Cryptographers' World
 

Jan Camenisch


Author's Web Page Link

29 papers in database with 4634 citations StarStarStarStar

Editor of 1 conference proceedings book

H-number: 23

Conference Proceedings

 
1. Christian CachinJan Camenisch, editors, Advances in Cryptology - EUROCRYPT 2004, International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004, Proceedings. Springer, 2004. ISBN 3-540-21935-8.
[Papers]

Find this book on amazon.com , amazon.co.uk, amazon.ca, amazon.de, amazon.fr, Google Books or Wikipedia.

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Mira Belenkiy,  Jan Camenisch,  Melissa Chase,  Markulf Kohlweiss,  Anna Lysyanskaya,  Hovav Shacham,  Randomizable Proofs and Delegatable Anonymous Credentials, pp. 108 - 125, CRYPTO 2009.

[Electronic Edition][Cited 50 times Red Star]

2. Jan Camenisch,  Nishanth Chandran,  Victor Shoup,  A Public Key Encryption Scheme Secure against Key Dependent Chosen Plaintext and Adaptive Chosen Ciphertext Attacks, pp. 351 - 368, EUROCRYPT 2009.

[Electronic Edition][Cited 23 times ]

3. Jan Camenisch,  Aggelos Kiayias,  Moti Yung,  On the Portability of Generalized Schnorr Proofs, pp. 425 - 442, EUROCRYPT 2009.

[Electronic Edition][Cited 18 times ]

4. Jan Camenisch,  Markulf Kohlweiss,  Alfredo Rial,  Caroline Sheedy,  Blind and Anonymous Identity-Based Encryption and Authorised Private Searches on Public Key Encrypted Data, pp. 196 - 214, PKC 2009.

[Electronic Edition][Cited 11 times ]

5. Jan Camenisch,  Markulf Kohlweiss,  Claudio Soriente,  An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials, pp. 481 - 500, PKC 2009.

[Electronic Edition][Cited 18 times ]

6. Jan Camenisch,  Rafik Chaabouni,  Abhi Shelat,  Efficient Protocols for Set Membership and Range Proofs, pp. 234 - 252, ASIACRYPT 2008.

[Electronic Edition][Cited 14 times ]

7. Jan Camenisch,  Gregory Neven,  Abhi Shelat,  Simulatable Adaptive Oblivious Transfer, pp. 573 - 590, EUROCRYPT 2007.

[Electronic Edition][Cited 68 times Red Star]

8. Jan Camenisch,  Susan Hohenberger,  Michael Østergaard Pedersen,  Batch Verification of Short Signatures, pp. 246 - 263, EUROCRYPT 2007.

[Electronic Edition][Cited 45 times ]

9. Jan Camenisch,  Anna Lysyanskaya,  A Formal Treatment of Onion Routing, pp. 169 - 187, CRYPTO 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 54 times Red Star]

10. Jan Camenisch,  Susan Hohenberger,  Anna Lysyanskaya,  Compact E-Cash, pp. 302 - 321, EUROCRYPT 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 136 times Red StarRed Star]

11. Endre Bangerter,  Jan Camenisch,  Ueli M. Maurer,  Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order, pp. 154 - 171, PKC 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 23 times ]

12. Jan Camenisch,  Anna Lysyanskaya,  Signature Schemes and Anonymous Credentials from Bilinear Maps, pp. 56 - 72, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 266 times Red StarRed StarRed Star]

13. Jan Camenisch,  Victor Shoup,  Practical Verifiable Encryption and Decryption of Discrete Logarithms, pp. 126 - 144, CRYPTO 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 227 times Red StarRed Star]

14. Joy Algesheimer,  Jan Camenisch,  Victor Shoup,  Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products, pp. 417 - 432, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 80 times Red Star]

15. Jan Camenisch,  Anna Lysyanskaya,  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, pp. 61 - 76, CRYPTO 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 297 times Red StarRed StarRed Star]

16. Jan Camenisch,  Anna Lysyanskaya,  An Identity Escrow Scheme with Appointed Verifiers, pp. 388 - 407, CRYPTO 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 39 times ]

17. Jan Camenisch,  Anna Lysyanskaya,  An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, pp. 93 - 118, EUROCRYPT 2001.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 398 times Red StarRed StarRed Star]

18. Jan Camenisch,  Efficient Anonymous Fingerprinting with Group Signatures, pp. 415 - 428, ASIACRYPT 2000.

[Electronic Edition][Cited 47 times ]

19. Jan Camenisch,  Ivan Damgard,  Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes, pp. 331 - 345, ASIACRYPT 2000.

[Electronic Edition][Cited 118 times Red StarRed Star]

20. Giuseppe Ateniese,  Jan Camenisch,  Marc Joye,  Gene Tsudik,  A Practical and Provably Secure Coalition-Resistant Group Signature Scheme, pp. 255 - 270, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 589 times Red StarRed StarRed StarRed Star]

21. Christian Cachin,  Jan Camenisch,  Optimistic Fair Secure Computation, pp. 93 - 111, CRYPTO 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 47 times ]

22. Jan Camenisch,  Markus Michels,  Confirmer Signature Schemes Secure against Adaptive Adversaries, pp. 243 - 258, EUROCRYPT 2000.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 98 times Red Star]

23. Jan Camenisch,  Markus Michels,  Separability and Efficiency for Generic Group Signature Schemes, pp. 413 - 430, CRYPTO 1999.

[Electronic Edition][Cited 159 times Red StarRed Star]

24. Jan Camenisch,  Markus Michels,  Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes, pp. 107 - 122, EUROCRYPT 1999.

[Electronic Edition][Cited 217 times Red StarRed Star]

25. Jan Camenisch,  Markus Michels,  A Group Signature Scheme with Improved Efficiency, pp. 160 - 174, ASIACRYPT 1998.

[Electronic Edition][Cited 181 times Red StarRed Star]

26. Jan Camenisch,  Markus Stadler,  Efficient Group Signature Schemes for Large Groups (Extended Abstract), pp. 410 - 424, CRYPTO 1997.

[Electronic Edition][Cited 702 times Red StarRed StarRed StarRed Star]

27. Jan Camenisch,  Efficient and Generalized Group Signatures, pp. 465 - 479, EUROCRYPT 1997.

[Electronic Edition][Cited 251 times Red StarRed StarRed Star]

28. Markus Stadler,  Jean-Marc Piveteau,  Jan Camenisch,  Fair Blind Signatures, pp. 209 - 219, EUROCRYPT 1995.

[Electronic Edition][Cited 242 times Red StarRed Star]

29. Jan Camenisch,  Jean-Marc Piveteau,  Markus Stadler,  Blind Signatures Based on the Discrete Logarithm Problem, pp. 428 - 432, EUROCRYPT 1994.

[Electronic Edition][Cited 216 times Red StarRed Star]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...