Els Van Herreweghen
Proceedings of the 9th ACM conference on Computer and communications security, pp. 21--30, ACM, 2002
Jan Camenisch, Els Van Herreweghen
Proceedings of the 9th ACM conference on Computer and communications security, pp. 21--30, ACM, 2002
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products
J Algesheimer, J Camenisch, V Shoup
Crypto 2000, pp. 417--432, Springer, 2002
J Algesheimer, J Camenisch, V Shoup
Crypto 2000, pp. 417--432, Springer, 2002
Dynamic accumulators and application to efficient revocation of anonymous credentials
J Camenisch, A Lysyanskaya
Crypto 2002, pp. 101--120, Springer
J Camenisch, A Lysyanskaya
Crypto 2002, pp. 101--120, Springer
A signature scheme with efficient protocols
J Camenisch, A Lysyanskaya
Security in Communication Networks , pp. 268--289, Springer, 2002
J Camenisch, A Lysyanskaya
Security in Communication Networks , pp. 268--289, Springer, 2002
2001
Cryptographic security for mobile code
Joy Algesheimer, Christian Cachin, Jan Camenisch, G\"unter Karjoth
Security and Privacy, 2001. S\&P 2001. Proceedings. 2001 IEEE Symposium on, pp. 2--11
Joy Algesheimer, Christian Cachin, Jan Camenisch, G\"unter Karjoth
Security and Privacy, 2001. S\&P 2001. Proceedings. 2001 IEEE Symposium on, pp. 2--11
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
J Camenisch, A Lysyanskaya
Advances in Cryptology-Eurocrypt 2001, pp. 93-118, Springer Verlag
J Camenisch, A Lysyanskaya
Advances in Cryptology-Eurocrypt 2001, pp. 93-118, Springer Verlag
An identity escrow scheme with appointed verifiers
J Camenisch, A Lysyanskaya
Advances in Cryptology—CRYPTO 2001, pp. 388--407, Springer
J Camenisch, A Lysyanskaya
Advances in Cryptology—CRYPTO 2001, pp. 388--407, Springer
2000
One-round secure computation and secure autonomous mobile agents
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M\"uller
Proc, pp. 512--523, Springer, 2000
Christian Cachin, Jan Camenisch, Joe Kilian, Joy M\"uller
Proc, pp. 512--523, Springer, 2000
Confirmer signature schemes secure against adaptive adversaries
J Camenisch, M Michels
Advances in Cryptology—EUROCRYPT 2000, pp. 243--258, Springer
J Camenisch, M Michels
Advances in Cryptology—EUROCRYPT 2000, pp. 243--258, Springer
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
J Camenisch, I Damg{aa}rd
Advances in Cryptology—ASIACRYPT 2000, 331--345, Springer
J Camenisch, I Damg{aa}rd
Advances in Cryptology—ASIACRYPT 2000, 331--345, Springer
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000, pp. 255--270, Springer
G Ateniese, J Camenisch, M Joye, G Tsudik
Advances in Cryptology—CRYPTO 2000, pp. 255--270, Springer
Efficient anonymous fingerprinting with group signatures
J Camenisch
Advances in Cryptology—ASIACRYPT 2000, 415--428, Springer
J Camenisch
Advances in Cryptology—ASIACRYPT 2000, 415--428, Springer
Optimistic Fair Secure Computation
Christian Cachin, Jan Camenisch
CRYPTO 2000, pp. 94--112, Springer
Christian Cachin, Jan Camenisch
CRYPTO 2000, pp. 94--112, Springer
1999
Proving in zero-knowledge that a number is the product of two safe primes
J Camenisch, M Michels
Eurocrypt '99, pp. 107--122, Springer, LNCS, 1999
J Camenisch, M Michels
Eurocrypt '99, pp. 107--122, Springer, LNCS, 1999
Separability and efficiency for generic group signature schemes
J Camenisch, M Michels
Crypto '99, pp. 413--430, Springer, 1999
J Camenisch, M Michels
Crypto '99, pp. 413--430, Springer, 1999
1998
A Group Signature Scheme Based on an RSA-Variant, Advances in Cryptology—ASIACRYPT’98, LNCS1514
J Camenisch, M Michels
1998 - Springer–Verlag, Springer--Verlag
J Camenisch, M Michels
1998 - Springer–Verlag, Springer--Verlag
A group signature scheme with improved efficiency, Advances in Cryptology—ASIACRYPT’98 (K. Ohta and D. Pei, eds.), LNCS, vol. 1514
J Camenisch, M Michels
1998 - Springer Verlag, Springer Verlag
J Camenisch, M Michels
1998 - Springer Verlag, Springer Verlag
Group signature schemes and payment systems based on the discrete logarithm problem
J Camenisch
ETH Series in Information Security and Cryptography, Diss. ETH No. 12520, Hartung-Gorre Verlag, Konstanz, 1998
J Camenisch
ETH Series in Information Security and Cryptography, Diss. ETH No. 12520, Hartung-Gorre Verlag, Konstanz, 1998
A group signature scheme based on an RSA-variant
J Camenisch, M Michels
Technical Report, BRICS, 1998
J Camenisch, M Michels
Technical Report, BRICS, 1998
A group signature scheme with improved efficiency
J Camenisch, M Michels
Asiacrypt '98, pp. 160--174, Springer, 1998
J Camenisch, M Michels
Asiacrypt '98, pp. 160--174, Springer, 1998
1997
Partially blind signature schemes
M Abe, J Camenisch
Proceedings of Symposium on Cryptography and Information Security, 1997
M Abe, J Camenisch
Proceedings of Symposium on Cryptography and Information Security, 1997
Proof systems for general statements about discrete logarithms
J Camenisch, M Stadler
Institute for Theoretical Computer Science, ETH Z{\\"u}rich, Tech. Rep. TR260, ETH Zurich, 1997
J Camenisch, M Stadler
Institute for Theoretical Computer Science, ETH Z{\\"u}rich, Tech. Rep. TR260, ETH Zurich, 1997
Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Computer Security—ESORICS 96, pp. 69--89, IOS Press, 1997
J Camenisch, U Maurer, M Stadler
Computer Security—ESORICS 96, pp. 69--89, IOS Press, 1997
Efficient group signature schemes for large groups
J Camenisch, M Stadler
Advances in Cryptology—CRYPTO'971294, 410--424, Springer, 1997
J Camenisch, M Stadler
Advances in Cryptology—CRYPTO'971294, 410--424, Springer, 1997
Efficient and generalized group signatures
J Camenisch
Advances in cryptology—EUROCRYPT’97, pp. 465--479, Springer, 1997
J Camenisch
Advances in cryptology—EUROCRYPT’97, pp. 465--479, Springer, 1997
1996
An efficient fair payment system
J Camenisch, J M Piveteau, M Stadler
Proceedings of the 3rd ACM conference on Computer and communications security, pp. 88--94, ACM, 1996
J Camenisch, J M Piveteau, M Stadler
Proceedings of the 3rd ACM conference on Computer and communications security, pp. 88--94, ACM, 1996
1995
Fair Anonyme Zahlungssysteme
J Camenisch, J M Piveteau, M Stadler
Eurocrypt, pp. 254--265, Springer Verlag, 1995
J Camenisch, J M Piveteau, M Stadler
Eurocrypt, pp. 254--265, Springer Verlag, 1995
1994
An Efficient Electronic Payment System Protecting Privacy
J L Camenisch, J M Piveteau, M A Stadler
ESORICS 94, Springer-Verlag, Berlin, 1994
J L Camenisch, J M Piveteau, M A Stadler
ESORICS 94, Springer-Verlag, Berlin, 1994
Blind signatures based on the discrete logarithm problem
J L Camenisch, J M Piveteau, M A Stadler
Advances in Cryptology—EUROCRYPT'94, pp. 428--432, Springer, 1994
J L Camenisch, J M Piveteau, M A Stadler
Advances in Cryptology—EUROCRYPT'94, pp. 428--432, Springer, 1994