Jan Camenisch
Orcid: 0000-0001-6654-9459Affiliations:
- DFINITY, Switzerland
- IBM Research Zurich, Switzerland (former)
According to our database1,
Jan Camenisch
authored at least 179 papers
between 1994 and 2021.
Collaborative distances:
Collaborative distances:
Awards
ACM Fellow
ACM Fellow 2018, "For contributions to privacy-enhancing cryptographic protocols and leadership in their practical realization".
IEEE Fellow
IEEE Fellow 2013, "For contributions to privacy-enhancing cryptographic protocols".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on twitter.com
-
on orcid.org
-
on d-nb.info
-
on dl.acm.org
On csauthors.net:
Bibliography
2021
Proceedings of the 34th IEEE Computer Security Foundations Symposium, 2021
2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
2019
J. Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Oblivious PRF on Committed Vector Inputs and Application to Deduplication of Encrypted Data.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Future Gener. Comput. Syst., 2019
Dagstuhl Reports, 2019
2018
2017
IACR Cryptol. ePrint Arch., 2017
Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible Sanitizable Signatures.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Privacy-preserving attribute-based credentials in cooperative intelligent transport systems.
Proceedings of the 2017 IEEE Vehicular Networking Conference, 2017
Directions in Security Research.
Proceedings of the 14th International Joint Conference on e-Business and Telecommunications (ICETE 2017), 2017
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017
Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Scalable Revocation Scheme for Anonymous Credentials Based on n-times Unlinkable Proofs.
Proceedings of the 2016 ACM on Workshop on Privacy in the Electronic Society, 2016
2015
IACR Cryptol. ePrint Arch., 2015
Two-Server Password-Authenticated Secret Sharing UC-Secure Against Transient Corruptions.
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Strengthening Authentication with Privacy-Preserving Location Verification of Mobile Phones.
Proceedings of the 14th ACM Workshop on Privacy in the Electronic Society, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015
2014
J. Inf. Secur. Appl., 2014
IACR Cryptol. ePrint Arch., 2014
Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment.
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Trust and Trustworthy Computing - 7th International Conference, 2014
Better Zero-Knowledge Proofs for Lattice Encryption and Their Application to Group Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
2013
Practical and Employable Protocols for UC-Secure Circuit Evaluation over Z<sub>n</sub>.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, 2013
Proceedings of the Secure Data Management - 10th VLDB Workshop, 2013
Concepts Around Privacy-Preserving Attribute-Based Credentials - Making Authentication with Anonymous Credentials Practical.
Proceedings of the Privacy and Identity Management for Emerging Services and Technologies, 2013
Proceedings of the Policies and Research in Identity Management, 2013
Proceedings of the Computer Security - ESORICS 2013, 2013
Universally composable adaptive oblivious transfer (with access control) from standard assumptions.
Proceedings of the DIM'13, 2013
2012
IACR Cryptol. ePrint Arch., 2012
Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing.
IACR Cryptol. ePrint Arch., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
Proceedings of the Communications and Multimedia Security, 2012
2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
Proceedings of the Digital Privacy - PRIME - Privacy and Identity Management for Europe, 2011
IACR Cryptol. ePrint Arch., 2011
Structure Preserving CCA Secure Encryption and Its Application to Oblivious Third Parties.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011
Proceedings of the DIM'11, Proceedings of the 2013 ACM Workshop on Digital Identity Management, Chicago, IL, USA, 2011
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
Proceedings of the Privacy and Identity Management for Life, 2011
2010
J. Comput. Secur., 2010
Exploiting cryptography for privacy-enhanced access control: A result of the PRIME Project.
J. Comput. Secur., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010
Proceedings of the Policies and Research in Identity Management, 2010
Proceedings of the Policies and Research in Identity Management, 2010
Proceedings of the Formal Methods for Industrial Critical Systems, 2010
Proceedings of the Financial Cryptography and Data Security, 14th International Conference, 2010
2009
Int. J. Appl. Cryptogr., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Privacy and Identity Management for Life, 2009
Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data.
Proceedings of the Public Key Cryptography, 2009
Proceedings of the Financial Cryptography and Data Security, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the 2009 ACM Conference on Computer and Communications Security, 2009
2008
An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials.
IACR Cryptol. ePrint Arch., 2008
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks.
IACR Cryptol. ePrint Arch., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the 4th Workshop on Digital Identity Management, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P 2007), 2007
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Discret. Appl. Math., 2006
Enhancing privacy of federated identity management protocols: anonymous credentials in WS-security.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
A General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures.
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Security and Privacy in Dynamic Environments, 2006
Proceedings of the Security and Cryptography for Networks, 5th International Conference, 2006
Proceedings of the 2006 Workshop on Digital Identity Management, 2006
Proceedings of the 13th ACM Conference on Computer and Communications Security, 2006
2005
Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, 2005
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order.
Proceedings of the Public Key Cryptography, 2005
Proceedings of the Privacy Enhancing Technologies, 5th International Workshop, 2005
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
Proceedings of the 12th ACM Conference on Computer and Communications Security, 2005
2004
Proceedings of the Security Protocols, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Security in Communication Networks, 4th International Conference, 2004
Proceedings of the Computer Security, 2004
Proceedings of the Advances in Cryptology, 2004
2002
IACR Cryptol. ePrint Arch., 2002
Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products.
IACR Cryptol. ePrint Arch., 2002
Proceedings of the Security in Communication Networks, Third International Conference, 2002
Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.
Proceedings of the Advances in Cryptology, 2002
Proceedings of the 9th ACM Conference on Computer and Communications Security, 2002
2001
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation.
IACR Cryptol. ePrint Arch., 2001
Proceedings of the 2001 IEEE Symposium on Security and Privacy, 2001
Proceedings of the Advances in Cryptology, 2001
2000
Proceedings of the Automata, Languages and Programming, 27th International Colloquium, 2000
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes.
Proceedings of the Advances in Cryptology, 2000
Proceedings of the Advances in Cryptology, 2000
1999
IACR Cryptol. ePrint Arch., 1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
PhD thesis, 1998
Proceedings of the Advances in Cryptology, 1998
1997
J. Comput. Secur., 1997
Proceedings of the Advances in Cryptology, 1997
Proceedings of the Advances in Cryptology, 1997
1996
1995
1994
Proceedings of the Advances in Cryptology, 1994
Proceedings of the Computer Security, 1994