Please see also DBLP and Google Scholar.
2019
iUC: Flexible Universal Composability Made Simple. Jan Camenisch, Stephan Krenn, Ralf Küsters, Daniel Rausch. In Asiacrypt, LNCS, Springer Verlag.
Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. Jan Camenisch, Manu Drijvers, Petr Dzurenda, Jan Hajny. In SEC 2019.
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data. Jan Camenisch, Angelo De Caro, Esha Ghosh, Alessandro Sorniotti. In Financial Cryptography, LNCS, Springer Verlag.
Password-Authenticated Public-Key Encryption. Tatiana Bradley, Jan Camenisch, Stanislaw Jarecki, Anja Lehmann, Gregory Neven, Jiayu Xu. In ACNS, LNCS, Springer Verlag.
On the Impossibility of Structure-Preserving Deterministic Primitives. Masayuki Abe, Jan Camenisch, Rafael Dowsley, Maria Dubovitskaya.
J. Cryptology 32(1): 239-264 (2019)
2018
Floppy-Sized Group Signatures from Lattices. Cecilia Boschini, Jan Camenisch, Gregory Neven. In ACNS 2018
The Wonderful World of Global Random Oracles. Jan Camenisch, Manu Drijvers, Tommaso Gagliardoni, Anja Lehmann, Gregory Neven. In EUROCRYPT 2018, LNCS, Springer Verlag.
Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs. Cecilia Boschini, Jan Camenisch, Gregory Neven. In ISC 2018, LNCS, Springer Verlag.
2017
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain. Jan Camenisch, Manu Drijvers, Maria Dubovitskaya. In ACM Conference on Computer and Communications Security 2017.
Accumulators with Applications to Anonymity-Preserving Revocation.
Foteini Baldimtsi and Jan Camenisch and Maria Dubovitskaya and Anna Lysyanskaya and Leonid Reyzin and Kai Samelin and Sophia Yakoubov.
In IEEE European Symposium on Security and Privacy, EuroS&P 2017.
Chameleon-Hashes with Ephemeral Trapdoors – And Applications to Invisible Sanitizable Signatures. Jan Camenisch, David Derler, Stephan Krenn, Henrich C. Poehls, Kai Samelin, Daniel Slamanig. In PKC, LNCS, Springer Verlag, 2017.
Updatable Tokenization: Formal Definitions and Provably Secure Constructions. Christian Cachin, Jan Camenisch, Eduarda Freire-Stoegbuchner, Anja Lehmann. In Financial Cryptography and Data Security, Springer, 2017.
UC-Secure Non-Interactive Public-Key Encryption. Jan Camenisch, Anja Lehmann, Gregory Neven, Kai Samelin. In CSF – Computer Security Foundations Symposium, IEEE, 2017.
Anonymous Attestation with Subverted TPMs. Jan Camenisch, Manu Drijvers, Anja Lehmann. Advances in Cryptography – CRYPTO 2017, LNCS, Springer Verlag.
Privacy-Preserving User-Auditable Pseudonym Systems. Jan Camenisch, Anja Lehmann. IEEE EuroS&P – European Symposium on Security and Privacy, IEEE, 2017.
One TPM to bind them all: fixing TPM2. 0 for provably secure anonymous attestation. Jan Camenisch, Liqun Chen, Manu Drijvers, Anja Lehmann, David Novick, Rainer Urian. In Proceedings of IEEE S&P 2017.
2016
Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs. Jan Camenisch, Manu Drijvers, Jan Hajny. In: Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, pp. 123-133.
Memory erasability amplification. Jan Camenisch, Robert R. Enderlein, and Ueli Maurer. In International Conference on Security and Cryptography for Networks, pp. 104–125, 2016.
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. Jan Camenisch, Manu Drijvers, and Anja Lehmann. In TRUST 2016, Springer, LNCS.
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens. Jan Camenisch, Maria Dubovitskaya, and Alfredo Rial. In Advances in Cryptology – Crypto 2016, Springer, LNCS
Universally Composable Direct Anonymous Attestation. Jan Camenisch, Manu Drijvers, and Anja Lehmann. In Public-Key Cryptography – PKC 2016, Springer, LNCS.
Virtual Smart Cards: How to Sign with a Password and a Server. Jan Camenisch, Anja Lehmann, Gregory Neven, and Kai Samelin. In SCN 2016, LNCS, Springer Verlag.
Universal composition with responsive environments. Jan Camenisch, Robert R Enderlein, Stephan Krenn, Ralf Küsters, and Daniel Rausch. In ASIACRYPT 2016, LNCS, Springer Verlag.
2015
Formal treatment of privacy-enhancing credential systems. Jan Camenisch, Stephan Krenn, Anja Lehmann, Gert Læssøe Mikkelsen, Gregory Neven, and Michael Østergaard Pedersen. In International Conference on Selected Areas in Cryptography, LNCS, Springer Verlag. Also IACR Cryptology ePrint Archive 2014, 708.
An Architecture for Privacy-ABCs. Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss, and others. In Attribute-based Credentials for Trust, pp. 11–78, Springer, 2015.
(Un) linkable Pseudonyms for Governmental Databases. Jan Camenisch and Anja Lehmann. In ACM CCS 2015.
Composable & Modular Anonymous Credentials: Definitions and Practical Constructions. Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, Markulf Kohlweiss. In Asiacrypt 2015, LNCS, Springer Verlag.
Recovering Lost Device-Bound Credentials. Foteini Baldimtsi, Jan Camenisch, Lucjan Hanzlik, Stephan Krenn, Anja Lehmann, and Gregory Neven. In International Conference on Applied Cryptography and Network Security – ACNS, LNCS, Springer Verlag, 2015.
A Single Password for Everything? Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven. ERCIM News, 2015.
Computing on Authenticated Data. Jae Hyun Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, Abhi Shelat, and Brent Waters. In Journal of Cryptology, 2015, Springer Verlag.
Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones. Jan Camenisch, Diego Ortiz-Yepes, and Franz-Stefan Preiss. In ACM Workshop on Privacy in the Electronic Society, pp. 37–48, ACM, 2015.
Optimal Distributed Password Verification. Jan Camenisch, Anja Lehmann, and Gregory Neven. In ACM CCS 2015.
(Un)linkable Pseudonyms for Governmental Databases. Jan Camenisch and Anja Lehmann. In ACM CCS, 2015.
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions. Jan Camenisch, Robert R. Enderlein, and Gregory Neven. In Public-Key Cryptography–PKC 2015, LNCS Springer Verlag.
2014
Composable and modular anonymous credentials: definitions and practical constructions. Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, and Markulf Kohlweiss. In ASIACRYPT 2014, LNCS, Springer Verlag.
Authentication and authorisation in entrusted unions. Ayed F. Dhouha, Jan Camenisch, Tanya Ignatenko, Michael N. Johnstone, Paul Koster, Brigitta Lange, Milan Petkovic, Dieter Sommer, and John Zic. In Australian Information Security Management Conference, 2014.
Concepts and languages for privacy-preserving attribute-based authentication. Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. In Journal of Information Security and Applications, 2014.
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures. Fabrice Benhamouda, Jan Camenisch, Stephan Krenn, Vadim Lyubashevsky, and Gregory Neven. In ASIACRYPT 2014, LNCS, Springer Verlag.
Integration of Data-Minimising Authentication into Authorisation Systems. Dhouha Ayed, Patrik Bichsel, Jan Camenisch, and Jerry den Hartog. In TRUST, LNCS, Springer Verlag, 2014.
Privacy-Preserving Auditing for Attribute-Based Credentials. Jan Camenisch, Anja Lehmann, Gregory Neven and Alfredo Rial. In ESORICS, Springer, LNCS, 2014.
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment. Jan Camenisch, Anja Lehmann, Anna Lysyanskaya, Gregory Neven. In CRYPTO 2014, LNCS, Springer Verlag.
On The Impossibility of Structure-Preserving Deterministic Primitives. Masayuki Abe, Jan Camenisch, Rafael Dowsley, and Maria Dubovitskaya. In TCC 2014), LNCS, Springer Verlag.
Concepts Around Privacy-Preserving Attribute-Based Credentials. Jan Camenisch. In Privacy and Identity Management for Emerging Services and Technologies, Springer, 2014.
Research Challenges to Secure the Future Internet. Jan Camenisch. In Secure Data Management, pp. 14–17, Springer, 2014.
2013
Universally Composable Adaptive Oblivious Transfer (with Access Control) from Standard Assumptions. Masayuki Abe, Jan Camenisch, Maria Duboviskaya, Ryo Nishimaki. In ACM CCS DIM, pp. 1–12, 2013.
Anonymously sharing Flickr pictures with facebook friends. Jan Camenisch, Guenter Karjoth, Gregory Neven, and Franz-Stefan Preiss. In Proceedings of the 12th ACM workshop on Workshop on privacy in the electronic society, pp. 13–24, 2013.
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Zn. Jan Camenisch, Robert R. Enderlein, Victor Shoup. In ESORICS, pp. 205, 2013.
Future Challenges in Security and Privacy for Academia and Industry. Jan Camenisch, Simone Fischer-Huebner, and Yuko Murayama. In Computers & Security, 33, 1–170, Elsevier, 2013.
Fair Private Set Intersection with a Semi-trusted Arbiter. Changyu Dong, Liqun Chen, Jan Camenisch, Giovanni Russello. In DBSec, pp. 128-144, 2013.
Recognizing your digital friends. Patrik Bichsel, Jan Camenisch, Mario Verdicchio. In Security and Privacy in Social Networks, pp. 27–46, Springer New York, 2013.
Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss. In Policies and Research in Identity Management, pp. 34–52, Springer, 2013.
Practical and Employable Protocols for UC-Secure Circuit Evaluation over ℤn. Jan Camenisch, Robert R Enderlein, Victor Shoup. In Computer Security–ESORICS 2013, pp. 19–37, Springer.
2012
Information privacy?! Jan Camenisch. In Computer Networks, Elsevier, 2012.
Practical yet universally composable two-server password-authenticated secret sharing. Jan Camenisch, Anna Lysyanskaya, Gregory Neven. In Proceedings of the 2012 ACM conference on Computer and communications security, ACM.
Data-Minimizing Authentication Goes Mobile. Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer. In Communications and Multimedia Security, pp. 55–71, Springer Berlin/Heidelberg, 2012.
Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. Jan Camenisch, Maria Dubovitskaya, Robert Enderlein, Gregory Neven. In Security and Cryptography for Networks, pp. 559–579, Springer Berlin/Heidelberg, 2012.
Fully Anonymous Attribute Tokens from Lattices. Jan Camenisch, Gregory Neven, Markus Rückert. In Security and Cryptography for Networks, 57–75, Springer Verlag, 2012.
Efficient Structure-Preserving Signature Scheme from Standard Assumptions. Jan Camenisch, Maria Dubovitskaya, Kris Haralambiev. In Security and Cryptography for Networks, pp. 76–94, Springer Berlin/Heidelberg, 2012.
A Calculus for Privacy-friendly Authentication. Patrik Bichsel, Jan Camenisch, Dieter Sommer. In Proceedings of the 17th ACM symposium on Access Control Models and Technologies, pp. 157–166, 2012.
A language framework for privacy-preserving attribute-based authentication. Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss. Technical Report, Technical Report RZ3818, IBM, 2012.
Computing on authenticated data. Jae Ahn, Dan Boneh, Jan Camenisch, Susan Hohenberger, abhi shelat, Brent Waters. In Theory of Cryptography Conference, pp. 1–20, Springer Berlin/Heidelberg, 2012.
Electronic identities need private credentials. Jan Camenisch, Anja Lehmann, Gregory Neven. In Security & Privacy, IEEE 10(1), IEEE, 2012.
Batch Verification of Short Signatures. Jan Camenisch, Susan Hohenberger, Michael Ø. Pedersen. In Journal of cryptology 25(4), 723–747, Springer, 2012.
2011
A framework for practical universally composable zero-knowledge protocols. Jan Camenisch, Stephan Krenn, Victor Shoup. In Advances in Cryptology–ASIACRYPT 2011, 449–467, Springer Verlag.
Further privacy mechanisms. Ali El Kalam, Carlos Melchor, Stefan Berthold, Jan Camenisch, Sebastian Clauss, Yves Deswarte, Markulf Kohlweiss, Andrei Panchenko, Lexi Pimenidis, Matthieu Roy. In Digital privacy, 485–555, Springer, 2011.
An introduction to privacy-enhancing identity management. Jan Camenisch, Ronald Leenes, Marit Hansen, Jan Schallaböck. In Digital privacy, 3–21, Springer, 2011.
Provably linkable trading. Chris Kenyon, Jan Camenisch. In Quantitative Finance 11(5), 641–651, Taylor & Francis, 2011.
PrimeLife’s Legacy. Jan Camenisch, Marit Hansen. In Privacy and Identity Management for Life, 505–506, Springer, 2011.
Cryptographic Mechanisms for Privacy. Jan Camenisch, Maria Dubovitskaya, Markulf Kohlweiss, Jorn Lapon, Gregory Neven. In Privacy and Identity Management for Life, 117–134, Springer, 2011.
Trustworthiness of Online Content. Jan Camenisch, Sandra Steinbrecher, Ronald Leenes, Stefanie Poetzsch, Benjamin Kellermann, Laura Klaming. In Privacy and Identity Management for Life, 61–85, Springer, 2011.
PrimeLife. Andreas Pfitzmann, Karin Borcea-Pfitzmann, Jan Camenisch. In Privacy and Identity Management for Life, 5–26, Springer, 2011.
Open Source Contributions. Jan Camenisch, Benjamin Kellermann, Stefan Koepsell, Stefano Paraboschi, Franz-Stefan Preiss, Stefanie Poetzsch, Dave Raggett, Pierangela Samarati, Karel Wouters. In Privacy and Identity Management for Life, 459–477, Springer, 2011.
Structure preserving cca secure encryption and applications. Jan Camenisch, Kris Haralambiev, Markulf Kohlweiss, Jorn Lapon, Vincent Naessens. In Advances in Cryptology–ASIACRYPT 2011, 89–106, Springer Verlag.
A Comprehensive Framework Enabling Data-minimizing Authentication. Patrik Bichsel, Jan Camenisch, Franz-Stefan Preiss. In Proceedings of the 7th ACM workshop on Digital identity management, pp. 13–22, 2011.
Cryptographic primitives for building secure and privacy respecting protocols. Jan Camenisch. In Proceedings of the 18th ACM conference on Computer and communications security, pp. 361–362, 2011.
Oblivious transfer with hidden access control policies. Jan Camenisch, Maria Dubovitskaya, Gregory Neven, Greg Zaverucha. In Public Key Cryptography–PKC 2011, pp. 192-209, Springer.
2010
Privacy-friendly Incentives and their Application to Wikipedia (Extended Version). Jan Camenisch, Thomas Gross, Peter Hladky, Christian Hoertnagl. In IDMAN 2010, Springer.
Credential authenticated identification and key exchange. Jan Camenisch, Natalie Casati, Thomas Gross, Victor Shoup. In Advances in Cryptology–CRYPTO 2010, 255–276, LNCS, Springer Verlag.
A card requirements language enabling privacy-preserving access control. Jan Camenisch, Sebastian Moedersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer. In ACM SACMAT 2010, pp. 119–128, ACM.
Unlinkable priced oblivious transfer with rechargeable wallets. Jan Camenisch, Maria Dubovitskaya, Gregory Neven. In Financial Cryptography and Data Security, pp. 66–81, Springer, 2010.
Mixing Identities with Ease. Patrik Bichsel and Jan Camenisch. In IDMAN 2010, pp. 1–17, Springer Verlag.
Saving On-Line Privacy. Jan Camenisch and Gregory Neven. In Privacy and Identity Management for Life, 34–47, Springer, 2010.
Get Shorty via Group Signatures without Encryption. Patrik Bichsel, Jan Camenisch, Gregory Neven, Nigel Smart, and Bogdan Warinschi. In SCN 2010, pp. 381–398, LNCS, Springer Verlag.
A Formal Model of Identity Mixer. Jan Camenisch, Sebastian Mödersheim, Dieter Sommer. In Formal Methods for Industrial Critical Systems, 198–214, Springer, 2010.
Encrypting Keys Securely. Christian Cachin and Jan Camenisch. In IEEE Security & Privacy 8(4), 66–69, IEEE Computer Society, 2010.
Solving Revocation with Efficient Update of Anonymous Credentials. Jan Camenisch, Markulf Kohlweiss, Claudio Soriente. In SCN 2010, pp. 454, Springer
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project. Claudio A Ardagna, Jan Camenisch, Markulf Kohlweiss, Ronald Leenes, Gregory Neven, Bart Priem, Pierangela Samarati, Dieter Sommer, Mario Verdicchio. In Journal of Computer Security 18(1), 123–160, IOS Press, 2010
Efficiency limitations for Σ-protocols for group homomorphisms. Endre Bangerter, Jan Camenisch, Stephan Krenn. In Theory of Cryptography, 553–571, Springer, 2010
2009
Randomizable Proofs and Delegatable Anonymous Credentials. Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Hovav Shacham. In Crypto, pp. 108–125, 2009.
Credential-Based Access Control Extensions to XACML. Jan Camenisch, Sebastian Mödersheim, Gregory Neven, Franz-Stefan Preiss, Dieter Sommer. In W3C Workshop on Access Control Application Scenarios, Luxembourg, 2009.
Cryptographic Protocols of the Identity Mixer Library, v. 1.0. Patrik Bichsel, Carl Binding, Jan Camenisch, Thomas Gross, Thomas Heydt-Benjamin, Dieter Sommer, Greg Zaverucha. IBM Research Report RZ3730, 2009
Anonymous Credentials on a Standard Java Card. Patrik Bichsel, Jan Camenisch, Thomas Gross, V. Shoup. In ACM CCS, pp. 600–610, ACM Press, 2009.
Remarks on “Analysis of one popular group signature scheme” in Asiacrypt 2006. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik. In International Journal of Applied Cryptography 1(4), 320–322, Inderscience, 2009.
Oblivious transfer with access control. Jan Camenisch, Maria Dubovitskaya, Gregory Neven. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, pp. 131–140, ACM Press
Accountable privacy supporting services. Jan Camenisch, Thomas Gross, Thomas S Heydt-Benjamin. In Identity in the Information Society, 1–27, Springer, 2009.
An accumulator based on bilinear maps and efficient revocation for anonymous credentials. Jan Camenisch, Markulf Kohlweiss, Claudio Soriente. In Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC’09, pp. 481–500, Springer, 2009.
Blind and anonymous identity-based encryption and authorised private searches on public key encrypted data. Jan Camenisch, Markulf Kohlweiss, Alfredo Rial, Caroline Sheedy. In Proceedings of the 12th International Conference on Practice and Theory in Public Key Cryptography: PKC’09, pp. 196–214, Springer, 2009.
On the portability of generalized schnorr proofs. Jan Camenisch, Aggelos Kiayias, and Moti Yung. In EUROCRYPT, pp. 425–442, Springer, 2009.
Private intersection of certified sets. Jan Camenisch and Greg Zaverucha. In Financial Cryptography and Data Security, 108–127, Springer, 2009.
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks. Jan Camenisch, Chandran, and Victor Shoup. In Eurocrypt 2009, pp. 351–368, Springer Verlag.
Randomizable proofs and delegatable anonymous credentials. Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham. In Crypto 2009, pp. 125, Springer Verlag, LNCS.
2008
Rethinking Accountable Privacy Supporting Services. Jan Camenisch, Thomas Gross, Thomas S Heydt-Benjamin, In ACM Digital Identity Management Workshop (DIM), pp. 1–8, 2008.
Efficient attributes for anonymous credentials. Jan Camenisch and Thomas Gross. Proceedings of the 15th ACM Conference on Computer and Communications Security (ACM CCS’08), pp. 345–356, ACM Press, 2008.
Efficient protocols for set membership and range proofs. Jan Camenisch, Rafael Chaabouni, abhi shelat. In Asiacrypt 2008, LNCS, pp. 252, Springer Verlag.
2007
Simulatable adaptive oblivious transfer. Jan Camenisch, Gregory Neven, abhi shelat. In Advances in Cryptology — EUROCRYPT 2007, pp. 573–590, Springer-Verlag.
Federated Identity Management. Jan Camenisch and Birgit Pfitzmann. In Security, Privacy, and Trust in Modern Data Management. ISBN, 978–3, Springer, 2007
Endorsed e-cash. Jan Camenisch, Anna Lysyanskaya, and Mira Meyerovich. In Security and Privacy, 2007, pp. 101–115
2006
Direct Anonymous Attestation Explained. Jan Camenisch. In Cryptographic Protocols, Addison-Wesley, 2006.
Balancing accountability and privacy using e-cash. Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya. In Security and Cryptography for Networks, pp. 141–155, Springer, 2006.
User Centricity: A Taxonomy and Open Issues. Abhilasha Bhargav-Spantzel, Jan Camenisch, Thomas Gross, and Dieter Sommer. In 2006 ACM Workshop on Digital Identity Management ({DIM}), pp. 1–10, ACM Press.
A general certification framework with applications to privacy-enhancing certificate infrastructures. Jan Camenisch, Dieter Sommer, Roger Zimmermann. In Security and Privacy in Dynamic Environments, pp. 25–37, Springer, 2006.
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security. Jan Camenisch, Thomas Gross, Dieter Sommer. In Proceedings of the 5th ACM workshop on Privacy in electronic society, pp. 67–72, 2006.
How to win the clonewars: efficient periodic n-times anonymous authentication. Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich. In ACM CCS, pp. 201–210, ACM, 2006.
Securing user inputs for the web. Jan Camenisch, Dieter Sommer, Roger Zimmermann, others. In Proceedings of the second ACM workshop on Digital identity management, pp. 33–44, 2006.
Protecting (Anonymous) Credentials with the Trusted Computing Group’s TPM V1. 2. Jan Camenisch. In International Information Security Conference (SEC 2006) 201, 135–147, Springer Boston
Fine-grained forward-secure signature schemes without random oracles. Jan Camenisch, Maciej Koprowski. In Discrete Applied Mathematics 154(2), 175–188, Elsevier, 2006.
2005
Practical group signatures without random oracles. Giuseppe Ateniese, Jan Camenisch, Breno Medeiros de, Susan Hohenberger. IACR ePrint Archive, 2005/385
A formal treatment of onion routing. Jan Camenisch, Anna Lysyanskaya. In Advances in Cryptology–CRYPTO 2005, pp. 169–187, Springer.
Trust in PRIME. Christer Andersson, Jan Camenisch, Stephen Crane, Simone Fischer-Hubner, Ronald Leenes, Siani Pearson, John Sören Pettersson, Dieter Sommer. In Signal Processing and Information Technology, 2005. Proceedings of the Fifth IEEE International Symposium on, pp. 552–559.
Untraceable RFID tags via insubvertible encryption. Giuseppe Ateniese, Jan Camenisch, Breno de Medeiros. In Proceedings of the 12th ACM conference on Computer and communications security, pp. 92–101, 2005.
Privacy and identity management for everyone. Jan Camenisch, Dieter Sommer, Simone Fischer-Huebner, Marit Hansen, Henry Krasemann, Gérard Lacoste, Ronald Leenes, Jimmy Tseng, others. In Proceedings of the 2005 workshop on Digital identity management, pp. 20–27, ACM.
Efficient blind signatures without random oracles. Jan Camenisch, Maciej Koprowski, and Bogdan Warinschi. In SCN, pp. 134–148, Springer, 2005.
Compact e-cash. Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya. Eurocrypt, pp. 566–566, Springer, 2005.
The DAA scheme in context. Ernie Brickell, Jan Camenisch, Liqun Chen. In Trusted computing, pp. 143, IET, 2005.
Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order. Endre Bangerter, Jan Camenisch, Ueli Maurer. In Public Key Cryptography, pp. 154–171, Springer, 2005.
Anonymous yet accountable access control. Michael Backes, Jan Camenisch, Dieter Sommer. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 40–46, ACM.
Mix-network with stronger security. Jan Camenisch, Anton Mityagin. In Privacy Enhancing Technologies (PET) 2005, pp. 128-146, Springer.
2004
Efficient Blind Signatures Without Random Oracles. Jan Camenisch, Maciej Koprowski, and Bogdan Warinschi. In SCN, pp. 134–148, 2004
Group signatures: Better efficiency and new theoretical aspects. Jan Camenisch, Jens Groth. In SCN 2004, pp. 120–133, Springer Verlag.
Signature Schemes and Anonymous Credentials from Bilinear Maps. Jan Camenisch, Anna Lysyanskaya. In Crypto’04, LNCS, Springer-Verlag.
Direct anonymous attestation. Ernie Brickell, Jan Camenisch, Liqun Chen. In Proceedings of the 11th ACM conference on Computer and communications security, pp. 132–145, ACM, 2004.
Signature schemes and anonymous credentials from bilinear maps. Jan Camenisch, Anna Lysyanskaya. In Advances in Cryptology – Crypto 2004, pp. 56–72, Springer.
Better privacy for trusted computing platforms. Jan Camenisch. In Computer Security–ESORICS 2004, pp. 73–88, Springer.
A cryptographic framework for the controlled release of certified data. Endre Bangerter, Jan Camenisch, Anna Lysyanskaya. In Security Protocols, pp. 20, Springer, 2004.
2003
A signature scheme with efficient protocols. Jan Camenisch, Anna Lysyanskaya. In SCN 2002, LNCS 2576
Practical verifiable encryption and decryption of discrete logarithms. Jan Camenisch, Victor Shoup. In Advances in Cryptology—CRYPTO, pp. 126–144, Springer, 2003.
2002
Design and implementation of the idemix anonymous credential system. Jan Camenisch, Els Van Herreweghen. In Proceedings of the 9th ACM conference on Computer and communications security, pp. 21–30, ACM, 2002
Efficient computation modulo a shared secret with application to the generation of shared safe-prime products. Joy Algesheimer, Jan Camenisch, Victor Shoup. In Crypto 2000, pp. 417–432, Springer, 2002
Dynamic accumulators and application to efficient revocation of anonymous credentials. Jan Camenisch, Anna Lysyanskaya. In Crypto 2002, pp. 101–120, Springer.
A signature scheme with efficient protocols. Jan Camenisch, Anna Lysyanskaya. In Security in Communication Networks , pp. 268–289, Springer, 2002
2001
Cryptographic security for mobile code. Joy Algesheimer, Christian Cachin, Jan Camenisch, Günter Karjoth. In Security and Privacy, 2001. S\&P 2001. Proceedings. 2001 IEEE Symposium on, pp. 2–11.
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. Jan Camenisch, Anna Lysyanskaya. In Advances in Cryptology-Eurocrypt 2001, pp. 93-118, Springer Verlag.
An identity escrow scheme with appointed verifiers. Jan Camenisch, Anna Lysyanskaya. In Advances in Cryptology—CRYPTO 2001, pp. 388–407, Springer.
2000
One-round secure computation and secure autonomous mobile agents. Christian Cachin, Jan Camenisch, Joe Kilian, Joy Müller. In Proc ICALP, pp. 512–523, Springer, 2000.
Confirmer signature schemes secure against adaptive adversaries. Jan Camenisch, Markus Michels. In Advances in Cryptology—EUROCRYPT 2000, pp. 243–258, Springer.
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. Jan Camenisch, Ivan Damgård. In Advances in Cryptology—ASIACRYPT 2000, 331–345, Springer.
A practical and provably secure coalition-resistant group signature scheme. Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik. In Advances in Cryptology—CRYPTO 2000, pp. 255–270, Springer.
Efficient anonymous fingerprinting with group signatures. Jan Camenisch. In Advances in Cryptology—ASIACRYPT 2000, 415–428, Springer.
Optimistic Fair Secure Computation. Christian Cachin, Jan Camenisch. In CRYPTO 2000, pp. 94–112, Springer.
1999
Proving in zero-knowledge that a number is the product of two safe primes. Jan Camenisch, Markus Michels. In Eurocrypt ’99, pp. 107–122, Springer, LNCS, 1999.
Separability and efficiency for generic group signature schemes. Jan Camenisch, Markus Michels. In Crypto ’99, pp. 413–430, Springer, 1999.
1998
Group signature schemes and payment systems based on the discrete logarithm problem. Jan Camenisch. In ETH Series in Information Security and Cryptography, Diss. ETH No. 12520, Hartung-Gorre Verlag, Konstanz, 1998
A group signature scheme based on an RSA-variant. Jan Camenisch, Markus Michels. Technical Report, BRICS, 1998
A group signature scheme with improved efficiency. Jan Camenisch, Markus Michels. In Asiacrypt ’98, pp. 160–174, Springer, 1998
1997
Partially blind signature schemes. Masa Abe, Jan Camenisch. Proceedings of Symposium on Cryptography and Information Security, 1997
Proof systems for general statements about discrete logarithms. Jan Camenisch, Markus Stadler. Institute for Theoretical Computer Science, ETH Zurich, Tech. Rep. TR260, ETH Zurich, 1997
Digital payment systems with passive anonymity-revoking trustees. Jan Camenisch, Ueli Maurer, Markus Stadler. In Computer Security—ESORICS 96, pp. 69–89, IOS Press, 1997.
Efficient group signature schemes for large groups. Jan Camenisch, Markus Stadler. In Advances in Cryptology—CRYPTO’971294, 410–424, Springer, 1997
Efficient and generalized group signatures. Jan Camenisch. In Advances in cryptology—EUROCRYPT’97, pp. 465–479, Springer, 1997.
1996
An efficient fair payment system. Jan Camenisch, Jean Marc Piveteau, Markus Stadler. In Proceedings of the 3rd ACM conference on Computer and communications security, pp. 88–94, ACM, 1996
1995
Fair Anonyme Zahlungssysteme. Jan Camenisch, Jean Marc Piveteau, Markus Stadler. In Eurocrypt, pp. 254–265, Springer Verlag, 1995
1994
An Efficient Electronic Payment System Protecting Privacy. Jan L Camenisch, Jean Marc Piveteau, Markus A Stadler. In ESORICS 94, Springer-Verlag, Berlin, 1994
Blind signatures based on the discrete logarithm problem. Jan L Camenisch, Jean Marc Piveteau, Markus A Stadler. In Advances in Cryptology—EUROCRYPT’94, pp. 428–432, Springer, 1994