Jan Camenisch
Jan Camenisch
DFINITY
Dirección de correo verificada de dfinity.org - Página principal
TítuloCitado porAño
Efficient group signature schemes for large groups
J Camenisch, M Stadler
Annual International Cryptology Conference, 410-424, 1997
14231997
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
J Camenisch, A Lysyanskaya
International conference on the theory and applications of cryptographic …, 2001
13432001
A practical and provably secure coalition-resistant group signature scheme
G Ateniese, J Camenisch, M Joye, G Tsudik
Annual International Cryptology Conference, 255-270, 2000
11672000
Direct anonymous attestation
E Brickell, J Camenisch, L Chen
Proceedings of the 11th ACM conference on Computer and communications …, 2004
10572004
Signature schemes and anonymous credentials from bilinear maps
J Camenisch, A Lysyanskaya
Annual International Cryptology Conference, 56-72, 2004
9152004
Dynamic accumulators and application to efficient revocation of anonymous credentials
J Camenisch, A Lysyanskaya
Annual International Cryptology Conference, 61-76, 2002
8272002
A signature scheme with efficient protocols
J Camenisch, A Lysyanskaya
International Conference on Security in Communication Networks, 268-289, 2002
7812002
Design and implementation of the idemix anonymous credential system
J Camenisch, E Van Herreweghen
Proceedings of the 9th ACM conference on Computer and communications …, 2002
6532002
Practical verifiable encryption and decryption of discrete logarithms
J Camenisch, V Shoup
Annual International Cryptology Conference, 126-144, 2003
5412003
Compact e-cash
J Camenisch, S Hohenberger, A Lysyanskaya
Annual International Conference on the Theory and Applications of …, 2005
4492005
Fair blind signatures
M Stadler, JM Piveteau, J Camenisch
International Conference on the Theory and Applications of Cryptographic …, 1995
4101995
Blind signatures based on the discrete logarithm problem
JL Camenisch, JM Piveteau, MA Stadler
Workshop on the Theory and Application of of Cryptographic Techniques, 428-432, 1994
4081994
Efficient and generalized group signatures
J Camenisch
International Conference on the Theory and Applications of Cryptographic …, 1997
3981997
Proving in zero-knowledge that a number is the product of two safe primes
J Camenisch, M Michels
International Conference on the Theory and Applications of Cryptographic …, 1999
3591999
Digital payment systems with passive anonymity-revoking trustees
J Camenisch, U Maurer, M Stadler
Journal of Computer Security 5 (1), 69-89, 1997
3011997
A group signature scheme with improved efficiency
J Camenisch, M Michels
International Conference on the Theory and Application of Cryptology and …, 1998
2961998
Randomizable proofs and delegatable anonymous credentials
M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ...
Annual International Cryptology Conference, 108-125, 2009
2882009
How to win the clonewars: efficient periodic n-times anonymous authentication
J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ...
Proceedings of the 13th ACM conference on Computer and communications …, 2006
2592006
Group signatures: Better efficiency and new theoretical aspects
J Camenisch, J Groth
International Conference on Security in Communication Networks, 120-133, 2004
2522004
Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes
J Camenisch, I Damgård
International Conference on the Theory and Application of Cryptology and …, 2000
250*2000
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20