Camenisch, Jan; Drijvers, Manu; Hanke, Timo; Pignolet, Yvonne-Anne; Shoup, Victor; Williams, Dominic Internet computer consensus. (English) Zbl 07824252 Milani, Alessia (ed.) et al., Proceedings of the 41st ACM symposium on principles of distributed computing, PODC ’22, Salerno, Italy, July 25–29, 2022. New York, NY: Association for Computing Machinery (ACM). 81-91 (2022). MSC: 68M14 68W15 PDFBibTeX XMLCite \textit{J. Camenisch} et al., in: Proceedings of the 41st ACM symposium on principles of distributed computing, PODC '22, Salerno, Italy, July 25--29, 2022. New York, NY: Association for Computing Machinery (ACM). 81--91 (2022; Zbl 07824252) Full Text: DOI
Camenisch, Jan; Drijvers, Manu; Lehmann, Anja; Neven, Gregory; Towa, Patrick Short threshold dynamic group signatures. (English) Zbl 1506.94075 Galdi, Clemente (ed.) et al., Security and cryptography for networks. 12th international conference, SCN 2020, Amalfi, Italy, September 14–16, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12238, 401-423 (2020). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 12238, 401--423 (2020; Zbl 1506.94075) Full Text: DOI
Boschini, Cecilia; Camenisch, Jan; Ovsiankin, Max; Spooner, Nicholas Efficient post-quantum SNARKs for RSIS and RLWE and their applications to privacy. (English) Zbl 1501.94032 Ding, Jinta (ed.) et al., Post-quantum cryptography. 11th international conference, PQCrypto 2020, Paris, France, April 15–17, 2020. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 12100, 247-267 (2020). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{C. Boschini} et al., Lect. Notes Comput. Sci. 12100, 247--267 (2020; Zbl 1501.94032) Full Text: DOI
Camenisch, Jan; De Caro, Angelo; Ghosh, Esha; Sorniotti, Alessandro Oblivious PRF on committed vector inputs and application to deduplication of encrypted data. (English) Zbl 1460.94040 Goldberg, Ian (ed.) et al., Financial cryptography and data security. 23rd international conference, FC 2019, Frigate Bay, St. Kitts and Nevis, February 18–22, 2019. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 11598, 337-356 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 11598, 337--356 (2019; Zbl 1460.94040) Full Text: DOI
Camenisch, Jan; Krenn, Stephan; Küsters, Ralf; Rausch, Daniel iUC: flexible universal composability made simple. (English) Zbl 1455.94134 Galbraith, Steven D. (ed.) et al., Advances in cryptology – ASIACRYPT 2019. 25th international conference on the theory and application of cryptology and information security, Kobe, Japan, December 8–12, 2019. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 11923, 191-221 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 11923, 191--221 (2019; Zbl 1455.94134) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Towa, Patrick Efficient fully secure leakage-deterring encryption. (English) Zbl 1454.94056 Albrecht, Martin (ed.), Cryptography and coding. 17th IMA international conference, IMACC 2019, Oxford, UK, December 16–18, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11929, 102-127 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 11929, 102--127 (2019; Zbl 1454.94056) Full Text: DOI
Bradley, Tatiana; Camenisch, Jan; Jarecki, Stanislaw; Lehmann, Anja; Neven, Gregory; Xu, Jiayu Password-authenticated public-key encryption. (English) Zbl 1458.94296 Deng, Robert H. (ed.) et al., Applied cryptography and network security. 17th international conference, ACNS 2019, Bogota, Colombia, June 5–7, 2019. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11464, 442-462 (2019). MSC: 94A62 PDFBibTeX XMLCite \textit{T. Bradley} et al., Lect. Notes Comput. Sci. 11464, 442--462 (2019; Zbl 1458.94296) Full Text: DOI
Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria On the impossibility of structure-preserving deterministic primitives. (English) Zbl 1435.94120 J. Cryptology 32, No. 1, 239-264 (2019). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., J. Cryptology 32, No. 1, 239--264 (2019; Zbl 1435.94120) Full Text: DOI
Boschini, Cecilia; Camenisch, Jan; Neven, Gregory Relaxed lattice-based signatures with short zero-knowledge proofs. (English) Zbl 1517.94183 Chen, Liqun (ed.) et al., Information security. 21st international conference, ISC 2018, Guildford, UK, September 9–12, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 11060, 3-22 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Boschini} et al., Lect. Notes Comput. Sci. 11060, 3--22 (2018; Zbl 1517.94183) Full Text: DOI
Camenisch, Jan (ed.); Papadimitratos, Panos (ed.) Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 – October 3, 2018. Proceedings. (English) Zbl 1425.68007 Lecture Notes in Computer Science 11124. Cham: Springer (ISBN 978-3-030-00433-0/pbk; 978-3-030-00434-7/ebook). xiii, 518 p. (2018). MSC: 68-06 94-06 68P25 94A60 94A62 00B25 PDFBibTeX XMLCite \textit{J. Camenisch} (ed.) and \textit{P. Papadimitratos} (ed.), Cryptology and network security. 17th international conference, CANS 2018, Naples, Italy, September 30 -- October 3, 2018. Proceedings. Cham: Springer (2018; Zbl 1425.68007) Full Text: DOI
Boschini, Cecilia; Camenisch, Jan; Neven, Gregory Floppy-sized group signatures from lattices. (English) Zbl 1440.94090 Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 163-182 (2018). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{C. Boschini} et al., Lect. Notes Comput. Sci. 10892, 163--182 (2018; Zbl 1440.94090) Full Text: DOI Link
Camenisch, Jan; Drijvers, Manu; Gagliardoni, Tommaso; Lehmann, Anja; Neven, Gregory The wonderful world of global random oracles. (English) Zbl 1423.94057 Nielsen, Jesper Buus (ed.) et al., Advances in cryptology – EUROCRYPT 2018. 37th annual international conference on the theory and applications of cryptographic techniques, Tel Aviv, Israel, April 29 – May 3, 2018. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10820, 280-312 (2018). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 10820, 280--312 (2018; Zbl 1423.94057) Full Text: DOI
Adams, Carlisle (ed.); Camenisch, Jan (ed.) Selected areas in cryptography – SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16–18, 2017. Revised selected papers. (English) Zbl 1380.94004 Lecture Notes in Computer Science 10719. Cham: Springer (ISBN 978-3-319-72564-2/pbk; 978-3-319-72565-9/ebook). xi, 459 p. (2018). MSC: 94-06 94A60 00B25 PDFBibTeX XMLCite \textit{C. Adams} (ed.) and \textit{J. Camenisch} (ed.), Selected areas in cryptography -- SAC 2017. 24th international conference, Ottawa, ON, Canada, August 16--18, 2017. Revised selected papers. Cham: Springer (2018; Zbl 1380.94004) Full Text: DOI
Cachin, Christian; Camenisch, Jan; Freire-Stögbuchner, Eduarda; Lehmann, Anja Updatable tokenization: formal definitions and provably secure constructions. (English) Zbl 1457.94105 Kiayias, Aggelos (ed.), Financial cryptography and data security. 21st international conference, FC 2017, Sliema, Malta, April 3–7, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10322, 59-75 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{C. Cachin} et al., Lect. Notes Comput. Sci. 10322, 59--75 (2017; Zbl 1457.94105) Full Text: DOI
Camenisch, Jan; Drijvers, Manu; Lehmann, Anja Anonymous attestation with subverted TPMs. (English) Zbl 1418.94036 Katz, Jonathan (ed.) et al., Advances in cryptology – CRYPTO 2017. 37th annual international cryptology conference, Santa Barbara, CA, USA, August 20–24, 2017. Proceedings. Part III. Cham: Springer. Lect. Notes Comput. Sci. 10403, 427-461 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 10403, 427--461 (2017; Zbl 1418.94036) Full Text: DOI
Beck, Michael Till; Camenisch, Jan; Derler, David; Krenn, Stephan; Pöhls, Henrich C.; Samelin, Kai; Slamanig, Daniel Practical strongly invisible and strongly accountable sanitizable signatures. (English) Zbl 1416.94041 Pieprzyk, Josef (ed.) et al., Information security and privacy. 22nd Australasian conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017. Proceedings. Part I. Cham: Springer. Lect. Notes Comput. Sci. 10342, 437-452 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{M. T. Beck} et al., Lect. Notes Comput. Sci. 10342, 437--452 (2017; Zbl 1416.94041) Full Text: DOI
Camenisch, Jan; Derler, David; Krenn, Stephan; Pöhls, Henrich C.; Samelin, Kai; Slamanig, Daniel Chameleon-hashes with ephemeral trapdoors and applications to invisible sanitizable signatures. (English) Zbl 1400.94128 Fehr, Serge (ed.), Public-key cryptography – PKC 2017. 20th IACR international conference on practice and theory in public-key cryptography, Amsterdam, The Netherlands, March 28–31, 2017. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-54387-0/pbk; 978-3-662-54388-7/ebook). Lecture Notes in Computer Science 10175, 152-182 (2017). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 10175, 152--182 (2017; Zbl 1400.94128) Full Text: DOI
Camenisch, Jan; Enderlein, Robert R.; Krenn, Stephan; Küsters, Ralf; Rausch, Daniel Universal composition with responsive environments. (English) Zbl 1407.94092 Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 807-840 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 10032, 807--840 (2016; Zbl 1407.94092) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Rial, Alfredo UC commitments for modular protocol design and applications to revocation and attribute tokens. (English) Zbl 1406.94031 Robshaw, Matthew (ed.) et al., Advances in cryptology – CRYPTO 2016. 36th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2016. Proceedings. Part III. Berlin: Springer (ISBN 978-3-662-53014-6/pbk; 978-3-662-53015-3/ebook). Lecture Notes in Computer Science 9816, 208-239 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9816, 208--239 (2016; Zbl 1406.94031) Full Text: DOI Link
Camenisch, Jan; Lehmann, Anja; Neven, Gregory; Samelin, Kai Virtual smart cards: how to sign with a password and a server. (English) Zbl 1478.94106 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 9841, 353-371 (2016). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9841, 353--371 (2016; Zbl 1478.94106) Full Text: DOI
Camenisch, Jan; Enderlein, Robert R.; Maurer, Ueli Memory erasability amplification. (English) Zbl 1400.94129 Zikas, Vassilis (ed.) et al., Security and cryptography for networks. 10th international conference, SCN 2016, Amalfi, Italy, August 31 – September 2, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-44617-2/pbk; 978-3-319-44618-9/ebook). Lecture Notes in Computer Science 9841, 104-125 (2016). MSC: 94A60 68P30 94C15 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9841, 104--125 (2016; Zbl 1400.94129) Full Text: DOI
Camenisch, Jan; Krenn, Stephan; Lehmann, Anja; Mikkelsen, Gert Læssøe; Neven, Gregory; Pedersen, Michael Østergaard Formal treatment of privacy-enhancing credential systems. (English) Zbl 1339.94074 Dunkelman, Orr (ed.) et al., Selected areas in cryptography – SAC 2015. 22nd international conference, Sackville, NB, Canada, August 12–14, 2015. Revised selected papers. Cham: Springer (ISBN 978-3-319-31300-9/pbk; 978-3-319-31301-6/ebook). Lecture Notes in Computer Science 9566, 3-24 (2016). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9566, 3--24 (2016; Zbl 1339.94074) Full Text: DOI
Camenisch, Jan; Drijvers, Manu; Lehmann, Anja Universally composable Direct Anonymous Attestation. (English) Zbl 1395.94270 Cheng, Chen-Mou (ed.) et al., Public-key cryptography – PKC 2016. 19th IACR international conference on practice and theory in public-key cryptography, Taipei, Taiwan, March 6–9, 2016, Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-49386-1/pbk; 978-3-662-49387-8/ebook). Lecture Notes in Computer Science 9615, 234-264 (2016). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9615, 234--264 (2016; Zbl 1395.94270) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Haralambiev, Kristiyan; Kohlweiss, Markulf Composable and modular anonymous credentials: definitions and practical constructions. (English) Zbl 1375.94107 Iwata, Tetsu (ed.) et al., Advances in cryptology – ASIACRYPT 2015. 21st international conference on the theory and application of cryptology and information security, Auckland, New Zealand, November 29 – December 3, 2015. Proceedings. Part II. Berlin: Springer (ISBN 978-3-662-48799-0/pbk; 978-3-662-48800-3/ebook). Lecture Notes in Computer Science 9453, 262-288 (2015). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9453, 262--288 (2015; Zbl 1375.94107) Full Text: DOI Link
Baldimtsi, Foteini; Camenisch, Jan; Hanzlik, Lucjan; Krenn, Stephan; Lehmann, Anja; Neven, Gregory Recovering lost device-bound credentials. (English) Zbl 1459.94094 Malkin, Tal (ed.) et al., Applied cryptography and network security. 13th international conference, ACNS 2015, New York, NY, USA, June 2–5, 2015. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 9092, 307-327 (2015). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{F. Baldimtsi} et al., Lect. Notes Comput. Sci. 9092, 307--327 (2015; Zbl 1459.94094) Full Text: DOI
Camenisch, Jan; Enderlein, Robert E.; Neven, Gregory Two-server password-authenticated secret sharing UC-secure against transient corruptions. (English) Zbl 1345.94092 Katz, Jonathan (ed.), Public-key cryptography – PKC 2015. 18th IACR international conference on practice and theory in public-key cryptography, Gaithersburg, MD, USA, March 30 – April 1, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-46446-5/pbk; 978-3-662-46447-2/ebook). Lecture Notes in Computer Science 9020, 283-307 (2015). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 9020, 283--307 (2015; Zbl 1345.94092) Full Text: DOI
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent Computing on authenticated data. (English) Zbl 1314.94100 J. Cryptology 28, No. 2, 351-395 (2015). MSC: 94A62 PDFBibTeX XMLCite \textit{J. H. Ahn} et al., J. Cryptology 28, No. 2, 351--395 (2015; Zbl 1314.94100) Full Text: DOI
Benhamouda, Fabrice; Camenisch, Jan; Krenn, Stephan; Lyubashevsky, Vadim; Neven, Gregory Better zero-knowledge proofs for lattice encryption and their application to group signatures. (English) Zbl 1306.94026 Sarkar, Palash (ed.) et al., Advances in cryptology – ASIACRYPT 2014. 20th international conference on the theory and application of cryptology and information security, Kaoshiung, Taiwan, R.O.C., December 7–11, 2014. Proceedings, Part I. Berlin: Springer (ISBN 978-3-662-45610-1/pbk). Lecture Notes in Computer Science 8873, 551-572 (2014). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{F. Benhamouda} et al., Lect. Notes Comput. Sci. 8873, 551--572 (2014; Zbl 1306.94026) Full Text: DOI
Chow, Sherman S. M. (ed.); Camenisch, Jan (ed.); Hui, Lucas C. K. (ed.); Yiu, Siu Ming (ed.) Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12–14, 2014. Proceedings. (English) Zbl 1321.68009 Lecture Notes in Computer Science 8783. Berlin: Springer (ISBN 978-3-319-13256-3/pbk). xviii, 570 p. (2014). MSC: 68-06 68P25 00B25 PDFBibTeX XMLCite \textit{S. S. M. Chow} (ed.) et al., Information security. 17th international conference, ISC 2014, Hong Kong, China, October 12--14, 2014. Proceedings. Berlin: Springer (2014; Zbl 1321.68009) Full Text: DOI
Camenisch, Jan; Lehmann, Anja; Lysyanskaya, Anna; Neven, Gregory Memento: how to reconstruct your secrets from a single password in a hostile environment. (English) Zbl 1334.94098 Garay, Juan A. (ed.) et al., Advances in cryptology – CRYPTO 2014. 34th annual cryptology conference, Santa Barbara, CA, USA, August 17–21, 2014. Proceedings, Part II. Berlin: Springer (ISBN 978-3-662-44380-4/pbk). Lecture Notes in Computer Science 8617, 256-275 (2014). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 8617, 256--275 (2014; Zbl 1334.94098) Full Text: DOI
Abe, Masayuki; Camenisch, Jan; Dowsley, Rafael; Dubovitskaya, Maria On the impossibility of structure-preserving deterministic primitives. (English) Zbl 1326.94066 Lindell, Yehuda (ed.), Theory of cryptography. 11th theory of cryptography conference, TCC 2014, San Diego, CA, USA, February 24–26, 2014. Proceedings. Berlin: Springer (ISBN 978-3-642-54241-1/pbk). Lecture Notes in Computer Science 8349, 713-738 (2014). MSC: 94A60 PDFBibTeX XMLCite \textit{M. Abe} et al., Lect. Notes Comput. Sci. 8349, 713--738 (2014; Zbl 1326.94066) Full Text: DOI
Camenisch, Jan; Enderlein, Robert R.; Shoup, Victor Practical and employable protocols for UC-secure circuit evaluation over \(\mathbb Z_n\). (English) Zbl 1406.94032 Crampton, Jason (ed.) et al., Computer security – ESORICS 2013. 18th European symposium on research in computer security, Egham, UK, September 9–13, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40202-9/pbk). Lecture Notes in Computer Science 8134, 19-37 (2013). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 8134, 19--37 (2013; Zbl 1406.94032) Full Text: DOI
Camenisch, Jan; Hohenberger, Susan; Pedersen, Michael Østergaard Batch verification of short signatures. (English) Zbl 1286.94091 J. Cryptology 25, No. 4, 723-747 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., J. Cryptology 25, No. 4, 723--747 (2012; Zbl 1286.94091) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Enderlein, Robert R.; Neven, Gregory Oblivious transfer with hidden access control from attribute-based encryption. (English) Zbl 1344.94033 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 559-579 (2012). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 7485, 559--579 (2012; Zbl 1344.94033) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Haralambiev, Kristiyan Efficient structure-preserving signature scheme from standard assumptions. (English) Zbl 1310.94176 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 76-94 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 7485, 76--94 (2012; Zbl 1310.94176) Full Text: DOI
Camenisch, Jan; Neven, Gregory; Rückert, Markus Fully anonymous attribute tokens from lattices. (English) Zbl 1310.94177 Visconti, Ivan (ed.) et al., Security and cryptography for networks. 8th international conference, SCN 2012, Amalfi, Italy, September 5–7, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-32927-2/pbk). Lecture Notes in Computer Science 7485, 57-75 (2012). MSC: 94A60 81P94 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 7485, 57--75 (2012; Zbl 1310.94177) Full Text: DOI
Ahn, Jae Hyun; Boneh, Dan; Camenisch, Jan; Hohenberger, Susan; Shelat, Abhi; Waters, Brent Computing on authenticated data. (English) Zbl 1292.94017 Cramer, Ronald (ed.), Theory of cryptography. 9th theory of cryptography conference, TCC 2012, Taormina, Sicily, Italy, March 19–21, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-28913-2/pbk). Lecture Notes in Computer Science 7194, 1-20 (2012). MSC: 94A62 PDFBibTeX XMLCite \textit{J. H. Ahn} et al., Lect. Notes Comput. Sci. 7194, 1--20 (2012; Zbl 1292.94017) Full Text: DOI
Camenisch, Jan; Krenn, Stephan; Shoup, Victor A framework for practical universally composable zero-knowledge protocols. (English) Zbl 1227.94036 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 449-467 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 7073, 449--467 (2011; Zbl 1227.94036) Full Text: DOI
Camenisch, Jan; Haralambiev, Kristiyan; Kohlweiss, Markulf; Lapon, Jorn; Naessens, Vincent Structure preserving CCA secure encryption and applications. (English) Zbl 1227.94034 Lee, Dong Hoon (ed.) et al., Advances in cryptology – ASIACRYPT 2011. 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4–8, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25384-3/pbk). Lecture Notes in Computer Science 7073, 89-106 (2011). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 7073, 89--106 (2011; Zbl 1227.94034) Full Text: DOI
Kenyon, Chris; Camenisch, Jan Provably linkable trading. (English) Zbl 1217.91229 Quant. Finance 11, No. 5, 641-651 (2011). MSC: 91G99 91B24 91B44 PDFBibTeX XMLCite \textit{C. Kenyon} and \textit{J. Camenisch}, Quant. Finance 11, No. 5, 641--651 (2011; Zbl 1217.91229) Full Text: DOI
Camenisch, Jan; Dubovitskaya, Maria; Neven, Gregory; Zaverucha, Gregory M. Oblivious transfer with hidden access control policies. (English) Zbl 1291.94064 Catalano, Dario (ed.) et al., Public key cryptography – PKC 2011. 14th international conference on practice and theory in public key cryptography, Taormina, Italy, March 6–9, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-19378-1/pbk). Lecture Notes in Computer Science 6571, 192-209 (2011). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 6571, 192--209 (2011; Zbl 1291.94064) Full Text: DOI
Camenisch, Jan; Kohlweiss, Markulf; Soriente, Claudio Solving revocation with efficient update of anonymous credentials. (English) Zbl 1291.94065 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 454-471 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 6280, 454--471 (2010; Zbl 1291.94065) Full Text: DOI
Bichsel, Patrik; Camenisch, Jan; Neven, Gregory; Smart, Nigel P.; Warinschi, Bogdan Get shorty via group signatures without encryption. (English) Zbl 1291.94179 Garay, Juan A. (ed.) et al., Security and cryptography for networks. 7th international conference, SCN 2010, Amalfi, Italy, September 13–15, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-15316-7/pbk). Lecture Notes in Computer Science 6280, 381-398 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{P. Bichsel} et al., Lect. Notes Comput. Sci. 6280, 381--398 (2010; Zbl 1291.94179) Full Text: DOI
Camenisch, Jan; Casati, Nathalie; Gross, Thomas; Shoup, Victor Credential authenticated identification and key exchange. (English) Zbl 1280.94107 Rabin, Tal (ed.), Advances in cryptology - CRYPTO 2010. 30th annual cryptology conference, Santa Barbara, CA, USA, August 15–19, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-14622-0/pbk). Lecture Notes in Computer Science 6223, 255-276 (2010). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 6223, 255--276 (2010; Zbl 1280.94107) Full Text: DOI
Bangerter, Endre; Camenisch, Jan; Krenn, Stephan Efficiency limitations for \(\Sigma \)-protocols for group homomorphisms. (English) Zbl 1274.94036 Micciancio, Daniele (ed.), Theory of cryptography. 7th theory of cryptography conference, TCC 2010, Zurich, Switzerland, February 9–11, 2010. Proceedings. Berlin: Springer (ISBN 978-3-642-11798-5/pbk). Lecture Notes in Computer Science 5978, 553-571 (2010). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Bangerter} et al., Lect. Notes Comput. Sci. 5978, 553--571 (2010; Zbl 1274.94036) Full Text: DOI
Camenisch, Jan (ed.); Kesdogan, Dogan (ed.) iNetSec 2009 – open research problems in network security. IFIP Wg 11.4 international workshop, Zurich, Switzerland, April 23–24, 2009. Revised selected papers. (English) Zbl 1185.68023 IFIP Advances in Information and Communication Technology 309. Berlin: Springer (ISBN 978-3-642-05436-5/hbk; 978-3-642-05437-2/ebook). viii, 169 p. (2010). MSC: 68M10 68-06 PDFBibTeX XMLCite \textit{J. Camenisch} (ed.) and \textit{D. Kesdogan} (ed.), iNetSec 2009 -- open research problems in network security. IFIP Wg 11.4 international workshop, Zurich, Switzerland, April 23--24, 2009. Revised selected papers. Berlin: Springer (2010; Zbl 1185.68023) Full Text: DOI
Camenisch, Jan; Zaverucha, Gregory M. Private intersection of certified sets. (English) Zbl 1196.94045 Dingledine, Roger (ed.) et al., Financial cryptography and data security. 13th international conference, FC 2009, Accra Beach, Barbados, February 23–26, 2009. Revised selected papers. Berlin: Springer (ISBN 978-3-642-03548-7/pbk). Lecture Notes in Computer Science 5628, 108-127 (2009). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{G. M. Zaverucha}, Lect. Notes Comput. Sci. 5628, 108--127 (2009; Zbl 1196.94045) Full Text: DOI
Belenkiy, Mira; Camenisch, Jan; Chase, Melissa; Kohlweiss, Markulf; Lysyanskaya, Anna; Shacham, Hovav Randomizable proofs and delegatable anonymous credentials. (English) Zbl 1252.94047 Halevi, Shai (ed.), Advances in cryptology – CRYPTO 2009. 29th annual international cryptology conference, Santa Barbara, CA, USA, August 16–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-03355-1/pbk). Lecture Notes in Computer Science 5677, 108-125 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{M. Belenkiy} et al., Lect. Notes Comput. Sci. 5677, 108--125 (2009; Zbl 1252.94047) Full Text: DOI
Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006. (English) Zbl 1171.94337 Int. J. Appl. Cryptogr. 1, No. 4, 320-322 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{G. Ateniese} et al., Int. J. Appl. Cryptogr. 1, No. 4, 320--322 (2009; Zbl 1171.94337) Full Text: DOI
Camenisch, Jan; Kiayias, Aggelos; Yung, Moti On the portability of generalized Schnorr proofs. (English) Zbl 1239.94039 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 425-442 (2009). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 5479, 425--442 (2009; Zbl 1239.94039) Full Text: DOI
Camenisch, Jan; Chandran, Nishanth; Shoup, Victor A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. (English) Zbl 1239.94038 Joux, Antoine (ed.), Advances in cryptology – EUROCRYPT 2009. 28th annual international conference on the theory and applications of cryptographic techniques, Cologne, Germany, April 26–30, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-01000-2/pbk). Lecture Notes in Computer Science 5479, 351-368 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 5479, 351--368 (2009; Zbl 1239.94038) Full Text: DOI
Camenisch, Jan; Kohlweiss, Markulf; Soriente, Claudio An accumulator based on bilinear maps and efficient revocation for anonymous credentials. (English) Zbl 1227.94074 Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 481-500 (2009). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 5443, 481--500 (2009; Zbl 1227.94074) Full Text: DOI
Camenisch, Jan; Kohlweiss, Markulf; Rial, Alfredo; Sheedy, Caroline Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. (English) Zbl 1227.94035 Jarecki, Stanisław (ed.) et al., Public key cryptography – PKC 2009. 12th international conference on practice and theory in public key cryptography, Irvine, CA, USA, March 18–20, 2009. Proceedings. Berlin: Springer (ISBN 978-3-642-00467-4/pbk). Lecture Notes in Computer Science 5443, 196-214 (2009). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 5443, 196--214 (2009; Zbl 1227.94035) Full Text: DOI
Camenisch, Jan; Chaabouni, Rafik; Shelat, Abhi Efficient protocols for set membership and range proofs. (English) Zbl 1206.94057 Pieprzyk, Josef (ed.), Advances in cryptology – ASIACRYPT 2008. 14th international conference on the theory and application of cryptology and information security, Melbourne, Australia, December 7–11, 2008. Proceedings. Berlin: Springer (ISBN 978-3-540-89254-0/pbk). Lecture Notes in Computer Science 5350, 234-252 (2008). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 5350, 234--252 (2008; Zbl 1206.94057) Full Text: DOI
Camenisch, Jan; Neven, Gregory; shelat, abhi Simulatable adaptive oblivious transfer. (English) Zbl 1141.94344 Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 573-590 (2007). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 4515, 573--590 (2007; Zbl 1141.94344) Full Text: DOI
Camenisch, Jan; Hohenberger, Susan; Pedersen, Michael Østergaard Batch verification of short signatures. (English) Zbl 1138.94378 Naor, Moni (ed.), Advances in cryptology – EUROCRYPT 2007. 26th annual international conference on the theory and applications of cryptographic techniques, Barcelona, Spain, May 20–24, 2007. Proceedings. Berlin: Springer (ISBN 978-3-540-72539-8/pbk). Lecture Notes in Computer Science 4515, 246-263 (2007). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 4515, 246--263 (2007; Zbl 1138.94378) Full Text: DOI
Camenisch, Jan; Hohenberger, Susan; Lysyanskaya, Anna Balancing accountability and privacy using e-cash. (Extended abstract). (English) Zbl 1152.68438 De Prisco, Roberto (ed.) et al., Security and cryptography for networks. 5th international conference, SCN 2006, Maiori, Italy, September 6–8, 2006. Proceedings. Berlin: Springer (ISBN 978-3-540-38080-1/pbk). Lecture Notes in Computer Science 4116, 141-155 (2006). MSC: 68P25 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 4116, 141--155 (2006; Zbl 1152.68438) Full Text: DOI
Camenisch, Jan; Koprowski, Maciej Fine-grained forward-secure signature schemes without random oracles. (English) Zbl 1091.94027 Discrete Appl. Math. 154, No. 2, 175-188 (2006). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{M. Koprowski}, Discrete Appl. Math. 154, No. 2, 175--188 (2006; Zbl 1091.94027) Full Text: DOI
Camenisch, Jan; Hohenberger, Susan; Lysyanskaya, Anna Compact e-cash. (English) Zbl 1137.94366 Cramer, Ronald (ed.), Advances in cryptology – EUROCRYPT 2005. 24th annual international conference on the theory and applications of cryptographic techniques, Aarhus, Denmark, May 22–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-25910-4/pbk). Lecture Notes in Computer Science 3494, 302-321 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 3494, 302--321 (2005; Zbl 1137.94366) Full Text: DOI
Camenisch, Jan; Lysyanskaya, Anna A formal treatment of onion routing. (English) Zbl 1145.94460 Shoup, Victor (ed.), Advances in cryptology – CRYPTO 2005. 25th annual international cryptology conference, Santa Barbara, CA, USA, August 14–18, 2005. Proceedings. Berlin: Springer (ISBN 3-540-28114-2/pbk). Lecture Notes in Computer Science 3621, 169-187 (2005). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{A. Lysyanskaya}, Lect. Notes Comput. Sci. 3621, 169--187 (2005; Zbl 1145.94460) Full Text: DOI
Camenisch, Jan; Koprowski, Maciej; Warinschi, Bodgan Efficient blind signatures without random oracles. (English) Zbl 1116.94311 Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 134-148 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} et al., Lect. Notes Comput. Sci. 3352, 134--148 (2005; Zbl 1116.94311) Full Text: DOI
Camenisch, Jan; Groth, Jens Group signatures: better efficiency and new theoretical aspects. (English) Zbl 1116.94310 Blundo, Carlo (ed.) et al., Security in communication networks. 4th international conference, SCN 2004, Amalfi, Italy, September 8–10, 2004. Revised selected papers. Berlin: Springer (ISBN 3-540-24301-1/pbk). Lecture Notes in Computer Science 3352, 120-133 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{J. Groth}, Lect. Notes Comput. Sci. 3352, 120--133 (2005; Zbl 1116.94310) Full Text: DOI
Bangerter, Endre; Camenisch, Jan; Maurer, Ueli Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order. (English) Zbl 1081.94015 Vaudenay, Serge (ed.), Public key cryptography – PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23–26, 2005. Proceedings. Berlin: Springer (ISBN 3-540-24454-9/pbk). Lecture Notes in Computer Science 3386, 154-171 (2005). MSC: 94A60 PDFBibTeX XMLCite \textit{E. Bangerter} et al., Lect. Notes Comput. Sci. 3386, 154--171 (2005; Zbl 1081.94015) Full Text: DOI
Camenisch, Jan; Lysyanskaya, Anna Signature schemes and anonymous credentials from bilinear maps. (English) Zbl 1104.94045 Franklin, Matt (ed.), Advances in cryptology – CRYPTO 2004. 24th annual international cryptology conference, Santa Barbara, California, USA, August 15–19, 2004. Proceedings. Berlin: Springer (ISBN 3-540-22668-0/pbk). Lecture Notes in Computer Science 3152, 56-72 (2004). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{A. Lysyanskaya}, Lect. Notes Comput. Sci. 3152, 56--72 (2004; Zbl 1104.94045) Full Text: DOI
Cachin, Christian (ed.); Camenisch, Jan (ed.) Advances in cryptology – EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2–6, 2004. Proceedings. (English) Zbl 1051.94003 Lecture Notes in Computer Science 3027. Berlin: Springer (ISBN 3-540-21935-8/pbk). xii, 628 p. (2004). MSC: 94-06 00B25 94A60 PDFBibTeX XMLCite \textit{C. Cachin} (ed.) and \textit{J. Camenisch} (ed.), Advances in cryptology -- EUROCRYPT 2004. International conference on the theory and applications of cryptographic techniques, Interlaken, Switzerland, May 2--6, 2004. Proceedings. Berlin: Springer (2004; Zbl 1051.94003) Full Text: DOI
Camenisch, Jan; Shoup, Victor Practical verifiable encryption and decryption of discrete logarithms. (English) Zbl 1122.94357 Boneh, Dan (ed.), Advances in cryptology – CRYPTO 2003. 23rd annual international cryptology conference, Santa Barbara, California, USA, August 17–21, 2003. Proceedings. Berlin: Springer (ISBN 3-540-40674-3/pbk). Lect. Notes Comput. Sci. 2729, 126-144 (2003). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{V. Shoup}, Lect. Notes Comput. Sci. 2729, 126--144 (2003; Zbl 1122.94357) Full Text: DOI
Camenisch, Jan; Lysyanskaya, Anna A signature scheme with efficient protocols. (English) Zbl 1022.68528 Cimato, Stelvio (ed.) et al., Security in communication networks. Third international conference, SCN 2002, Amalfi, Italy, September 11-13, 2002. Revised papers. Berlin: Springer. Lect. Notes Comput. Sci. 2576, 268-289 (2003). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{A. Lysyanskaya}, Lect. Notes Comput. Sci. 2576, 268--289 (2003; Zbl 1022.68528) Full Text: Link
Algesheimer, Joy; Camenisch, Jan; Shoup, Victor Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. (English) Zbl 1026.94543 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 417-432 (2002). MSC: 94A62 11Y11 PDFBibTeX XMLCite \textit{J. Algesheimer} et al., Lect. Notes Comput. Sci. 2442, 417--432 (2002; Zbl 1026.94543) Full Text: Link
Camenisch, Jan; Lysyanskaya, Anna Dynamic accumulators and application to efficient revocation of anonymous credentials. (English) Zbl 1026.94545 Yung, Moti (ed.), Advances in cryptology - CRYPTO 2002. 22nd annual international cryptology conference, Santa Barbara, CA, USA, August 18-22, 2002. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2442, 61-76 (2002). MSC: 94A62 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{A. Lysyanskaya}, Lect. Notes Comput. Sci. 2442, 61--76 (2002; Zbl 1026.94545) Full Text: Link
Camenisch, Jan; Lysyanskaya, Anna An identity escrow scheme with appointed verifiers. (English) Zbl 1003.94531 Kilian, Joe (ed.), Advances in cryptology - CRYPTO 2001. 21st annual international cryptology conference, Santa Barbara, CA, USA, August 19-23, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2139, 388-407 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{A. Lysyanskaya}, Lect. Notes Comput. Sci. 2139, 388--407 (2001; Zbl 1003.94531) Full Text: Link
Camenisch, Jan; Lysyanskaya, Anna An efficient system for non-transferable anonymous credentials with optional anonymity revocation. (English) Zbl 0981.94043 Pfitzmann, Birgit (ed.), Advances in cryptology - EUROCRYPT 2001. 20th international conference on theory and application of cryptographic techniques, Innsbruck, Austria, May 6-10, 2001. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 2045, 93-118 (2001). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{A. Lysyanskaya}, Lect. Notes Comput. Sci. 2045, 93--118 (2001; Zbl 0981.94043) Full Text: Link
Camenisch, Jan; Michels, Markus Confirmer signature schemes secure against adaptive adversaries. (English) Zbl 1082.94537 Preneel, Bart (ed.), Advances in cryptology - EUROCRYPT 2000. 19th international conference on the theory and application of cryptographic techniques, Bruges, Belgium, May 14–18, 2000. Proceedings. Berlin: Springer (ISBN 3-540-67517-5). Lect. Notes Comput. Sci. 1807, 243-258 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{M. Michels}, Lect. Notes Comput. Sci. 1807, 243--258 (2000; Zbl 1082.94537)
Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene A practical and provably secure coalition-resistant group signature scheme. (English) Zbl 0995.94544 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 255-270 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{G. Ateniese} et al., Lect. Notes Comput. Sci. 1880, 255--270 (2000; Zbl 0995.94544)
Cachin, Christian; Camenisch, Jan Optimistic fair secure computation. (Extended abstract). (English) Zbl 0989.68510 Bellare, Mihir (ed.), Advances in cryptology - CRYPTO 2000. 20th annual international conference, Santa Barbara, CA, USA, August 20-24, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1880, 93-111 (2000). MSC: 68P30 94A60 PDFBibTeX XMLCite \textit{C. Cachin} and \textit{J. Camenisch}, Lect. Notes Comput. Sci. 1880, 93--111 (2000; Zbl 0989.68510)
Cachin, Christian; Camenisch, Jan; Kilian, Joe; Müller, Joy One-round secure computation and secure autonomous mobile agents. (Extended abstract). (English) Zbl 0973.94545 Montanari, Ugo (ed.) et al., Automata, languages and programming. 27th international colloquium, ICALP 2000, Geneva, Switzerland, July 9-15, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1853, 512-523 (2000). MSC: 94A60 68P30 PDFBibTeX XMLCite \textit{C. Cachin} et al., Lect. Notes Comput. Sci. 1853, 512--523 (2000; Zbl 0973.94545)
Camenisch, Jan Efficient anonymous fingerprinting with group signatures. (Extended abstract). (English) Zbl 0980.94024 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 415-428 (2000). MSC: 94A62 PDFBibTeX XMLCite \textit{J. Camenisch}, Lect. Notes Comput. Sci. 1976, 415--428 (2000; Zbl 0980.94024)
Camenisch, Jan; Damgård, Ivan Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. (Extended abstract). (English) Zbl 0974.94010 Okamoto, Tatsuaki (ed.), Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3-7, 2000. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1976, 331-345 (2000). MSC: 94A60 94A62 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{I. Damgård}, Lect. Notes Comput. Sci. 1976, 331--345 (2000; Zbl 0974.94010)
Camenisch, Jan; Michels, Markus Separability and efficiency for generic group signature schemes. (Extended abstract). (English) Zbl 0942.94033 Wiener, Michael (ed.), Advances in cryptology - CRYPTO ’99. 19th annual international cryptology conference Santa Barbara, CA, USA, August 15-19, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1666, 413-430 (1999). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{M. Michels}, Lect. Notes Comput. Sci. 1666, 413--430 (1999; Zbl 0942.94033)
Camenisch, Jan; Michels, Markus Proving in zero-knowledge that a number is the product of two safe primes. (English) Zbl 0971.94009 Stern, Jacques (ed.), Advances in cryptology - EUROCRYPT ’99. 17th annual Eurocrypt conference, international conference on The theory and application of cryptographic techniques, Prague, Czech Republic, May 2-6, 1999. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1592, 107-122 (1999). Reviewer: Ian F.Blake (Toronto) MSC: 94A60 11Y11 11A51 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{M. Michels}, Lect. Notes Comput. Sci. 1592, 107--122 (1999; Zbl 0971.94009) Full Text: DOI
Camenisch, Jan; Michels, Markus A group signature scheme with improved efficiency. (Extended abstract). (English) Zbl 0984.94519 Ohta, Kazuo (ed.) et al., Advances in cryptology - ASIACRYPT ’98. International conference on the Theory and application of cryptology and information security, Beijing, China, October 18-22, 1998. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1514, 160-174 (1998). MSC: 94A62 68P25 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{M. Michels}, Lect. Notes Comput. Sci. 1514, 160--174 (1998; Zbl 0984.94519)
Camenisch, Jan; Stadler, Markus Efficient group signature schemes for large groups. (Extended abstract). (English) Zbl 0882.94018 Kaliski, Burton S. jun. (ed.), Advances in Cryptology - CRYPTO ’97. 17th annual international cryptology conference. Santa Barbara, CA, USA. August 17–21, 1997. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 1294, 410-424 (1997). MSC: 94A60 PDFBibTeX XMLCite \textit{J. Camenisch} and \textit{M. Stadler}, Lect. Notes Comput. Sci. 1294, 410--424 (1997; Zbl 0882.94018)
Stadler, Markus A.; Piveteau, Jean-Marc; Camenisch, Jan L. Fair blind signatures. (English) Zbl 0973.94531 Guillou, Louis C. (ed.) et al., Advances in cryptology - EUROCRYPT ’95. International conference on the theory and application of cryptographic techniques, Saint-Malo, France, May 21-25, 1995. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 921, 209-219 (1995). MSC: 94A62 PDFBibTeX XMLCite \textit{M. A. Stadler} et al., Lect. Notes Comput. Sci. 921, 209--219 (1995; Zbl 0973.94531)
Camenisch, Jan L.; Piveteau, Jean-Marc; Stadler, Markus A. Blind signatures based on the discrete logarithm problem. (English) Zbl 0885.94019 De Santis, Alfredo (ed.), Advances in cryptology - EUROCRYPT ’94. Workshop on the theory and application of cryptographic techniques, Perugia, Italy, May 9-12, 1994. Proceedings. Berlin: Springer-Verlag. Lect. Notes Comput. Sci. 950, 428-432 (1995). MSC: 94A60 68P25 PDFBibTeX XMLCite \textit{J. L. Camenisch} et al., Lect. Notes Comput. Sci. 950, 428--432 (1995; Zbl 0885.94019)