Folgen
Jan Camenisch
Jan Camenisch
DFINITY
Bestätigte E-Mail-Adresse bei dfinity.org - Startseite
Titel
Zitiert von
Zitiert von
Jahr
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
J Camenisch, A Lysyanskaya
International conference on the theory and applications of cryptographic …, 2001
16002001
Efficient group signature schemes for large groups
J Camenisch, M Stadler
Annual International Cryptology Conference, 410-424, 1997
15991997
Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications …, 2004
12722004
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Annual international cryptology conference, 255-270, 2000
12472000
Signature schemes and anonymous credentials from bilinear maps
J Camenisch, A Lysyanskaya
Annual international cryptology conference, 56-72, 2004
11032004
Dynamic accumulators and application to efficient revocation of anonymous credentials
J Camenisch, A Lysyanskaya
Annual international cryptology conference, 61-76, 2002
9862002
A signature scheme with efficient protocols
J Camenisch, A Lysyanskaya
International Conference on Security in Communication Networks, 268-289, 2002
9052002
Design and implementation of the idemix anonymous credential system
J Camenisch, E Van Herreweghen
Proceedings of the 9th ACM Conference on Computer and Communications …, 2002
7632002
Practical verifiable encryption and decryption of discrete logarithms
J Camenisch, V Shoup
Annual International Cryptology Conference, 126-144, 2003
6292003
Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Annual International Conference on the Theory and Applications of …, 2005
5542005
Blind signatures based on the discrete logarithm problem
JL Camenisch, JM Piveteau, MA Stadler
Workshop on the Theory and Application of of Cryptographic Techniques, 428-432, 1994
4541994
Efficient and generalized group signatures
J Camenisch
International Conference on the Theory and Applications of Cryptographic …, 1997
4301997
Fair blind signatures
M Stadler, JM Piveteau, J Camenisch
International Conference on the Theory and Applications of Cryptographic …, 1995
4241995
Proving in zero-knowledge that a number is the product of two safe primes
J Camenisch, M Michels
International Conference on the Theory and Applications of Cryptographic …, 1999
3921999
Using a rules model to improve handling of personally identifiable information
SB Adler, EF Bangerter, NHJ Brown, J Camenisch, AM Gilbert, G Karjoth, ...
US Patent 7,069,427, 2006
3272006
Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Journal of Computer Security 5 (1), 69-89, 1997
3261997
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Annual International Cryptology Conference, 108-125, 2009
3242009
A group signature scheme with improved efficiency
J Camenisch, M Michels
International Conference on the Theory and Application of Cryptology and …, 1998
3221998
Efficient protocols for set membership and range proofs
J Camenisch, R Chaabouni
International Conference on the Theory and Application of Cryptology and …, 2008
3162008
An accumulator based on bilinear maps and efficient revocation for anonymous credentials
J Camenisch, M Kohlweiss, C Soriente
International workshop on public key cryptography, 481-500, 2009
3092009
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20