BibTeX records: Jan Camenisch

download as .bib file

@inproceedings{DBLP:conf/pqcrypto/BoschiniCOS20,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Max Ovsiankin and
               Nicholas Spooner},
  editor    = {Jintai Ding and
               Jean{-}Pierre Tillich},
  title     = {Efficient Post-quantum SNARKs for {RSIS} and {RLWE} and Their Applications
               to Privacy},
  booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
               2020, Paris, France, April 15-17, 2020, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {12100},
  pages     = {247--267},
  publisher = {Springer},
  year      = {2020},
  url       = {https://doi.org/10.1007/978-3-030-44223-1\_14},
  doi       = {10.1007/978-3-030-44223-1\_14},
  timestamp = {Wed, 15 Apr 2020 17:34:50 +0200},
  biburl    = {https://dblp.org/rec/conf/pqcrypto/BoschiniCOS20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDLNT20,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann and
               Gregory Neven and
               Patrick Towa},
  title     = {Short Threshold Dynamic Group Signatures},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2020},
  pages     = {16},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/016},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDLNT20.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDLNT20a,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann and
               Gregory Neven and
               Patrick Towa},
  title     = {Zone Encryption with Anonymous Authentication for {V2V} Communication},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2020},
  pages     = {43},
  year      = {2020},
  url       = {https://eprint.iacr.org/2020/043},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDLNT20a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/KassemCBKCHMS19,
  author    = {Nada El Kassem and
               Liqun Chen and
               Rachid El Bansarkhani and
               Ali {El Kaafarani} and
               Jan Camenisch and
               Patrick Hough and
               Paulo Martins and
               Leonel Sousa},
  title     = {More efficient, provably-secure direct anonymous attestation from
               lattices},
  journal   = {Future Gener. Comput. Syst.},
  volume    = {99},
  pages     = {425--458},
  year      = {2019},
  url       = {https://doi.org/10.1016/j.future.2019.04.036},
  doi       = {10.1016/j.future.2019.04.036},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/fgcs/KassemCBKCHMS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AbeCDD19,
  author    = {Masayuki Abe and
               Jan Camenisch and
               Rafael Dowsley and
               Maria Dubovitskaya},
  title     = {On the Impossibility of Structure-Preserving Deterministic Primitives},
  journal   = {J. Cryptology},
  volume    = {32},
  number    = {1},
  pages     = {239--264},
  year      = {2019},
  url       = {https://doi.org/10.1007/s00145-018-9292-1},
  doi       = {10.1007/s00145-018-9292-1},
  timestamp = {Tue, 08 Jan 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/joc/AbeCDD19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BradleyCJLNX19,
  author    = {Tatiana Bradley and
               Jan Camenisch and
               Stanislaw Jarecki and
               Anja Lehmann and
               Gregory Neven and
               Jiayu Xu},
  editor    = {Robert H. Deng and
               Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
               Mart{\'{\i}}n Ochoa and
               Moti Yung},
  title     = {Password-Authenticated Public-Key Encryption},
  booktitle = {Applied Cryptography and Network Security - 17th International Conference,
               {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11464},
  pages     = {442--462},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-21568-2\_22},
  doi       = {10.1007/978-3-030-21568-2\_22},
  timestamp = {Wed, 29 May 2019 12:25:55 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/BradleyCJLNX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischKK019,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Ralf K{\"{u}}sters and
               Daniel Rausch},
  editor    = {Steven D. Galbraith and
               Shiho Moriai},
  title     = {iUC: Flexible Universal Composability Made Simple},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kobe, Japan, December 8-12, 2019, Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {11923},
  pages     = {191--221},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-34618-8\_7},
  doi       = {10.1007/978-3-030-34618-8\_7},
  timestamp = {Fri, 22 Nov 2019 13:53:07 +0100},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischKK019.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CamenischCGS19,
  author    = {Jan Camenisch and
               Angelo De Caro and
               Esha Ghosh and
               Alessandro Sorniotti},
  editor    = {Ian Goldberg and
               Tyler Moore},
  title     = {Oblivious {PRF} on Committed Vector Inputs and Application to Deduplication
               of Encrypted Data},
  booktitle = {Financial Cryptography and Data Security - 23rd International Conference,
               {FC} 2019, Frigate Bay, St. Kitts and Nevis, February 18-22, 2019,
               Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {11598},
  pages     = {337--356},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-32101-7\_21},
  doi       = {10.1007/978-3-030-32101-7\_21},
  timestamp = {Mon, 14 Oct 2019 14:51:20 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/CamenischCGS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/CamenischDT19,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Patrick Towa},
  editor    = {Martin Albrecht},
  title     = {Efficient Fully Secure Leakage-Deterring Encryption},
  booktitle = {Cryptography and Coding - 17th {IMA} International Conference, {IMACC}
               2019, Oxford, UK, December 16-18, 2019, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11929},
  pages     = {102--127},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-35199-1\_6},
  doi       = {10.1007/978-3-030-35199-1\_6},
  timestamp = {Thu, 12 Dec 2019 16:03:01 +0100},
  biburl    = {https://dblp.org/rec/conf/ima/CamenischDT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CamenischDDH19,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Petr Dzurenda and
               Jan Hajny},
  editor    = {Gurpreet Dhillon and
               Fredrik Karlsson and
               Karin Hedstr{\"{o}}m and
               Andr{\'{e}} Z{\'{u}}quete},
  title     = {Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards},
  booktitle = {{ICT} Systems Security and Privacy Protection - 34th {IFIP} {TC} 11
               International Conference, {SEC} 2019, Lisbon, Portugal, June 25-27,
               2019, Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {562},
  pages     = {286--298},
  publisher = {Springer},
  year      = {2019},
  url       = {https://doi.org/10.1007/978-3-030-22312-0\_20},
  doi       = {10.1007/978-3-030-22312-0\_20},
  timestamp = {Thu, 23 Apr 2020 08:52:39 +0200},
  biburl    = {https://dblp.org/rec/conf/sec/CamenischDDH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/CamenischKLS19,
  author    = {Jan Camenisch and
               Ralf K{\"{u}}sters and
               Anna Lysyanskaya and
               Alessandra Scafuro},
  title     = {Practical Yet Composably Secure Cryptographic Protocols (Dagstuhl
               Seminar 19042)},
  journal   = {Dagstuhl Reports},
  volume    = {9},
  number    = {1},
  pages     = {88--103},
  year      = {2019},
  url       = {https://doi.org/10.4230/DagRep.9.1.88},
  doi       = {10.4230/DagRep.9.1.88},
  timestamp = {Wed, 26 Jun 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischKLS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDT19,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Bj{\"{o}}rn Tackmann},
  title     = {Multi-Protocol {UC} and its Use for Building Modular and Efficient
               Protocols},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {65},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/065},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDT19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BradleyCJLNX19,
  author    = {Tatiana Bradley and
               Jan Camenisch and
               Stanislaw Jarecki and
               Anja Lehmann and
               Gregory Neven and
               Jiayu Xu},
  title     = {Password-Authenticated Public-Key Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {199},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/199},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BradleyCJLNX19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCGS19,
  author    = {Jan Camenisch and
               Angelo De Caro and
               Esha Ghosh and
               Alessandro Sorniotti},
  title     = {Oblivious {PRF} on Committed Vector Inputs and Application to Deduplication
               of Encrypted Data},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {438},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/438},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischCGS19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDDH19,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Petr Dzurenda and
               Jan Hajny},
  title     = {Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {460},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/460},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDDH19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndroulakiCCDET19,
  author    = {Elli Androulaki and
               Jan Camenisch and
               Angelo De Caro and
               Maria Dubovitskaya and
               Kaoutar Elkhiyaoui and
               Bj{\"{o}}rn Tackmann},
  title     = {Privacy-preserving auditable token payments in a permissioned blockchain
               system},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1058},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1058},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AndroulakiCCDET19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKKR19,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Ralf K{\"{u}}sters and
               Daniel Rausch},
  title     = {iUC: Flexible Universal Composability Made Simple},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1073},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1073},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischKKR19.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDT19a,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Patrick Towa},
  title     = {Efficient Fully Secure Leakage-Deterring Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2019},
  pages     = {1472},
  year      = {2019},
  url       = {https://eprint.iacr.org/2019/1472},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDT19a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BoschiniCN18,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  editor    = {Bart Preneel and
               Frederik Vercauteren},
  title     = {Floppy-Sized Group Signatures from Lattices},
  booktitle = {Applied Cryptography and Network Security - 16th International Conference,
               {ACNS} 2018, Leuven, Belgium, July 2-4, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {10892},
  pages     = {163--182},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-93387-0\_9},
  doi       = {10.1007/978-3-319-93387-0\_9},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/BoschiniCN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischDGLN18,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Tommaso Gagliardoni and
               Anja Lehmann and
               Gregory Neven},
  editor    = {Jesper Buus Nielsen and
               Vincent Rijmen},
  title     = {The Wonderful World of Global Random Oracles},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10820},
  pages     = {280--312},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-78381-9\_11},
  doi       = {10.1007/978-3-319-78381-9\_11},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischDGLN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/BoschiniCN18,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  editor    = {Liqun Chen and
               Mark Manulis and
               Steve Schneider},
  title     = {Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs},
  booktitle = {Information Security - 21st International Conference, {ISC} 2018,
               Guildford, UK, September 9-12, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11060},
  pages     = {3--22},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-99136-8\_1},
  doi       = {10.1007/978-3-319-99136-8\_1},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/isw/BoschiniCN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/cans/2018,
  editor    = {Jan Camenisch and
               Panos Papadimitratos},
  title     = {Cryptology and Network Security - 17th International Conference, {CANS}
               2018, Naples, Italy, September 30 - October 3, 2018, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {11124},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-030-00434-7},
  doi       = {10.1007/978-3-030-00434-7},
  isbn      = {978-3-030-00433-0},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/cans/2018.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sacrypt/2017,
  editor    = {Carlisle Adams and
               Jan Camenisch},
  title     = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
               Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10719},
  publisher = {Springer},
  year      = {2018},
  url       = {https://doi.org/10.1007/978-3-319-72565-9},
  doi       = {10.1007/978-3-319-72565-9},
  isbn      = {978-3-319-72564-2},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/2017.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDGLN18,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Tommaso Gagliardoni and
               Anja Lehmann and
               Gregory Neven},
  title     = {The Wonderful World of Global Random Oracles},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {165},
  year      = {2018},
  url       = {http://eprint.iacr.org/2018/165},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDGLN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KassemCBKCH18,
  author    = {Nada El Kassem and
               Liqun Chen and
               Rachid El Bansarkhani and
               Ali {El Kaafarani} and
               Jan Camenisch and
               Patrick Hough},
  title     = {{L-DAA:} Lattice-Based Direct Anonymous Attestation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {401},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/401},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/KassemCBKCH18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniCN18,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  title     = {Floppy-Sized Group Signatures from Lattices},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2018},
  pages     = {453},
  year      = {2018},
  url       = {https://eprint.iacr.org/2018/453},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BoschiniCN18.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BeckCDKPSS17,
  author    = {Michael Till Beck and
               Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  editor    = {Josef Pieprzyk and
               Suriadi Suriadi},
  title     = {Practical Strongly Invisible and Strongly Accountable Sanitizable
               Signatures},
  booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
               2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10342},
  pages     = {437--452},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-60055-0\_23},
  doi       = {10.1007/978-3-319-60055-0\_23},
  timestamp = {Sun, 02 Jun 2019 21:26:44 +0200},
  biburl    = {https://dblp.org/rec/conf/acisp/BeckCDKPSS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischDD17,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Maria Dubovitskaya},
  editor    = {Bhavani M. Thuraisingham and
               David Evans and
               Tal Malkin and
               Dongyan Xu},
  title     = {Practical UC-Secure Delegatable Credentials with Attributes and Their
               Application to Blockchain},
  booktitle = {Proceedings of the 2017 {ACM} {SIGSAC} Conference on Computer and
               Communications Security, {CCS} 2017, Dallas, TX, USA, October 30 -
               November 03, 2017},
  pages     = {683--699},
  publisher = {{ACM}},
  year      = {2017},
  url       = {https://doi.org/10.1145/3133956.3134025},
  doi       = {10.1145/3133956.3134025},
  timestamp = {Tue, 06 Nov 2018 11:07:28 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischDD17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischDL17,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  editor    = {Jonathan Katz and
               Hovav Shacham},
  title     = {Anonymous Attestation with Subverted TPMs},
  booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10403},
  pages     = {427--461},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-63697-9\_15},
  doi       = {10.1007/978-3-319-63697-9\_15},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischDL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csfw/CamenischLNS17,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Kai Samelin},
  title     = {UC-Secure Non-interactive Public-Key Encryption},
  booktitle = {30th {IEEE} Computer Security Foundations Symposium, {CSF} 2017, Santa
               Barbara, CA, USA, August 21-25, 2017},
  pages     = {217--233},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/CSF.2017.14},
  doi       = {10.1109/CSF.2017.14},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/csfw/CamenischLNS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/CamenischL17,
  author    = {Jan Camenisch and
               Anja Lehmann},
  title     = {Privacy-Preserving User-Auditable Pseudonym Systems},
  booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  pages     = {269--284},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/EuroSP.2017.36},
  doi       = {10.1109/EuroSP.2017.36},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/eurosp/CamenischL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurosp/BaldimtsiCDLRSY17,
  author    = {Foteini Baldimtsi and
               Jan Camenisch and
               Maria Dubovitskaya and
               Anna Lysyanskaya and
               Leonid Reyzin and
               Kai Samelin and
               Sophia Yakoubov},
  title     = {Accumulators with Applications to Anonymity-Preserving Revocation},
  booktitle = {2017 {IEEE} European Symposium on Security and Privacy, EuroS{\&}P
               2017, Paris, France, April 26-28, 2017},
  pages     = {301--315},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/EuroSP.2017.13},
  doi       = {10.1109/EuroSP.2017.13},
  timestamp = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl    = {https://dblp.org/rec/conf/eurosp/BaldimtsiCDLRSY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CachinCFL17,
  author    = {Christian Cachin and
               Jan Camenisch and
               Eduarda Freire{-}St{\"{o}}gbuchner and
               Anja Lehmann},
  editor    = {Aggelos Kiayias},
  title     = {Updatable Tokenization: Formal Definitions and Provably Secure Constructions},
  booktitle = {Financial Cryptography and Data Security - 21st International Conference,
               {FC} 2017, Sliema, Malta, April 3-7, 2017, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {10322},
  pages     = {59--75},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-319-70972-7\_4},
  doi       = {10.1007/978-3-319-70972-7\_4},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/CachinCFL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icete/Camenisch17,
  author    = {Jan Camenisch},
  editor    = {Christian Callegari and
               Mohammad S. Obaidat and
               Enrique Cabello},
  title     = {Directions in Security Research},
  booktitle = {Proceedings of the 14th International Joint Conference on e-Business
               and Telecommunications {(ICETE} 2017) - Volume 1: DCNET, Madrid, Spain,
               July 24-26, 2017},
  pages     = {7},
  publisher = {SciTePress},
  year      = {2017},
  timestamp = {Wed, 29 Aug 2018 15:13:07 +0200},
  biburl    = {https://dblp.org/rec/conf/icete/Camenisch17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDKPSS17,
  author    = {Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  editor    = {Serge Fehr},
  title     = {Chameleon-Hashes with Ephemeral Trapdoors - And Applications to Invisible
               Sanitizable Signatures},
  booktitle = {Public-Key Cryptography - {PKC} 2017 - 20th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Amsterdam, The
               Netherlands, March 28-31, 2017, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10175},
  pages     = {152--182},
  publisher = {Springer},
  year      = {2017},
  url       = {https://doi.org/10.1007/978-3-662-54388-7\_6},
  doi       = {10.1007/978-3-662-54388-7\_6},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/CamenischDKPSS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CamenischCDLNU17,
  author    = {Jan Camenisch and
               Liqun Chen and
               Manu Drijvers and
               Anja Lehmann and
               David Novick and
               Rainer Urian},
  title     = {One {TPM} to Bind Them All: Fixing {TPM} 2.0 for Provably Secure Anonymous
               Attestation},
  booktitle = {2017 {IEEE} Symposium on Security and Privacy, {SP} 2017, San Jose,
               CA, USA, May 22-26, 2017},
  pages     = {901--920},
  publisher = {{IEEE} Computer Society},
  year      = {2017},
  url       = {https://doi.org/10.1109/SP.2017.22},
  doi       = {10.1109/SP.2017.22},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/CamenischCDLNU17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vnc/NevenBCN17,
  author    = {Gregory Neven and
               Gianmarco Baldini and
               Jan Camenisch and
               Ricardo Neisse},
  title     = {Privacy-preserving attribute-based credentials in cooperative intelligent
               transport systems},
  booktitle = {2017 {IEEE} Vehicular Networking Conference, {VNC} 2017, Torino, Italy,
               November 27-29, 2017},
  pages     = {131--138},
  publisher = {{IEEE}},
  year      = {2017},
  url       = {https://doi.org/10.1109/VNC.2017.8275631},
  doi       = {10.1109/VNC.2017.8275631},
  timestamp = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl    = {https://dblp.org/rec/conf/vnc/NevenBCN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDKPSS17,
  author    = {Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Chameleon-Hashes with Ephemeral Trapdoors And Applications to Invisible
               Sanitizable Signatures},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {11},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/011},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDKPSS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL17,
  author    = {Jan Camenisch and
               Anja Lehmann},
  title     = {Privacy for Distributed Databases via (Un)linkable Pseudonyms},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {22},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/022},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaldimtsiCDLRSY17,
  author    = {Foteini Baldimtsi and
               Jan Camenisch and
               Maria Dubovitskaya and
               Anna Lysyanskaya and
               Leonid Reyzin and
               Kai Samelin and
               Sophia Yakoubov},
  title     = {Accumulators with Applications to Anonymity-Preserving Revocation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {43},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/043},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BaldimtsiCDLRSY17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL17,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Anonymous Attestation with Subverted TPMs},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {200},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/200},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeckCDKPSS17,
  author    = {Michael Till Beck and
               Jan Camenisch and
               David Derler and
               Stephan Krenn and
               Henrich C. P{\"{o}}hls and
               Kai Samelin and
               Daniel Slamanig},
  title     = {Practical Strongly Invisible and Strongly Accountable Sanitizable
               Signatures},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {445},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/445},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BeckCDKPSS17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCDLNU17,
  author    = {Jan Camenisch and
               Liqun Chen and
               Manu Drijvers and
               Anja Lehmann and
               David Novick and
               Rainer Urian},
  title     = {One {TPM} to Bind Them All: Fixing {TPM} 2.0 for Provably Secure Anonymous
               Attestation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {639},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/639},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischCDLNU17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CachinCFL17,
  author    = {Christian Cachin and
               Jan Camenisch and
               Eduarda Freire{-}Stoegbuchner and
               Anja Lehmann},
  title     = {Updatable Tokenization: Formal Definitions and Provably Secure Constructions},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {695},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/695},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CachinCFL17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BoschiniCN17,
  author    = {Cecilia Boschini and
               Jan Camenisch and
               Gregory Neven},
  title     = {Relaxed Lattice-Based Signatures with Short Zero-Knowledge Proofs},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2017},
  pages     = {1123},
  year      = {2017},
  url       = {http://eprint.iacr.org/2017/1123},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BoschiniCN17.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischEKK016,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Stephan Krenn and
               Ralf K{\"{u}}sters and
               Daniel Rausch},
  editor    = {Jung Hee Cheon and
               Tsuyoshi Takagi},
  title     = {Universal Composition with Responsive Environments},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
               on the Theory and Application of Cryptology and Information Security,
               Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {10032},
  pages     = {807--840},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53890-6\_27},
  doi       = {10.1007/978-3-662-53890-6\_27},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischEKK016.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischDR16,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Alfredo Rial},
  editor    = {Matthew Robshaw and
               Jonathan Katz},
  title     = {{UC} Commitments for Modular Protocol Design and Applications to Revocation
               and Attribute Tokens},
  booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
               Proceedings, Part {III}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9816},
  pages     = {208--239},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-53015-3\_8},
  doi       = {10.1007/978-3-662-53015-3\_8},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischDR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDL16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  editor    = {Chen{-}Mou Cheng and
               Kai{-}Min Chung and
               Giuseppe Persiano and
               Bo{-}Yin Yang},
  title     = {Universally Composable Direct Anonymous Attestation},
  booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
               March 6-9, 2016, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9615},
  pages     = {234--264},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-662-49387-8\_10},
  doi       = {10.1007/978-3-662-49387-8\_10},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/CamenischDL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischEM16,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Ueli Maurer},
  editor    = {Vassilis Zikas and
               Roberto De Prisco},
  title     = {Memory Erasability Amplification},
  booktitle = {Security and Cryptography for Networks - 10th International Conference,
               {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9841},
  pages     = {104--125},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-44618-9\_6},
  doi       = {10.1007/978-3-319-44618-9\_6},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischEM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischLNS16,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Kai Samelin},
  editor    = {Vassilis Zikas and
               Roberto De Prisco},
  title     = {Virtual Smart Cards: How to Sign with a Password and a Server},
  booktitle = {Security and Cryptography for Networks - 10th International Conference,
               {SCN} 2016, Amalfi, Italy, August 31 - September 2, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9841},
  pages     = {353--371},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-44618-9\_19},
  doi       = {10.1007/978-3-319-44618-9\_19},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischLNS16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/CamenischDL16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  editor    = {Michael Franz and
               Panos Papadimitratos},
  title     = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited},
  booktitle = {Trust and Trustworthy Computing - 9th International Conference, {TRUST}
               2016, Vienna, Austria, August 29-30, 2016, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9824},
  pages     = {1--20},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-45572-3\_1},
  doi       = {10.1007/978-3-319-45572-3\_1},
  timestamp = {Tue, 14 May 2019 10:00:51 +0200},
  biburl    = {https://dblp.org/rec/conf/trust/CamenischDL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischDH16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Jan Hajny},
  editor    = {Edgar R. Weippl and
               Stefan Katzenbeisser and
               Sabrina De Capitani di Vimercati},
  title     = {Scalable Revocation Scheme for Anonymous Credentials Based on n-times
               Unlinkable Proofs},
  booktitle = {Proceedings of the 2016 {ACM} on Workshop on Privacy in the Electronic
               Society, WPES@CCS 2016, Vienna, Austria, October 24 - 28, 2016},
  pages     = {123--133},
  publisher = {{ACM}},
  year      = {2016},
  url       = {http://dl.acm.org/citation.cfm?id=2994625},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/conf/wpes/CamenischDH16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2015,
  editor    = {Jan Camenisch and
               Dogan Kesdogan},
  title     = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2015, Zurich, Switzerland, October 29, 2015, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9591},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-39028-4},
  doi       = {10.1007/978-3-319-39028-4},
  isbn      = {978-3-319-39027-7},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ifip11-4/2015.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2015,
  editor    = {David Aspinall and
               Jan Camenisch and
               Marit Hansen and
               Simone Fischer{-}H{\"{u}}bner and
               Charles D. Raab},
  title     = {Privacy and Identity Management. Time for a Revolution? - 10th {IFIP}
               {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer
               School, Edinburgh, UK, August 16-21, 2015, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {476},
  publisher = {Springer},
  year      = {2016},
  url       = {https://doi.org/10.1007/978-3-319-41763-9},
  doi       = {10.1007/978-3-319-41763-9},
  isbn      = {978-3-319-41762-2},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/primelife/2015.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEKKR16,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Stephan Krenn and
               Ralf K{\"{u}}sters and
               Daniel Rausch},
  title     = {Universal Composition with Responsive Environments},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {34},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/034},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischEKKR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDR16,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Alfredo Rial},
  title     = {{UC} Commitments for Modular Protocol Design and Applications to Revocation
               and Attribute Tokens},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {581},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/581},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDR16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL16,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {663},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/663},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDL16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEM16,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Ueli Maurer},
  title     = {Memory Erasability Amplification},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2016},
  pages     = {706},
  year      = {2016},
  url       = {http://eprint.iacr.org/2016/706},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischEM16.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/AhnBCHSW15,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  journal   = {J. Cryptology},
  volume    = {28},
  number    = {2},
  pages     = {351--395},
  year      = {2015},
  url       = {https://doi.org/10.1007/s00145-014-9182-0},
  doi       = {10.1007/s00145-014-9182-0},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/joc/AhnBCHSW15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/BaldimtsiCHKLN15,
  author    = {Foteini Baldimtsi and
               Jan Camenisch and
               Lucjan Hanzlik and
               Stephan Krenn and
               Anja Lehmann and
               Gregory Neven},
  editor    = {Tal Malkin and
               Vladimir Kolesnikov and
               Allison Bishop Lewko and
               Michalis Polychronakis},
  title     = {Recovering Lost Device-Bound Credentials},
  booktitle = {Applied Cryptography and Network Security - 13th International Conference,
               {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9092},
  pages     = {307--327},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-28166-7\_15},
  doi       = {10.1007/978-3-319-28166-7\_15},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/acns/BaldimtsiCHKLN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischDHK15,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Kristiyan Haralambiev and
               Markulf Kohlweiss},
  editor    = {Tetsu Iwata and
               Jung Hee Cheon},
  title     = {Composable and Modular Anonymous Credentials: Definitions and Practical
               Constructions},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2015 - 21st International Conference
               on the Theory and Application of Cryptology and Information Security,
               Auckland, New Zealand, November 29 - December 3, 2015, Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {9453},
  pages     = {262--288},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-48800-3\_11},
  doi       = {10.1007/978-3-662-48800-3\_11},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischDHK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischLN15,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven},
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {Optimal Distributed Password Verification},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {182--194},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2810103.2813722},
  doi       = {10.1145/2810103.2813722},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischLN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischL15,
  author    = {Jan Camenisch and
               Anja Lehmann},
  editor    = {Indrajit Ray and
               Ninghui Li and
               Christopher Kruegel},
  title     = {(Un)linkable Pseudonyms for Governmental Databases},
  booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
               Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages     = {1467--1479},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2810103.2813658},
  doi       = {10.1145/2810103.2813658},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischEN15,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Gregory Neven},
  editor    = {Jonathan Katz},
  title     = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against
               Transient Corruptions},
  booktitle = {Public-Key Cryptography - {PKC} 2015 - 18th {IACR} International Conference
               on Practice and Theory in Public-Key Cryptography, Gaithersburg, MD,
               USA, March 30 - April 1, 2015, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {9020},
  pages     = {283--307},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-662-46447-2\_13},
  doi       = {10.1007/978-3-662-46447-2\_13},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/CamenischEN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/CamenischKLMNP15,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Anja Lehmann and
               Gert L{\ae}ss{\o}e Mikkelsen and
               Gregory Neven and
               Michael {\O}stergaard Pedersen},
  editor    = {Orr Dunkelman and
               Liam Keliher},
  title     = {Formal Treatment of Privacy-Enhancing Credential Systems},
  booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
               Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {9566},
  pages     = {3--24},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-31301-6\_1},
  doi       = {10.1007/978-3-319-31301-6\_1},
  timestamp = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sacrypt/CamenischKLMNP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischOP15,
  author    = {Jan Camenisch and
               Diego Alejandro Ortiz{-}Yepes and
               Franz{-}Stefan Preiss},
  editor    = {Indrajit Ray and
               Nicholas Hopper and
               Rob Jansen},
  title     = {Strengthening Authentication with Privacy-Preserving Location Verification
               of Mobile Phones},
  booktitle = {Proceedings of the 14th {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2015, Denver, Colorado, USA, October 12, 2015},
  pages     = {37--48},
  publisher = {{ACM}},
  year      = {2015},
  url       = {https://doi.org/10.1145/2808138.2808144},
  doi       = {10.1145/2808138.2808144},
  timestamp = {Tue, 06 Nov 2018 16:59:07 +0100},
  biburl    = {https://dblp.org/rec/conf/wpes/CamenischOP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/BichselCDEKKLNPPRS15,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Stephan Krenn and
               Ioannis Krontiris and
               Anja Lehmann and
               Gregory Neven and
               Christian Paquin and
               Franz{-}Stefan Preiss and
               Kai Rannenberg and
               Ahmad Sabouri},
  editor    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri},
  title     = {An Architecture for Privacy-ABCs},
  booktitle = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  pages     = {11--78},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14439-9\_2},
  doi       = {10.1007/978-3-319-14439-9\_2},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {https://dblp.org/rec/books/daglib/p/BichselCDEKKLNPPRS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/BichselCDEKLNP15,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Stephan Krenn and
               Anja Lehmann and
               Gregory Neven and
               Franz{-}Stefan Preiss},
  editor    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri},
  title     = {Cryptographic Protocols Underlying Privacy-ABCs},
  booktitle = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  pages     = {79--108},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14439-9\_3},
  doi       = {10.1007/978-3-319-14439-9\_3},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {https://dblp.org/rec/books/daglib/p/BichselCDEKLNP15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/daglib/p/RannenbergCST15,
  author    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri and
               Welderufael Tesfay},
  editor    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri},
  title     = {Further Challenges},
  booktitle = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  pages     = {361--367},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14439-9\_12},
  doi       = {10.1007/978-3-319-14439-9\_12},
  timestamp = {Tue, 16 May 2017 14:01:41 +0200},
  biburl    = {https://dblp.org/rec/books/daglib/p/RannenbergCST15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/daglib/0039026,
  editor    = {Kai Rannenberg and
               Jan Camenisch and
               Ahmad Sabouri},
  title     = {Attribute-based Credentials for Trust: Identity in the Information
               Society},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-14439-9},
  doi       = {10.1007/978-3-319-14439-9},
  isbn      = {978-3-319-14438-2},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/books/daglib/0039026.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2014,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Marit Hansen},
  title     = {Privacy and Identity Management for the Future Internet in the Age
               of Globalisation - 9th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG
               9.2.2 International Summer School, Patras, Greece, September 7-12,
               2014, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {457},
  publisher = {Springer},
  year      = {2015},
  url       = {https://doi.org/10.1007/978-3-319-18621-4},
  doi       = {10.1007/978-3-319-18621-4},
  isbn      = {978-3-319-18620-7},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/primelife/2014.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ercim/CamenischLLN15,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {A Single Password for Everything?},
  journal   = {{ERCIM} News},
  volume    = {2015},
  number    = {100},
  year      = {2015},
  url       = {http://ercim-news.ercim.eu/en100/r-i/a-single-password-for-everything},
  timestamp = {Wed, 22 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ercim/CamenischLLN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischEN15,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Gregory Neven},
  title     = {Two-Server Password-Authenticated Secret Sharing UC-Secure Against
               Transient Corruptions},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {6},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/006},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischEN15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDHK15,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Kristiyan Haralambiev and
               Markulf Kohlweiss},
  title     = {Composable {\&} Modular Anonymous Credentials: Definitions and
               Practical Constructions},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {580},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/580},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDHK15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLNS15,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Kai Samelin},
  title     = {Virtual Smart Cards: How to Sign with a Password and a Server},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {1101},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1101},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischLNS15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDL15,
  author    = {Jan Camenisch and
               Manu Drijvers and
               Anja Lehmann},
  title     = {Universally Composable Direct Anonymous Attestation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2015},
  pages     = {1246},
  year      = {2015},
  url       = {http://eprint.iacr.org/2015/1246},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDL15.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/CamenischDELNPP14,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Anja Lehmann and
               Gregory Neven and
               Christian Paquin and
               Franz{-}Stefan Preiss},
  title     = {Concepts and languages for privacy-preserving attribute-based authentication},
  journal   = {J. Inf. Secur. Appl.},
  volume    = {19},
  number    = {1},
  pages     = {25--44},
  year      = {2014},
  url       = {https://doi.org/10.1016/j.jisa.2014.03.004},
  doi       = {10.1016/j.jisa.2014.03.004},
  timestamp = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/istr/CamenischDELNPP14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/BenhamoudaCKLN14,
  author    = {Fabrice Benhamouda and
               Jan Camenisch and
               Stephan Krenn and
               Vadim Lyubashevsky and
               Gregory Neven},
  editor    = {Palash Sarkar and
               Tetsu Iwata},
  title     = {Better Zero-Knowledge Proofs for Lattice Encryption and Their Application
               to Group Signatures},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
               {I}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8873},
  pages     = {551--572},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-45611-8\_29},
  doi       = {10.1007/978-3-662-45611-8\_29},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/BenhamoudaCKLN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischLLN14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Anna Lysyanskaya and
               Gregory Neven},
  editor    = {Juan A. Garay and
               Rosario Gennaro},
  title     = {Memento: How to Reconstruct Your Secrets from a Single Password in
               a Hostile Environment},
  booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8617},
  pages     = {256--275},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-662-44381-1\_15},
  doi       = {10.1007/978-3-662-44381-1\_15},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischLLN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischLNR14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Alfredo Rial},
  editor    = {Miroslaw Kutylowski and
               Jaideep Vaidya},
  title     = {Privacy-Preserving Auditing for Attribute-Based Credentials},
  booktitle = {Computer Security - {ESORICS} 2014 - 19th European Symposium on Research
               in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings,
               Part {II}},
  series    = {Lecture Notes in Computer Science},
  volume    = {8713},
  pages     = {109--127},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-11212-1\_7},
  doi       = {10.1007/978-3-319-11212-1\_7},
  timestamp = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/esorics/CamenischLNR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AbeCDD14,
  author    = {Masayuki Abe and
               Jan Camenisch and
               Rafael Dowsley and
               Maria Dubovitskaya},
  editor    = {Yehuda Lindell},
  title     = {On the Impossibility of Structure-Preserving Deterministic Primitives},
  booktitle = {Theory of Cryptography - 11th Theory of Cryptography Conference, {TCC}
               2014, San Diego, CA, USA, February 24-26, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8349},
  pages     = {713--738},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-642-54242-8\_30},
  doi       = {10.1007/978-3-642-54242-8\_30},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/tcc/AbeCDD14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trust/AyedBCH14,
  author    = {Dhouha Ayed and
               Patrik Bichsel and
               Jan Camenisch and
               Jerry den Hartog},
  editor    = {Thorsten Holz and
               Sotiris Ioannidis},
  title     = {Integration of Data-Minimising Authentication into Authorisation Systems},
  booktitle = {Trust and Trustworthy Computing - 7th International Conference, {TRUST}
               2014, Heraklion, Crete, Greece, June 30 - July 2, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8564},
  pages     = {179--187},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-08593-7\_12},
  doi       = {10.1007/978-3-319-08593-7\_12},
  timestamp = {Wed, 25 Sep 2019 18:21:56 +0200},
  biburl    = {https://dblp.org/rec/conf/trust/AyedBCH14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/isw/2014,
  editor    = {Sherman S. M. Chow and
               Jan Camenisch and
               Lucas Chi Kwong Hui and
               Siu{-}Ming Yiu},
  title     = {Information Security - 17th International Conference, {ISC} 2014,
               Hong Kong, China, October 12-14, 2014. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8783},
  publisher = {Springer},
  year      = {2014},
  url       = {https://doi.org/10.1007/978-3-319-13257-0},
  doi       = {10.1007/978-3-319-13257-0},
  isbn      = {978-3-319-13256-3},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/isw/2014.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLLN14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {Memento: How to Reconstruct your Secrets from a Single Password in
               a Hostile Environment},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {429},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/429},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischLLN14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLNR14,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven and
               Alfredo Rial},
  title     = {Privacy-Preserving Auditing for Attribute-Based Credentials},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {468},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/468},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischLNR14.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKLMNP14a,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Anja Lehmann and
               Gert L{\ae}ss{\o}e Mikkelsen and
               Gregory Neven and
               Michael {\O}stergaard Pedersen},
  title     = {Formal Treatment of Privacy-Enhancing Credential Systems},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2014},
  pages     = {708},
  year      = {2014},
  url       = {http://eprint.iacr.org/2014/708},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischKLMNP14a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/CamenischL13,
  author    = {Jan Camenisch and
               Costas Lambrinoudakis},
  title     = {Guest editors' introduction},
  journal   = {Math. Comput. Model.},
  volume    = {57},
  number    = {7-8},
  pages     = {1577},
  year      = {2013},
  url       = {https://doi.org/10.1016/j.mcm.2013.02.005},
  doi       = {10.1016/j.mcm.2013.02.005},
  timestamp = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/mcm/CamenischL13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dbsec/DongCCR13,
  author    = {Changyu Dong and
               Liqun Chen and
               Jan Camenisch and
               Giovanni Russello},
  editor    = {Lingyu Wang and
               Basit Shafiq},
  title     = {Fair Private Set Intersection with a Semi-trusted Arbiter},
  booktitle = {Data and Applications Security and Privacy {XXVII} - 27th Annual {IFIP}
               {WG} 11.3 Conference, DBSec 2013, Newark, NJ, USA, July 15-17, 2013.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7964},
  pages     = {128--144},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-39256-6\_9},
  doi       = {10.1007/978-3-642-39256-6\_9},
  timestamp = {Tue, 14 May 2019 10:00:50 +0200},
  biburl    = {https://dblp.org/rec/conf/dbsec/DongCCR13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/AbeCDN13,
  author    = {Masayuki Abe and
               Jan Camenisch and
               Maria Dubovitskaya and
               Ryo Nishimaki},
  editor    = {Thomas Gro{\ss} and
               Marit Hansen},
  title     = {Universally composable adaptive oblivious transfer (with access control)
               from standard assumptions},
  booktitle = {DIM'13, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Berlin, Germany, November 8, 2013},
  pages     = {1--12},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517881.2517883},
  doi       = {10.1145/2517881.2517883},
  timestamp = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl    = {https://dblp.org/rec/conf/dim/AbeCDN13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischES13,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Victor Shoup},
  editor    = {Jason Crampton and
               Sushil Jajodia and
               Keith Mayes},
  title     = {Practical and Employable Protocols for UC-Secure Circuit Evaluation
               over {\(\mathbb{Z}\)}n},
  booktitle = {Computer Security - {ESORICS} 2013 - 18th European Symposium on Research
               in Computer Security, Egham, UK, September 9-13, 2013. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8134},
  pages     = {19--37},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-40203-6\_2},
  doi       = {10.1007/978-3-642-40203-6\_2},
  timestamp = {Wed, 25 Sep 2019 18:03:15 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/CamenischES13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/CamenischDLNPP13,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Anja Lehmann and
               Gregory Neven and
               Christian Paquin and
               Franz{-}Stefan Preiss},
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Elisabeth de Leeuw and
               Chris J. Mitchell},
  title     = {Concepts and Languages for Privacy-Preserving Attribute-Based Authentication},
  booktitle = {Policies and Research in Identity Management - Third {IFIP} {WG} 11.6
               Working Conference, {IDMAN} 2013, London, UK, April 8-9, 2013. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {396},
  pages     = {34--52},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-37282-7\_4},
  doi       = {10.1007/978-3-642-37282-7\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/idman/CamenischDLNPP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/Camenisch13,
  author    = {Jan Camenisch},
  editor    = {Marit Hansen and
               Jaap{-}Henk Hoepman and
               Ronald E. Leenes and
               Diane Whitehouse},
  title     = {Concepts Around Privacy-Preserving Attribute-Based Credentials - Making
               Authentication with Anonymous Credentials Practical},
  booktitle = {Privacy and Identity Management for Emerging Services and Technologies
               - 8th {IFIP} {WG} 9.2, 9.5, 9.6/11.7, 11.4, 11.6 International Summer
               School, Nijmegen, The Netherlands, June 17-21, 2013, Revised Selected
               Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {421},
  pages     = {53--63},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-642-55137-6\_4},
  doi       = {10.1007/978-3-642-55137-6\_4},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/primelife/Camenisch13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sdmw/Camenisch13,
  author    = {Jan Camenisch},
  editor    = {Willem Jonker and
               Milan Petkovic},
  title     = {Research Challenges to Secure the Future Internet},
  booktitle = {Secure Data Management - 10th {VLDB} Workshop, {SDM} 2013, Trento,
               Italy, August 30, 2013, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {8425},
  pages     = {14--17},
  publisher = {Springer},
  year      = {2013},
  url       = {https://doi.org/10.1007/978-3-319-06811-4\_3},
  doi       = {10.1007/978-3-319-06811-4\_3},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/sdmw/Camenisch13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischKNP13,
  author    = {Jan Camenisch and
               G{\"{u}}nter Karjoth and
               Gregory Neven and
               Franz{-}Stefan Preiss},
  editor    = {Ahmad{-}Reza Sadeghi and
               Sara Foresti},
  title     = {Anonymously sharing Flickr pictures with facebook friends},
  booktitle = {Proceedings of the 12th annual {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2013, Berlin, Germany, November 4, 2013},
  pages     = {13--24},
  publisher = {{ACM}},
  year      = {2013},
  url       = {https://doi.org/10.1145/2517840.2517861},
  doi       = {10.1145/2517840.2517861},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wpes/CamenischKNP13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischES13,
  author    = {Jan Camenisch and
               Robert R. Enderlein and
               Victor Shoup},
  title     = {Practical and Employable Protocols for UC-Secure Circuit Evaluation
               over Z\({}_{\mbox{n}}\)},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2013},
  pages     = {205},
  year      = {2013},
  url       = {http://eprint.iacr.org/2013/205},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischES13.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/Camenisch12,
  author    = {Jan Camenisch},
  title     = {Information privacy?!},
  journal   = {Comput. Networks},
  volume    = {56},
  number    = {18},
  pages     = {3834--3848},
  year      = {2012},
  url       = {https://doi.org/10.1016/j.comnet.2012.10.012},
  doi       = {10.1016/j.comnet.2012.10.012},
  timestamp = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/cn/Camenisch12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CamenischLN12,
  author    = {Jan Camenisch and
               Anja Lehmann and
               Gregory Neven},
  title     = {Electronic Identities Need Private Credentials},
  journal   = {{IEEE} Secur. Priv.},
  volume    = {10},
  number    = {1},
  pages     = {80--83},
  year      = {2012},
  url       = {https://doi.org/10.1109/MSP.2012.7},
  doi       = {10.1109/MSP.2012.7},
  timestamp = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ieeesp/CamenischLN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/CamenischHP12,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Michael {\O}stergaard Pedersen},
  title     = {Batch Verification of Short Signatures},
  journal   = {J. Cryptology},
  volume    = {25},
  number    = {4},
  pages     = {723--747},
  year      = {2012},
  url       = {https://doi.org/10.1007/s00145-011-9108-z},
  doi       = {10.1007/s00145-011-9108-z},
  timestamp = {Thu, 18 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/joc/CamenischHP12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/CamenischG12,
  author    = {Jan Camenisch and
               Thomas Gro{\ss}},
  title     = {Efficient Attributes for Anonymous Credentials},
  journal   = {{ACM} Trans. Inf. Syst. Secur.},
  volume    = {15},
  number    = {1},
  pages     = {4:1--4:30},
  year      = {2012},
  url       = {https://doi.org/10.1145/2133375.2133379},
  doi       = {10.1145/2133375.2133379},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/tissec/CamenischG12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischLN12,
  author    = {Jan Camenisch and
               Anna Lysyanskaya and
               Gregory Neven},
  editor    = {Ting Yu and
               George Danezis and
               Virgil D. Gligor},
  title     = {Practical yet universally composable two-server password-authenticated
               secret sharing},
  booktitle = {the {ACM} Conference on Computer and Communications Security, CCS'12,
               Raleigh, NC, USA, October 16-18, 2012},
  pages     = {525--536},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2382196.2382252},
  doi       = {10.1145/2382196.2382252},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischLN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cms/BichselCDLNS12,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Bart De Decker and
               Jorn Lapon and
               Vincent Naessens and
               Dieter Sommer},
  editor    = {Bart De Decker and
               David W. Chadwick},
  title     = {Data-Minimizing Authentication Goes Mobile},
  booktitle = {Communications and Multimedia Security - 13th {IFIP} {TC} 6/TC 11
               International Conference, {CMS} 2012, Canterbury, UK, September 3-5,
               2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7394},
  pages     = {55--71},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32805-3\_5},
  doi       = {10.1007/978-3-642-32805-3\_5},
  timestamp = {Tue, 14 May 2019 10:00:42 +0200},
  biburl    = {https://dblp.org/rec/conf/cms/BichselCDLNS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/BichselCS12,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Dieter Sommer},
  editor    = {Vijay Atluri and
               Jaideep Vaidya and
               Axel Kern and
               Murat Kantarcioglu},
  title     = {A calculus for privacy-friendly authentication},
  booktitle = {17th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               '12, Newark, NJ, {USA} - June 20 - 22, 2012},
  pages     = {157--166},
  publisher = {{ACM}},
  year      = {2012},
  url       = {https://doi.org/10.1145/2295136.2295166},
  doi       = {10.1145/2295136.2295166},
  timestamp = {Tue, 06 Nov 2018 16:57:58 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/BichselCS12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischNR12,
  author    = {Jan Camenisch and
               Gregory Neven and
               Markus R{\"{u}}ckert},
  editor    = {Ivan Visconti and
               Roberto De Prisco},
  title     = {Fully Anonymous Attribute Tokens from Lattices},
  booktitle = {Security and Cryptography for Networks - 8th International Conference,
               {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7485},
  pages     = {57--75},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32928-9\_4},
  doi       = {10.1007/978-3-642-32928-9\_4},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischNR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischDH12,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Kristiyan Haralambiev},
  editor    = {Ivan Visconti and
               Roberto De Prisco},
  title     = {Efficient Structure-Preserving Signature Scheme from Standard Assumptions},
  booktitle = {Security and Cryptography for Networks - 8th International Conference,
               {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7485},
  pages     = {76--94},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32928-9\_5},
  doi       = {10.1007/978-3-642-32928-9\_5},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischDH12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischDEN12,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Gregory Neven},
  editor    = {Ivan Visconti and
               Roberto De Prisco},
  title     = {Oblivious Transfer with Hidden Access Control from Attribute-Based
               Encryption},
  booktitle = {Security and Cryptography for Networks - 8th International Conference,
               {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7485},
  pages     = {559--579},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-32928-9\_31},
  doi       = {10.1007/978-3-642-32928-9\_31},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischDEN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/AhnBCHSW12,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  editor    = {Ronald Cramer},
  title     = {Computing on Authenticated Data},
  booktitle = {Theory of Cryptography - 9th Theory of Cryptography Conference, {TCC}
               2012, Taormina, Sicily, Italy, March 19-21, 2012. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7194},
  pages     = {1--20},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-28914-9\_1},
  doi       = {10.1007/978-3-642-28914-9\_1},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/tcc/AhnBCHSW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2011,
  editor    = {Jan Camenisch and
               Dogan Kesdogan},
  title     = {Open Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2011, Lucerne, Switzerland, June 9, 2011, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {7039},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-27585-2},
  doi       = {10.1007/978-3-642-27585-2},
  isbn      = {978-3-642-27584-5},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ifip11-4/2011.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/primelife/2011,
  editor    = {Jan Camenisch and
               Bruno Crispo and
               Simone Fischer{-}H{\"{u}}bner and
               Ronald Leenes and
               Giovanni Russello},
  title     = {Privacy and Identity Management for Life - 7th {IFIP} {WG} 9.2, 9.6/11.7,
               11.4, 11.6/PrimeLife International Summer School, Trento, Italy, September
               5-9, 2011, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {375},
  publisher = {Springer},
  year      = {2012},
  url       = {https://doi.org/10.1007/978-3-642-31668-5},
  doi       = {10.1007/978-3-642-31668-5},
  isbn      = {978-3-642-31667-8},
  timestamp = {Sun, 21 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/primelife/2011.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/CamenischMTW12,
  author    = {Jan Camenisch and
               Mark Manulis and
               Gene Tsudik and
               Rebecca N. Wright},
  title     = {Privacy-Oriented Cryptography (Dagstuhl Seminar 12381)},
  journal   = {Dagstuhl Reports},
  volume    = {2},
  number    = {9},
  pages     = {165--183},
  year      = {2012},
  url       = {https://doi.org/10.4230/DagRep.2.9.165},
  doi       = {10.4230/DagRep.2.9.165},
  timestamp = {Wed, 07 Jun 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/dagstuhl-reports/CamenischMTW12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DongCCR12,
  author    = {Changyu Dong and
               Liqun Chen and
               Jan Camenisch and
               Giovanni Russello},
  title     = {Fair Private Set Intersection with a Semi-trusted Arbiter},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {252},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/252},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/DongCCR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDEN12,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Robert R. Enderlein and
               Gregory Neven},
  title     = {Oblivious Transfer with Hidden Access Control from Attribute-Based
               Encryption},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {348},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/348},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDEN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischNR12,
  author    = {Jan Camenisch and
               Gregory Neven and
               Markus R{\"{u}}ckert},
  title     = {Fully Anonymous Attribute Tokens from Lattices},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {356},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/356},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischNR12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischLN12,
  author    = {Jan Camenisch and
               Anna Lysyanskaya and
               Gregory Neven},
  title     = {Practical Yet Universally Composable Two-Server Password-Authenticated
               Secret Sharing},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2012},
  pages     = {717},
  year      = {2012},
  url       = {http://eprint.iacr.org/2012/717},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischLN12.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischHKLN11,
  author    = {Jan Camenisch and
               Kristiyan Haralambiev and
               Markulf Kohlweiss and
               Jorn Lapon and
               Vincent Naessens},
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {Structure Preserving {CCA} Secure Encryption and Applications},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  pages     = {89--106},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_5},
  doi       = {10.1007/978-3-642-25385-0\_5},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischHKLN11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischKS11,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Victor Shoup},
  editor    = {Dong Hoon Lee and
               Xiaoyun Wang},
  title     = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2011 - 17th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Seoul, South Korea, December 4-8, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {7073},
  pages     = {449--467},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-25385-0\_24},
  doi       = {10.1007/978-3-642-25385-0\_24},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischKS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Camenisch11,
  author    = {Jan Camenisch},
  editor    = {Yan Chen and
               George Danezis and
               Vitaly Shmatikov},
  title     = {Cryptographic primitives for building secure and privacy respecting
               protocols},
  booktitle = {Proceedings of the 18th {ACM} Conference on Computer and Communications
               Security, {CCS} 2011, Chicago, Illinois, USA, October 17-21, 2011},
  pages     = {361--362},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2046707.2046749},
  doi       = {10.1145/2046707.2046749},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/Camenisch11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/Camenisch11,
  author    = {Jan Camenisch},
  editor    = {Abhilasha Bhargav{-}Spantzel and
               Thomas Gro{\ss}},
  title     = {Identity management tools for protecting online privacy},
  booktitle = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Chicago, IL, {USA} - October 21, 2011},
  pages     = {1--2},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2046642.2046644},
  doi       = {10.1145/2046642.2046644},
  timestamp = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl    = {https://dblp.org/rec/conf/dim/Camenisch11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/BichselCP11,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Franz{-}Stefan Preiss},
  editor    = {Abhilasha Bhargav{-}Spantzel and
               Thomas Gro{\ss}},
  title     = {A comprehensive framework enabling data-minimizing authentication},
  booktitle = {DIM'11, Proceedings of the 2013 {ACM} Workshop on Digital Identity
               Management, Chicago, IL, {USA} - October 21, 2011},
  pages     = {13--22},
  publisher = {{ACM}},
  year      = {2011},
  url       = {https://doi.org/10.1145/2046642.2046647},
  doi       = {10.1145/2046642.2046647},
  timestamp = {Tue, 12 Feb 2019 16:55:52 +0100},
  biburl    = {https://dblp.org/rec/conf/dim/BichselCP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischDNZ11,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven and
               Gregory M. Zaverucha},
  editor    = {Dario Catalano and
               Nelly Fazio and
               Rosario Gennaro and
               Antonio Nicolosi},
  title     = {Oblivious Transfer with Hidden Access Control Policies},
  booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
               on Practice and Theory in Public Key Cryptography, Taormina, Italy,
               March 6-9, 2011. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6571},
  pages     = {192--209},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19379-8\_12},
  doi       = {10.1007/978-3-642-19379-8\_12},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/CamenischDNZ11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialcom/BichselCV11,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Mario Verdicchio},
  title     = {Recognizing Your Digital Friends},
  booktitle = {PASSAT/SocialCom 2011, Privacy, Security, Risk and Trust (PASSAT),
               2011 {IEEE} Third International Conference on and 2011 {IEEE} Third
               International Conference on Social Computing (SocialCom), Boston,
               MA, USA, 9-11 Oct., 2011},
  pages     = {1310--1313},
  publisher = {{IEEE} Computer Society},
  year      = {2011},
  url       = {https://doi.org/10.1109/PASSAT/SocialCom.2011.159},
  doi       = {10.1109/PASSAT/SocialCom.2011.159},
  timestamp = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl    = {https://dblp.org/rec/conf/socialcom/BichselCV11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/PfitzmannBC11,
  author    = {Andreas Pfitzmann and
               Katrin Borcea{-}Pfitzmann and
               Jan Camenisch},
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {PrimeLife},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {5--26},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_1},
  doi       = {10.1007/978-3-642-20317-6\_1},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/books/sp/primelife11/PfitzmannBC11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischSLPKK11,
  author    = {Jan Camenisch and
               Sandra Steinbrecher and
               Ronald Leenes and
               Stefanie P{\"{o}}tzsch and
               Benjamin Kellermann and
               Laura Klaming},
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {Trustworthiness of Online Content},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {61--85},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_3},
  doi       = {10.1007/978-3-642-20317-6\_3},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/books/sp/primelife11/CamenischSLPKK11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischDKLN11,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Markulf Kohlweiss and
               Jorn Lapon and
               Gregory Neven},
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {Cryptographic Mechanisms for Privacy},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {117--134},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_5},
  doi       = {10.1007/978-3-642-20317-6\_5},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/books/sp/primelife11/CamenischDKLN11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischKKPPPRSW11,
  author    = {Jan Camenisch and
               Benjamin Kellermann and
               Stefan K{\"{o}}psell and
               Stefano Paraboschi and
               Franz{-}Stefan Preiss and
               Stefanie P{\"{o}}tzsch and
               Dave Raggett and
               Pierangela Samarati and
               Karel Wouters},
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {Open Source Contributions},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {459--477},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_24},
  doi       = {10.1007/978-3-642-20317-6\_24},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/books/sp/primelife11/CamenischKKPPPRSW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/primelife11/CamenischH11,
  author    = {Jan Camenisch and
               Marit Hansen},
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {PrimeLife's Legacy},
  booktitle = {Privacy and Identity Management for Life},
  pages     = {505--506},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6\_27},
  doi       = {10.1007/978-3-642-20317-6\_27},
  timestamp = {Tue, 16 May 2017 14:01:44 +0200},
  biburl    = {https://dblp.org/rec/books/sp/primelife11/CamenischH11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CamenischLHS11,
  author    = {Jan Camenisch and
               Ronald Leenes and
               Marit Hansen and
               Jan Schallab{\"{o}}ck},
  editor    = {Jan Camenisch and
               Ronald Leenes and
               Dieter Sommer},
  title     = {An Introduction to Privacy-Enhancing Identity Management},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  series    = {Lecture Notes in Computer Science},
  volume    = {6545},
  pages     = {3--21},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_1},
  doi       = {10.1007/978-3-642-19050-6\_1},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/series/lncs/CamenischLHS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CamenischKS11,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Dieter Sommer},
  editor    = {Jan Camenisch and
               Ronald Leenes and
               Dieter Sommer},
  title     = {Pseudonyms and Private Credentials},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  series    = {Lecture Notes in Computer Science},
  volume    = {6545},
  pages     = {289--308},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_10},
  doi       = {10.1007/978-3-642-19050-6\_10},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/series/lncs/CamenischKS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/KalamMBCCDKPPR11,
  author    = {Anas Abou El Kalam and
               Carlos Aguilar Melchor and
               Stefan Berthold and
               Jan Camenisch and
               Sebastian Clau{\ss} and
               Yves Deswarte and
               Markulf Kohlweiss and
               Andriy Panchenko and
               Lexi Pimenidis and
               Matthieu Roy},
  editor    = {Jan Camenisch and
               Ronald Leenes and
               Dieter Sommer},
  title     = {Further Privacy Mechanisms},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  series    = {Lecture Notes in Computer Science},
  volume    = {6545},
  pages     = {485--555},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_18},
  doi       = {10.1007/978-3-642-19050-6\_18},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/series/lncs/KalamMBCCDKPPR11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:series/lncs/CamenischP11,
  author    = {Jan Camenisch and
               Andreas Pfitzmann},
  editor    = {Jan Camenisch and
               Ronald Leenes and
               Dieter Sommer},
  title     = {Conclusion and Outlook},
  booktitle = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  series    = {Lecture Notes in Computer Science},
  volume    = {6545},
  pages     = {759--764},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19050-6\_29},
  doi       = {10.1007/978-3-642-19050-6\_29},
  timestamp = {Tue, 14 May 2019 10:00:55 +0200},
  biburl    = {https://dblp.org/rec/series/lncs/CamenischP11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/primelife2011,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg},
  title     = {Privacy and Identity Management for Life},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-20317-6},
  doi       = {10.1007/978-3-642-20317-6},
  isbn      = {978-3-642-20316-9},
  timestamp = {Tue, 16 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/books/sp/primelife2011.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/europki/2010,
  editor    = {Jan Camenisch and
               Costas Lambrinoudakis},
  title     = {Public Key Infrastructures, Services and Applications - 7th European
               Workshop, EuroPKI 2010, Athens, Greece, September 23-24, 2010. Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6711},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-22633-5},
  doi       = {10.1007/978-3-642-22633-5},
  isbn      = {978-3-642-22632-8},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/europki/2010.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2010,
  editor    = {Jan Camenisch and
               Valentin S. Kisimov and
               Maria Dubovitskaya},
  title     = {Open Research Problems in Network Security - {IFIP} {WG} 11.4 International
               Workshop, iNetSec 2010, Sofia, Bulgaria, March 5-6, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6555},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19228-9},
  doi       = {10.1007/978-3-642-19228-9},
  isbn      = {978-3-642-19227-2},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ifip11-4/2010.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/sec/2011,
  editor    = {Jan Camenisch and
               Simone Fischer{-}H{\"{u}}bner and
               Yuko Murayama and
               Armand Portmann and
               Carlos Rieder},
  title     = {Future Challenges in Security and Privacy for Academia and Industry
               - 26th {IFIP} {TC} 11 International Information Security Conference,
               {SEC} 2011, Lucerne, Switzerland, June 7-9, 2011. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {354},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-21424-0},
  doi       = {10.1007/978-3-642-21424-0},
  isbn      = {978-3-642-21423-3},
  timestamp = {Fri, 19 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sec/2011.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/lncs/6545,
  editor    = {Jan Camenisch and
               Ronald Leenes and
               Dieter Sommer},
  title     = {Digital Privacy - {PRIME} - Privacy and Identity Management for Europe},
  series    = {Lecture Notes in Computer Science},
  volume    = {6545},
  publisher = {Springer},
  year      = {2011},
  url       = {https://doi.org/10.1007/978-3-642-19050-6},
  doi       = {10.1007/978-3-642-19050-6},
  isbn      = {978-3-642-19049-0},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/series/lncs/6545.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AhnBCHSW11,
  author    = {Jae Hyun Ahn and
               Dan Boneh and
               Jan Camenisch and
               Susan Hohenberger and
               Abhi Shelat and
               Brent Waters},
  title     = {Computing on Authenticated Data},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {96},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/096},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AhnBCHSW11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS11,
  author    = {Jan Camenisch and
               Stephan Krenn and
               Victor Shoup},
  title     = {A Framework for Practical Universally Composable Zero-Knowledge Protocols},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {228},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/228},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischKS11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHKLN11,
  author    = {Jan Camenisch and
               Kristiyan Haralambiev and
               Markulf Kohlweiss and
               Jorn Lapon and
               Vincent Naessens},
  title     = {Structure Preserving {CCA} Secure Encryption and Its Application to
               Oblivious Third Parties},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2011},
  pages     = {319},
  year      = {2011},
  url       = {http://eprint.iacr.org/2011/319},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischHKLN11.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeesp/CachinC10,
  author    = {Christian Cachin and
               Jan Camenisch},
  title     = {Encrypting Keys Securely},
  journal   = {{IEEE} Secur. Priv.},
  volume    = {8},
  number    = {4},
  pages     = {66--69},
  year      = {2010},
  url       = {https://doi.org/10.1109/MSP.2010.124},
  doi       = {10.1109/MSP.2010.124},
  timestamp = {Sun, 15 Mar 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/ieeesp/CachinC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CamenischLMCS10,
  author    = {Jan Camenisch and
               Javier L{\'{o}}pez and
               Fabio Massacci and
               Massimo Ciscato and
               Thomas Skordas},
  title     = {{JCS} special issue on EU-funded {ICT} research on Trust and Security},
  journal   = {J. Comput. Secur.},
  volume    = {18},
  number    = {1},
  pages     = {1--5},
  year      = {2010},
  url       = {https://doi.org/10.3233/JCS-2010-0375},
  doi       = {10.3233/JCS-2010-0375},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcs/CamenischLMCS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/ArdagnaCKLNPSSV10,
  author    = {Claudio Agostino Ardagna and
               Jan Camenisch and
               Markulf Kohlweiss and
               Ronald Leenes and
               Gregory Neven and
               Bart Priem and
               Pierangela Samarati and
               Dieter Sommer and
               Mario Verdicchio},
  title     = {Exploiting cryptography for privacy-enhanced access control: {A} result
               of the {PRIME} Project},
  journal   = {J. Comput. Secur.},
  volume    = {18},
  number    = {1},
  pages     = {123--160},
  year      = {2010},
  url       = {https://doi.org/10.3233/JCS-2010-0367},
  doi       = {10.3233/JCS-2010-0367},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcs/ArdagnaCKLNPSSV10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischCGS10,
  author    = {Jan Camenisch and
               Nathalie Casati and
               Thomas Gross and
               Victor Shoup},
  editor    = {Tal Rabin},
  title     = {Credential Authenticated Identification and Key Exchange},
  booktitle = {Advances in Cryptology - {CRYPTO} 2010, 30th Annual Cryptology Conference,
               Santa Barbara, CA, USA, August 15-19, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6223},
  pages     = {255--276},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14623-7\_14},
  doi       = {10.1007/978-3-642-14623-7\_14},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischCGS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CamenischDN10,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven},
  editor    = {Radu Sion},
  title     = {Unlinkable Priced Oblivious Transfer with Rechargeable Wallets},
  booktitle = {Financial Cryptography and Data Security, 14th International Conference,
               {FC} 2010, Tenerife, Canary Islands, Spain, January 25-28, 2010, Revised
               Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {6052},
  pages     = {66--81},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-14577-3\_8},
  doi       = {10.1007/978-3-642-14577-3\_8},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/CamenischDN10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fmics/CamenischMS10,
  author    = {Jan Camenisch and
               Sebastian M{\"{o}}dersheim and
               Dieter Sommer},
  editor    = {Stefan Kowalewski and
               Marco Roveri},
  title     = {A Formal Model of Identity Mixer},
  booktitle = {Formal Methods for Industrial Critical Systems - 15th International
               Workshop, {FMICS} 2010, Antwerp, Belgium, September 20-21, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6371},
  pages     = {198--214},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15898-8\_13},
  doi       = {10.1007/978-3-642-15898-8\_13},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/fmics/CamenischMS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/BichselC10,
  author    = {Patrik Bichsel and
               Jan Camenisch},
  editor    = {Elisabeth de Leeuw and
               Simone Fischer{-}H{\"{u}}bner and
               Lothar Fritsch},
  title     = {Mixing Identities with Ease},
  booktitle = {Policies and Research in Identity Management - Second {IFIP} {WG}
               11.6 Working Conference, {IDMAN} 2010, Oslo, Norway, November 18-19,
               2010. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {343},
  pages     = {1--17},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17303-5\_1},
  doi       = {10.1007/978-3-642-17303-5\_1},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/idman/BichselC10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/idman/CamenischGHH10,
  author    = {Jan Camenisch and
               Thomas Gro{\ss} and
               Peter Hladky and
               Christian Hoertnagl},
  editor    = {Elisabeth de Leeuw and
               Simone Fischer{-}H{\"{u}}bner and
               Lothar Fritsch},
  title     = {Privacy-Friendly Incentives and Their Application to Wikipedia},
  booktitle = {Policies and Research in Identity Management - Second {IFIP} {WG}
               11.6 Working Conference, {IDMAN} 2010, Oslo, Norway, November 18-19,
               2010. Proceedings},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {343},
  pages     = {113--129},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-17303-5\_9},
  doi       = {10.1007/978-3-642-17303-5\_9},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/idman/CamenischGHH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacmat/CamenischMNPS10,
  author    = {Jan Camenisch and
               Sebastian M{\"{o}}dersheim and
               Gregory Neven and
               Franz{-}Stefan Preiss and
               Dieter Sommer},
  editor    = {James B. D. Joshi and
               Barbara Carminati},
  title     = {A card requirements language enabling privacy-preserving access control},
  booktitle = {15th {ACM} Symposium on Access Control Models and Technologies, {SACMAT}
               2010, Pittsburgh, Pennsylvania, USA, June 9-11, 2010, Proceedings},
  pages     = {119--128},
  publisher = {{ACM}},
  year      = {2010},
  url       = {https://doi.org/10.1145/1809842.1809863},
  doi       = {10.1145/1809842.1809863},
  timestamp = {Tue, 06 Nov 2018 16:57:59 +0100},
  biburl    = {https://dblp.org/rec/conf/sacmat/CamenischMNPS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/BichselCNSW10,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Gregory Neven and
               Nigel P. Smart and
               Bogdan Warinschi},
  editor    = {Juan A. Garay and
               Roberto De Prisco},
  title     = {Get Shorty via Group Signatures without Encryption},
  booktitle = {Security and Cryptography for Networks, 7th International Conference,
               {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6280},
  pages     = {381--398},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15317-4\_24},
  doi       = {10.1007/978-3-642-15317-4\_24},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/BichselCNSW10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischKS10,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Claudio Soriente},
  editor    = {Juan A. Garay and
               Roberto De Prisco},
  title     = {Solving Revocation with Efficient Update of Anonymous Credentials},
  booktitle = {Security and Cryptography for Networks, 7th International Conference,
               {SCN} 2010, Amalfi, Italy, September 13-15, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {6280},
  pages     = {454--471},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-15317-4\_28},
  doi       = {10.1007/978-3-642-15317-4\_28},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischKS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/Camenisch10,
  author    = {Jan Camenisch},
  editor    = {Daniele Micciancio},
  title     = {Privacy-Enhancing Cryptography: From Theory into Practice},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  pages     = {498},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_29},
  doi       = {10.1007/978-3-642-11799-2\_29},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/tcc/Camenisch10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tcc/BangerterCK10,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Stephan Krenn},
  editor    = {Daniele Micciancio},
  title     = {Efficiency Limitations for {\(\Sigma\)}-Protocols for Group Homomorphisms},
  booktitle = {Theory of Cryptography, 7th Theory of Cryptography Conference, {TCC}
               2010, Zurich, Switzerland, February 9-11, 2010. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5978},
  pages     = {553--571},
  publisher = {Springer},
  year      = {2010},
  url       = {https://doi.org/10.1007/978-3-642-11799-2\_33},
  doi       = {10.1007/978-3-642-11799-2\_33},
  timestamp = {Tue, 14 May 2019 10:00:47 +0200},
  biburl    = {https://dblp.org/rec/conf/tcc/BangerterCK10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCGS10,
  author    = {Jan Camenisch and
               Nathalie Casati and
               Thomas Gross and
               Victor Shoup},
  title     = {Credential Authenticated Identification and Key Exchange},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2010},
  pages     = {55},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/055},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischCGS10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischGHH10,
  author    = {Jan Camenisch and
               Thomas Gro{\ss} and
               Peter Hladky and
               Christian Hoertnagl},
  title     = {Privacy-friendly Incentives and their Application to Wikipedia (Extended
               Version)},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2010},
  pages     = {401},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/401},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischGHH10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischG10,
  author    = {Jan Camenisch and
               Thomas Gro{\ss}},
  title     = {Efficient Attributes for Anonymous Credentials (Extended Version)},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2010},
  pages     = {496},
  year      = {2010},
  url       = {http://eprint.iacr.org/2010/496},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischG10.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijact/AtenieseCJT09,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {Remarks on ''Analysis of one popular group signature scheme'' in Asiacrypt
               2006},
  journal   = {{IJACT}},
  volume    = {1},
  number    = {4},
  pages     = {320--322},
  year      = {2009},
  url       = {https://doi.org/10.1504/IJACT.2009.028030},
  doi       = {10.1504/IJACT.2009.028030},
  timestamp = {Sat, 27 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/ijact/AtenieseCJT09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischDN09,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven},
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Oblivious transfer with access control},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {131--140},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1653662.1653679},
  doi       = {10.1145/1653662.1653679},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischDN09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BichselCGS09,
  author    = {Patrik Bichsel and
               Jan Camenisch and
               Thomas Gro{\ss} and
               Victor Shoup},
  editor    = {Ehab Al{-}Shaer and
               Somesh Jha and
               Angelos D. Keromytis},
  title     = {Anonymous credentials on a standard java card},
  booktitle = {Proceedings of the 2009 {ACM} Conference on Computer and Communications
               Security, {CCS} 2009, Chicago, Illinois, USA, November 9-13, 2009},
  pages     = {600--610},
  publisher = {{ACM}},
  year      = {2009},
  url       = {https://doi.org/10.1145/1653662.1653734},
  doi       = {10.1145/1653662.1653734},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BichselCGS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/BelenkiyCCKLS09,
  author    = {Mira Belenkiy and
               Jan Camenisch and
               Melissa Chase and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Hovav Shacham},
  editor    = {Shai Halevi},
  title     = {Randomizable Proofs and Delegatable Anonymous Credentials},
  booktitle = {Advances in Cryptology - {CRYPTO} 2009, 29th Annual International
               Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2009.
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5677},
  pages     = {108--125},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03356-8\_7},
  doi       = {10.1007/978-3-642-03356-8\_7},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/BelenkiyCCKLS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischCS09,
  author    = {Jan Camenisch and
               Nishanth Chandran and
               Victor Shoup},
  editor    = {Antoine Joux},
  title     = {A Public Key Encryption Scheme Secure against Key Dependent Chosen
               Plaintext and Adaptive Chosen Ciphertext Attacks},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5479},
  pages     = {351--368},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9\_20},
  doi       = {10.1007/978-3-642-01001-9\_20},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischCS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischKY09,
  author    = {Jan Camenisch and
               Aggelos Kiayias and
               Moti Yung},
  editor    = {Antoine Joux},
  title     = {On the Portability of Generalized Schnorr Proofs},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Cologne, Germany, April 26-30, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5479},
  pages     = {425--442},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-01001-9\_25},
  doi       = {10.1007/978-3-642-01001-9\_25},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischKY09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/CamenischZ09,
  author    = {Jan Camenisch and
               Gregory M. Zaverucha},
  editor    = {Roger Dingledine and
               Philippe Golle},
  title     = {Private Intersection of Certified Sets},
  booktitle = {Financial Cryptography and Data Security, 13th International Conference,
               {FC} 2009, Accra Beach, Barbados, February 23-26, 2009. Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {5628},
  pages     = {108--127},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-03549-4\_7},
  doi       = {10.1007/978-3-642-03549-4\_7},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/fc/CamenischZ09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKRS09,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Alfredo Rial and
               Caroline Sheedy},
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {Blind and Anonymous Identity-Based Encryption and Authorised Private
               Searches on Public Key Encrypted Data},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  pages     = {196--214},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1\_12},
  doi       = {10.1007/978-3-642-00468-1\_12},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/CamenischKRS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/CamenischKS09,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Claudio Soriente},
  editor    = {Stanislaw Jarecki and
               Gene Tsudik},
  title     = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
               Anonymous Credentials},
  booktitle = {Public Key Cryptography - {PKC} 2009, 12th International Conference
               on Practice and Theory in Public Key Cryptography, Irvine, CA, USA,
               March 18-20, 2009. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5443},
  pages     = {481--500},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-00468-1\_27},
  doi       = {10.1007/978-3-642-00468-1\_27},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/CamenischKS09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/primelife/CamenischN09,
  author    = {Jan Camenisch and
               Gregory Neven},
  editor    = {Michele Bezzi and
               Penny Duquenoy and
               Simone Fischer{-}H{\"{u}}bner and
               Marit Hansen and
               Ge Zhang},
  title     = {Saving On-Line Privacy},
  booktitle = {Privacy and Identity Management for Life - 5th {IFIP} {WG} 9.2, 9.6/11.4,
               11.6, 11.7/PrimeLife International Summer School, Nice, France, September
               7-11, 2009, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {320},
  pages     = {34--47},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-14282-6\_3},
  doi       = {10.1007/978-3-642-14282-6\_3},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/primelife/CamenischN09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ifip11-4/2009,
  editor    = {Jan Camenisch and
               Dogan Kesdogan},
  title     = {iNetSec 2009 - Open Research Problems in Network Security - {IFIP}
               {WG} 11.4 International Workshop, Zurich, Switzerland, April 23-24,
               2009, Revised Selected Papers},
  series    = {{IFIP} Advances in Information and Communication Technology},
  volume    = {309},
  publisher = {Springer},
  year      = {2009},
  url       = {https://doi.org/10.1007/978-3-642-05437-2},
  doi       = {10.1007/978-3-642-05437-2},
  isbn      = {978-3-642-05436-5},
  timestamp = {Wed, 17 May 2017 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ifip11-4/2009.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKY09,
  author    = {Jan Camenisch and
               Aggelos Kiayias and
               Moti Yung},
  title     = {On the Portability of Generalized Schnorr Proofs},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2009},
  pages     = {50},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/050},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischKY09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischDN09,
  author    = {Jan Camenisch and
               Maria Dubovitskaya and
               Gregory Neven},
  title     = {Oblivious Transfer with Access Control},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2009},
  pages     = {529},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/529},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischDN09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangerterCK09,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Stephan Krenn},
  title     = {Efficiency Limitations for Sigma-Protocols for Group Homomorphisms},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2009},
  pages     = {595},
  year      = {2009},
  url       = {http://eprint.iacr.org/2009/595},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BangerterCK09.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischCS08,
  author    = {Jan Camenisch and
               Rafik Chaabouni and
               Abhi Shelat},
  editor    = {Josef Pieprzyk},
  title     = {Efficient Protocols for Set Membership and Range Proofs},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Melbourne, Australia, December 7-11, 2008. Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {5350},
  pages     = {234--252},
  publisher = {Springer},
  year      = {2008},
  url       = {https://doi.org/10.1007/978-3-540-89255-7\_15},
  doi       = {10.1007/978-3-540-89255-7\_15},
  timestamp = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischCS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischG08,
  author    = {Jan Camenisch and
               Thomas Gro{\ss}},
  editor    = {Peng Ning and
               Paul F. Syverson and
               Somesh Jha},
  title     = {Efficient attributes for anonymous credentials},
  booktitle = {Proceedings of the 2008 {ACM} Conference on Computer and Communications
               Security, {CCS} 2008, Alexandria, Virginia, USA, October 27-31, 2008},
  pages     = {345--356},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1455770.1455814},
  doi       = {10.1145/1455770.1455814},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischG08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischGH08,
  author    = {Jan Camenisch and
               Thomas Gro{\ss} and
               Thomas S. Heydt{-}Benjamin},
  editor    = {Elisa Bertino and
               Kenji Takahashi},
  title     = {Rethinking accountable privacy supporting services: extended abstract},
  booktitle = {Proceedings of the 4th Workshop on Digital Identity Management, Alexandria,
               VA, USA, October 31, 2008},
  pages     = {1--8},
  publisher = {{ACM}},
  year      = {2008},
  url       = {https://doi.org/10.1145/1456424.1456426},
  doi       = {10.1145/1456424.1456426},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/dim/CamenischGH08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischNS08,
  author    = {Jan Camenisch and
               Gregory Neven and
               Abhi Shelat},
  title     = {Simulatable Adaptive Oblivious Transfer},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2008},
  pages     = {14},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/014},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischNS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischCS08,
  author    = {Jan Camenisch and
               Nishanth Chandran and
               Victor Shoup},
  title     = {A public key encryption scheme secure against key dependent chosen
               plaintext and adaptive chosen ciphertext attacks},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2008},
  pages     = {375},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/375},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischCS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BelenkiyCCKLS08,
  author    = {Mira Belenkiy and
               Jan Camenisch and
               Melissa Chase and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Hovav Shacham},
  title     = {Delegatable Anonymous Credentials},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2008},
  pages     = {428},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/428},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BelenkiyCCKLS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BangerterCKS008,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Stephan Krenn and
               Ahmad{-}Reza Sadeghi and
               Thomas Schneider},
  title     = {Automatic Generation of Sound Zero-Knowledge Protocols},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2008},
  pages     = {471},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/471},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BangerterCKS008.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischKS08,
  author    = {Jan Camenisch and
               Markulf Kohlweiss and
               Claudio Soriente},
  title     = {An Accumulator Based on Bilinear Maps and Efficient Revocation for
               Anonymous Credentials},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2008},
  pages     = {539},
  year      = {2008},
  url       = {http://eprint.iacr.org/2008/539},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischKS08.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/Bhargav-SpantzelCGS07,
  author    = {Abhilasha Bhargav{-}Spantzel and
               Jan Camenisch and
               Thomas Gross and
               Dieter Sommer},
  title     = {User centricity: {A} taxonomy and open issues},
  journal   = {J. Comput. Secur.},
  volume    = {15},
  number    = {5},
  pages     = {493--527},
  year      = {2007},
  url       = {http://content.iospress.com/articles/journal-of-computer-security/jcs291},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcs/Bhargav-SpantzelCGS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischHP07,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Michael {\O}stergaard Pedersen},
  editor    = {Moni Naor},
  title     = {Batch Verification of Short Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4515},
  pages     = {246--263},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4\_14},
  doi       = {10.1007/978-3-540-72540-4\_14},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischHP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischNS07,
  author    = {Jan Camenisch and
               Gregory Neven and
               Abhi Shelat},
  editor    = {Moni Naor},
  title     = {Simulatable Adaptive Oblivious Transfer},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2007, 26th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Barcelona, Spain, May 20-24, 2007, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4515},
  pages     = {573--590},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-72540-4\_33},
  doi       = {10.1007/978-3-540-72540-4\_33},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischNS07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CamenischLM07,
  author    = {Jan Camenisch and
               Anna Lysyanskaya and
               Mira Meyerovich},
  title     = {Endorsed E-Cash},
  booktitle = {2007 {IEEE} Symposium on Security and Privacy (S{\&}P 2007), 20-23
               May 2007, Oakland, California, {USA}},
  pages     = {101--115},
  publisher = {{IEEE} Computer Society},
  year      = {2007},
  url       = {https://doi.org/10.1109/SP.2007.15},
  doi       = {10.1109/SP.2007.15},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/CamenischLM07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/07/CamenischP07,
  author    = {Jan Camenisch and
               Birgit Pfitzmann},
  editor    = {Milan Petkovic and
               Willem Jonker},
  title     = {Federated Identity Management},
  booktitle = {Security, Privacy, and Trust in Modern Data Management},
  series    = {Data-Centric Systems and Applications},
  pages     = {213--238},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-69861-6\_15},
  doi       = {10.1007/978-3-540-69861-6\_15},
  timestamp = {Tue, 16 May 2017 14:01:42 +0200},
  biburl    = {https://dblp.org/rec/books/sp/07/CamenischP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ih/2006,
  editor    = {Jan Camenisch and
               Christian S. Collberg and
               Neil F. Johnson and
               Phil Sallee},
  title     = {Information Hiding, 8th International Workshop, {IH} 2006, Alexandria,
               VA, USA, July 10-12, 2006. Revised Selcted Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {4437},
  publisher = {Springer},
  year      = {2007},
  url       = {https://doi.org/10.1007/978-3-540-74124-4},
  doi       = {10.1007/978-3-540-74124-4},
  isbn      = {978-3-540-74123-7},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/ih/2006.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHP07,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Michael {\O}stergaard Pedersen},
  title     = {Batch Verification of Short Signatures},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2007},
  pages     = {172},
  year      = {2007},
  url       = {http://eprint.iacr.org/2007/172},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischHP07.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/CamenischK06,
  author    = {Jan Camenisch and
               Maciej Koprowski},
  title     = {Fine-grained forward-secure signature schemes without random oracles},
  journal   = {Discret. Appl. Math.},
  volume    = {154},
  number    = {2},
  pages     = {175--188},
  year      = {2006},
  url       = {https://doi.org/10.1016/j.dam.2005.03.028},
  doi       = {10.1016/j.dam.2005.03.028},
  timestamp = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/journals/dam/CamenischK06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischHKLM06,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Mira Meyerovich},
  editor    = {Ari Juels and
               Rebecca N. Wright and
               Sabrina De Capitani di Vimercati},
  title     = {How to win the clonewars: efficient periodic n-times anonymous authentication},
  booktitle = {Proceedings of the 13th {ACM} Conference on Computer and Communications
               Security, {CCS} 2006, Alexandria, VA, USA, Ioctober 30 - November
               3, 2006},
  pages     = {201--210},
  publisher = {{ACM}},
  year      = {2006},
  url       = {https://doi.org/10.1145/1180405.1180431},
  doi       = {10.1145/1180405.1180431},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischHKLM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/Bhargav-SpantzelCGS06,
  author    = {Abhilasha Bhargav{-}Spantzel and
               Jan Camenisch and
               Thomas Gross and
               Dieter Sommer},
  editor    = {Ari Juels and
               Marianne Winslett and
               Atsuhiro Goto},
  title     = {User centricity: a taxonomy and open issues},
  booktitle = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria,
               VA, USA, November 3, 2006},
  pages     = {1--10},
  publisher = {{ACM}},
  year      = {2006},
  url       = {https://doi.org/10.1145/1179529.1179531},
  doi       = {10.1145/1179529.1179531},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/dim/Bhargav-SpantzelCGS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischSSZ06,
  author    = {Jan Camenisch and
               Abhi Shelat and
               Dieter Sommer and
               Roger Zimmermann},
  editor    = {Ari Juels and
               Marianne Winslett and
               Atsuhiro Goto},
  title     = {Securing user inputs for the web},
  booktitle = {Proceedings of the 2006 Workshop on Digital Identity Management, Alexandria,
               VA, USA, November 3, 2006},
  pages     = {33--44},
  publisher = {{ACM}},
  year      = {2006},
  url       = {https://doi.org/10.1145/1179529.1179536},
  doi       = {10.1145/1179529.1179536},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/dim/CamenischSSZ06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischHL06,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Anna Lysyanskaya},
  editor    = {Roberto De Prisco and
               Moti Yung},
  title     = {Balancing Accountability and Privacy Using E-Cash (Extended Abstract)},
  booktitle = {Security and Cryptography for Networks, 5th International Conference,
               {SCN} 2006, Maiori, Italy, September 6-8, 2006, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {4116},
  pages     = {141--155},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/11832072\_10},
  doi       = {10.1007/11832072\_10},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischHL06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/CamenischSZ06,
  author    = {Jan Camenisch and
               Dieter Sommer and
               Roger Zimmermann},
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg and
               Louise Yngstr{\"{o}}m and
               Stefan Lindskog},
  title     = {A General Certification Framework with Applications to Privacy-Enhancing
               Certificate Infrastructures},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  series    = {{IFIP}},
  volume    = {201},
  pages     = {25--37},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_3},
  doi       = {10.1007/0-387-33406-8\_3},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sec/CamenischSZ06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Camenisch06,
  author    = {Jan Camenisch},
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg and
               Louise Yngstr{\"{o}}m and
               Stefan Lindskog},
  title     = {Protecting (Anonymous) Credentials with the Trusted Computing Group's
               {TPM} {V1.2}},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  series    = {{IFIP}},
  volume    = {201},
  pages     = {135--147},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_12},
  doi       = {10.1007/0-387-33406-8\_12},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sec/Camenisch06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sec/Camenisch06a,
  author    = {Jan Camenisch},
  editor    = {Simone Fischer{-}H{\"{u}}bner and
               Kai Rannenberg and
               Louise Yngstr{\"{o}}m and
               Stefan Lindskog},
  title     = {Anonymous Credentials: Opportunities and Challenges},
  booktitle = {Security and Privacy in Dynamic Environments, Proceedings of the {IFIP}
               {TC-11} 21st International Information Security Conference {(SEC}
               2006), 22-24 May 2006, Karlstad, Sweden},
  series    = {{IFIP}},
  volume    = {201},
  pages     = {460},
  publisher = {Springer},
  year      = {2006},
  url       = {https://doi.org/10.1007/0-387-33406-8\_42},
  doi       = {10.1007/0-387-33406-8\_42},
  timestamp = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/sec/Camenisch06a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/CamenischGS06,
  author    = {Jan Camenisch and
               Thomas Gross and
               Dieter Sommer},
  editor    = {Ari Juels and
               Marianne Winslett},
  title     = {Enhancing privacy of federated identity management protocols: anonymous
               credentials in WS-security},
  booktitle = {Proceedings of the 2006 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2006, Alexandria, VA, USA, October 30, 2006},
  pages     = {67--72},
  publisher = {{ACM}},
  year      = {2006},
  url       = {https://doi.org/10.1145/1179601.1179613},
  doi       = {10.1145/1179601.1179613},
  timestamp = {Tue, 12 Feb 2019 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wpes/CamenischGS06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHKLM06,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Markulf Kohlweiss and
               Anna Lysyanskaya and
               Mira Meyerovich},
  title     = {How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2006},
  pages     = {454},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/454},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischHKLM06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCJT06,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  title     = {Remarks on "Analysis of One Popular Group Signature Scheme"
               in Asiacrypt 2006},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2006},
  pages     = {464},
  year      = {2006},
  url       = {http://eprint.iacr.org/2006/464},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AtenieseCJT06.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/AtenieseCM05,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Breno de Medeiros},
  editor    = {Vijay Atluri and
               Catherine A. Meadows and
               Ari Juels},
  title     = {Untraceable {RFID} tags via insubvertible encryption},
  booktitle = {Proceedings of the 12th {ACM} Conference on Computer and Communications
               Security, {CCS} 2005, Alexandria, VA, USA, November 7-11, 2005},
  pages     = {92--101},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1102120.1102134},
  doi       = {10.1145/1102120.1102134},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/AtenieseCM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL05,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  editor    = {Victor Shoup},
  title     = {A Formal Treatment of Onion Routing},
  booktitle = {Advances in Cryptology - {CRYPTO} 2005: 25th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 14-18,
               2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3621},
  pages     = {169--187},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11535218\_11},
  doi       = {10.1007/11535218\_11},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischL05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dim/CamenischSSFHKLLT05,
  author    = {Jan Camenisch and
               Abhi Shelat and
               Dieter Sommer and
               Simone Fischer{-}H{\"{u}}bner and
               Marit Hansen and
               Henry Krasemann and
               G{\'{e}}rard Lacoste and
               Ronald Leenes and
               Jimmy C. Tseng},
  editor    = {Vijay Atluri and
               Pierangela Samarati and
               Atsuhiro Goto},
  title     = {Privacy and identity management for everyone},
  booktitle = {Proceedings of the 2005 Workshop on Digital Identity Management, Fairfax,
               VA, USA, November 11, 2005},
  pages     = {20--27},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1102486.1102491},
  doi       = {10.1145/1102486.1102491},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/dim/CamenischSSFHKLLT05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischHL05,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Anna Lysyanskaya},
  editor    = {Ronald Cramer},
  title     = {Compact E-Cash},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2005, 24th Annual International
               Conference on the Theory and Applications of Cryptographic Techniques,
               Aarhus, Denmark, May 22-26, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3494},
  pages     = {302--321},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11426639\_18},
  doi       = {10.1007/11426639\_18},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischHL05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pet/CamenischM05,
  author    = {Jan Camenisch and
               Anton Mityagin},
  editor    = {George Danezis and
               David M. Martin Jr.},
  title     = {Mix-Network with Stronger Security},
  booktitle = {Privacy Enhancing Technologies, 5th International Workshop, {PET}
               2005, Cavtat, Croatia, May 30-June 1, 2005, Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3856},
  pages     = {128--146},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/11767831\_9},
  doi       = {10.1007/11767831\_9},
  timestamp = {Tue, 14 May 2019 10:00:38 +0200},
  biburl    = {https://dblp.org/rec/conf/pet/CamenischM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/BangerterCM05,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Ueli M. Maurer},
  editor    = {Serge Vaudenay},
  title     = {Efficient Proofs of Knowledge of Discrete Logarithms and Representations
               in Groups with Hidden Order},
  booktitle = {Public Key Cryptography - {PKC} 2005, 8th International Workshop on
               Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland,
               January 23-26, 2005, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3386},
  pages     = {154--171},
  publisher = {Springer},
  year      = {2005},
  url       = {https://doi.org/10.1007/978-3-540-30580-4\_11},
  doi       = {10.1007/978-3-540-30580-4\_11},
  timestamp = {Fri, 01 May 2020 18:32:25 +0200},
  biburl    = {https://dblp.org/rec/conf/pkc/BangerterCM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wpes/BackesCS05,
  author    = {Michael Backes and
               Jan Camenisch and
               Dieter Sommer},
  editor    = {Vijay Atluri and
               Sabrina De Capitani di Vimercati and
               Roger Dingledine},
  title     = {Anonymous yet accountable access control},
  booktitle = {Proceedings of the 2005 {ACM} Workshop on Privacy in the Electronic
               Society, {WPES} 2005, Alexandria, VA, USA, November 7, 2005},
  pages     = {40--46},
  publisher = {{ACM}},
  year      = {2005},
  url       = {https://doi.org/10.1145/1102199.1102208},
  doi       = {10.1145/1102199.1102208},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/wpes/BackesCS05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischHL05,
  author    = {Jan Camenisch and
               Susan Hohenberger and
               Anna Lysyanskaya},
  title     = {Compact E-Cash},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2005},
  pages     = {60},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/060},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischHL05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AtenieseCHM05,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Susan Hohenberger and
               Breno de Medeiros},
  title     = {Practical Group Signatures without Random Oracles},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2005},
  pages     = {385},
  year      = {2005},
  url       = {http://eprint.iacr.org/2005/385},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AtenieseCHM05.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HansenBCCPW04,
  author    = {Marit Hansen and
               Peter Berlich and
               Jan Camenisch and
               Sebastian Clau{\ss} and
               Andreas Pfitzmann and
               Michael Waidner},
  title     = {Privacy-enhancing identity management},
  journal   = {Inf. Secur. Tech. Rep.},
  volume    = {9},
  number    = {1},
  pages     = {35--44},
  year      = {2004},
  url       = {https://doi.org/10.1016/S1363-4127(04)00014-7},
  doi       = {10.1016/S1363-4127(04)00014-7},
  timestamp = {Mon, 18 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/istr/HansenBCCPW04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/BrickellCC04,
  author    = {Ernest F. Brickell and
               Jan Camenisch and
               Liqun Chen},
  editor    = {Vijayalakshmi Atluri and
               Birgit Pfitzmann and
               Patrick D. McDaniel},
  title     = {Direct anonymous attestation},
  booktitle = {Proceedings of the 11th {ACM} Conference on Computer and Communications
               Security, {CCS} 2004, Washington, DC, USA, October 25-29, 2004},
  pages     = {132--145},
  publisher = {{ACM}},
  year      = {2004},
  url       = {https://doi.org/10.1145/1030083.1030103},
  doi       = {10.1145/1030083.1030103},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/BrickellCC04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL04,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  editor    = {Matthew K. Franklin},
  title     = {Signature Schemes and Anonymous Credentials from Bilinear Maps},
  booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
               CryptologyConference, Santa Barbara, California, USA, August 15-19,
               2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3152},
  pages     = {56--72},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-28628-8\_4},
  doi       = {10.1007/978-3-540-28628-8\_4},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Camenisch04,
  author    = {Jan Camenisch},
  editor    = {Pierangela Samarati and
               Peter Y. A. Ryan and
               Dieter Gollmann and
               Refik Molva},
  title     = {Better Privacy for Trusted Computing Platforms: (Extended Abstract)},
  booktitle = {Computer Security - {ESORICS} 2004, 9th European Symposium on Research
               Computer Security, Sophia Antipolis, France, September 13-15, 2004,
               Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3193},
  pages     = {73--88},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30108-0\_5},
  doi       = {10.1007/978-3-540-30108-0\_5},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/Camenisch04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischG04,
  author    = {Jan Camenisch and
               Jens Groth},
  editor    = {Carlo Blundo and
               Stelvio Cimato},
  title     = {Group Signatures: Better Efficiency and New Theoretical Aspects},
  booktitle = {Security in Communication Networks, 4th International Conference,
               {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3352},
  pages     = {120--133},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30598-9\_9},
  doi       = {10.1007/978-3-540-30598-9\_9},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischG04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischKW04,
  author    = {Jan Camenisch and
               Maciej Koprowski and
               Bogdan Warinschi},
  editor    = {Carlo Blundo and
               Stelvio Cimato},
  title     = {Efficient Blind Signatures Without Random Oracles},
  booktitle = {Security in Communication Networks, 4th International Conference,
               {SCN} 2004, Amalfi, Italy, September 8-10, 2004, Revised Selected
               Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3352},
  pages     = {134--148},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/978-3-540-30598-9\_10},
  doi       = {10.1007/978-3-540-30598-9\_10},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischKW04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spw/BangerterCL04,
  author    = {Endre Bangerter and
               Jan Camenisch and
               Anna Lysyanskaya},
  editor    = {Bruce Christianson and
               Bruno Crispo and
               James A. Malcolm and
               Michael Roe},
  title     = {A Cryptographic Framework for the Controlled Release of Certified
               Data},
  booktitle = {Security Protocols, 12th International Workshop, Cambridge, UK, April
               26-28, 2004. Revised Selected Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {3957},
  pages     = {20--42},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/11861386\_4},
  doi       = {10.1007/11861386\_4},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/spw/BangerterCL04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/eurocrypt/2004,
  editor    = {Christian Cachin and
               Jan Camenisch},
  title     = {Advances in Cryptology - {EUROCRYPT} 2004, International Conference
               on the Theory and Applications of Cryptographic Techniques, Interlaken,
               Switzerland, May 2-6, 2004, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {3027},
  publisher = {Springer},
  year      = {2004},
  url       = {https://doi.org/10.1007/b97182},
  doi       = {10.1007/b97182},
  isbn      = {3-540-21935-8},
  timestamp = {Tue, 14 May 2019 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/2004.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BrickellCC04,
  author    = {Ernie Brickell and
               Jan Camenisch and
               Liqun Chen},
  title     = {Direct Anonymous Attestation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2004},
  pages     = {205},
  year      = {2004},
  url       = {http://eprint.iacr.org/2004/205},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/BrickellCC04.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischS03,
  author    = {Jan Camenisch and
               Victor Shoup},
  editor    = {Dan Boneh},
  title     = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
  booktitle = {Advances in Cryptology - {CRYPTO} 2003, 23rd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 17-21,
               2003, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2729},
  pages     = {126--144},
  publisher = {Springer},
  year      = {2003},
  url       = {https://doi.org/10.1007/978-3-540-45146-4\_8},
  doi       = {10.1007/978-3-540-45146-4\_8},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischS03.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischH02,
  author    = {Jan Camenisch and
               Els Van Herreweghen},
  editor    = {Vijayalakshmi Atluri},
  title     = {Design and implementation of the \emph{idemix} anonymous credential
               system},
  booktitle = {Proceedings of the 9th {ACM} Conference on Computer and Communications
               Security, {CCS} 2002, Washington, DC, USA, November 18-22, 2002},
  pages     = {21--30},
  publisher = {{ACM}},
  year      = {2002},
  url       = {https://doi.org/10.1145/586110.586114},
  doi       = {10.1145/586110.586114},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischH02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL02,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  editor    = {Moti Yung},
  title     = {Dynamic Accumulators and Application to Efficient Revocation of Anonymous
               Credentials},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  pages     = {61--76},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45708-9\_5},
  doi       = {10.1007/3-540-45708-9\_5},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischL02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AlgesheimerCS02,
  author    = {Joy Algesheimer and
               Jan Camenisch and
               Victor Shoup},
  editor    = {Moti Yung},
  title     = {Efficient Computation Modulo a Shared Secret with Application to the
               Generation of Shared Safe-Prime Products},
  booktitle = {Advances in Cryptology - {CRYPTO} 2002, 22nd Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 18-22,
               2002, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2442},
  pages     = {417--432},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-45708-9\_27},
  doi       = {10.1007/3-540-45708-9\_27},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/AlgesheimerCS02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/CamenischL02,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  editor    = {Stelvio Cimato and
               Clemente Galdi and
               Giuseppe Persiano},
  title     = {A Signature Scheme with Efficient Protocols},
  booktitle = {Security in Communication Networks, Third International Conference,
               {SCN} 2002, Amalfi, Italy, September 11-13, 2002. Revised Papers},
  series    = {Lecture Notes in Computer Science},
  volume    = {2576},
  pages     = {268--289},
  publisher = {Springer},
  year      = {2002},
  url       = {https://doi.org/10.1007/3-540-36413-7\_20},
  doi       = {10.1007/3-540-36413-7\_20},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/scn/CamenischL02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AlgesheimerCS02,
  author    = {Joy Algesheimer and
               Jan Camenisch and
               Victor Shoup},
  title     = {Efficient Computation Modulo a Shared Secret with Application to the
               Generation of Shared Safe-Prime Products},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2002},
  pages     = {29},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/029},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/AlgesheimerCS02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischS02,
  author    = {Jan Camenisch and
               Victor Shoup},
  title     = {Practical Verifiable Encryption and Decryption of Discrete Logarithms},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2002},
  pages     = {161},
  year      = {2002},
  url       = {http://eprint.iacr.org/2002/161},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischS02.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischL01,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  editor    = {Joe Kilian},
  title     = {An Identity Escrow Scheme with Appointed Verifiers},
  booktitle = {Advances in Cryptology - {CRYPTO} 2001, 21st Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 19-23,
               2001, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {2139},
  pages     = {388--407},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44647-8\_23},
  doi       = {10.1007/3-540-44647-8\_23},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischL01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischL01,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  editor    = {Birgit Pfitzmann},
  title     = {An Efficient System for Non-transferable Anonymous Credentials with
               Optional Anonymity Revocation},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2001, International Conference
               on the Theory and Application of Cryptographic Techniques, Innsbruck,
               Austria, May 6-10, 2001, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {2045},
  pages     = {93--118},
  publisher = {Springer},
  year      = {2001},
  url       = {https://doi.org/10.1007/3-540-44987-6\_7},
  doi       = {10.1007/3-540-44987-6\_7},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischL01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/AlgesheimerCCK01,
  author    = {Joy Algesheimer and
               Christian Cachin and
               Jan Camenisch and
               G{\"{u}}nter Karjoth},
  title     = {Cryptographic Security for Mobile Code},
  booktitle = {2001 {IEEE} Symposium on Security and Privacy, Oakland, California,
               {USA} May 14-16, 2001},
  pages     = {2--11},
  publisher = {{IEEE} Computer Society},
  year      = {2001},
  url       = {https://doi.org/10.1109/SECPRI.2001.924283},
  doi       = {10.1109/SECPRI.2001.924283},
  timestamp = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl    = {https://dblp.org/rec/conf/sp/AlgesheimerCCK01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL01,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {An Efficient System for Non-transferable Anonymous Credentials with
               Optional Anonymity Revocation},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2001},
  pages     = {19},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/019},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischL01.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischL01a,
  author    = {Jan Camenisch and
               Anna Lysyanskaya},
  title     = {Efficient Revocation of Anonymous Group Membership},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {2001},
  pages     = {113},
  year      = {2001},
  url       = {http://eprint.iacr.org/2001/113},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischL01a.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischD00,
  author    = {Jan Camenisch and
               Ivan Damg{\aa}rd},
  editor    = {Tatsuaki Okamoto},
  title     = {Verifiable Encryption, Group Encryption, and Their Applications to
               Separable Group Signatures and Signature Sharing Schemes},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  pages     = {331--345},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44448-3\_25},
  doi       = {10.1007/3-540-44448-3\_25},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischD00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Camenisch00,
  author    = {Jan Camenisch},
  editor    = {Tatsuaki Okamoto},
  title     = {Efficient Anonymous Fingerprinting with Group Signatures},
  booktitle = {Advances in Cryptology - {ASIACRYPT} 2000, 6th International Conference
               on the Theory and Application of Cryptology and Information Security,
               Kyoto, Japan, December 3-7, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1976},
  pages     = {415--428},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44448-3\_32},
  doi       = {10.1007/3-540-44448-3\_32},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/Camenisch00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CachinC00,
  author    = {Christian Cachin and
               Jan Camenisch},
  editor    = {Mihir Bellare},
  title     = {Optimistic Fair Secure Computation},
  booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1880},
  pages     = {93--111},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44598-6\_6},
  doi       = {10.1007/3-540-44598-6\_6},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CachinC00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/AtenieseCJT00,
  author    = {Giuseppe Ateniese and
               Jan Camenisch and
               Marc Joye and
               Gene Tsudik},
  editor    = {Mihir Bellare},
  title     = {A Practical and Provably Secure Coalition-Resistant Group Signature
               Scheme},
  booktitle = {Advances in Cryptology - {CRYPTO} 2000, 20th Annual International
               Cryptology Conference, Santa Barbara, California, USA, August 20-24,
               2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1880},
  pages     = {255--270},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-44598-6\_16},
  doi       = {10.1007/3-540-44598-6\_16},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/AtenieseCJT00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischM00,
  author    = {Jan Camenisch and
               Markus Michels},
  editor    = {Bart Preneel},
  title     = {Confirmer Signature Schemes Secure against Adaptive Adversaries},
  booktitle = {Advances in Cryptology - {EUROCRYPT} 2000, International Conference
               on the Theory and Application of Cryptographic Techniques, Bruges,
               Belgium, May 14-18, 2000, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1807},
  pages     = {243--258},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45539-6\_17},
  doi       = {10.1007/3-540-45539-6\_17},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischM00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icalp/CachinCKM00,
  author    = {Christian Cachin and
               Jan Camenisch and
               Joe Kilian and
               Joy M{\"{u}}ller},
  editor    = {Ugo Montanari and
               Jos{\'{e}} D. P. Rolim and
               Emo Welzl},
  title     = {One-Round Secure Computation and Secure Autonomous Mobile Agents},
  booktitle = {Automata, Languages and Programming, 27th International Colloquium,
               {ICALP} 2000, Geneva, Switzerland, July 9-15, 2000, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1853},
  pages     = {512--523},
  publisher = {Springer},
  year      = {2000},
  url       = {https://doi.org/10.1007/3-540-45022-X\_43},
  doi       = {10.1007/3-540-45022-X\_43},
  timestamp = {Tue, 14 May 2019 10:00:44 +0200},
  biburl    = {https://dblp.org/rec/conf/icalp/CachinCKM00.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischM99,
  author    = {Jan Camenisch and
               Markus Michels},
  editor    = {Michael J. Wiener},
  title     = {Separability and Efficiency for Generic Group Signature Schemes},
  booktitle = {Advances in Cryptology - {CRYPTO} '99, 19th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 15-19, 1999, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1666},
  pages     = {413--430},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48405-1\_27},
  doi       = {10.1007/3-540-48405-1\_27},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischM99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischM99,
  author    = {Jan Camenisch and
               Markus Michels},
  editor    = {Jacques Stern},
  title     = {Proving in Zero-Knowledge that a Number Is the Product of Two Safe
               Primes},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '99, International Conference
               on the Theory and Application of Cryptographic Techniques, Prague,
               Czech Republic, May 2-6, 1999, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1592},
  pages     = {107--122},
  publisher = {Springer},
  year      = {1999},
  url       = {https://doi.org/10.1007/3-540-48910-X\_8},
  doi       = {10.1007/3-540-48910-X\_8},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischM99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/CamenischD99,
  author    = {Jan Camenisch and
               Ivan Damg{\aa}rd},
  title     = {Verifiable Encryption and Applications to Group Signatures and Signature
               Sharing},
  journal   = {{IACR} Cryptol. ePrint Arch.},
  volume    = {1999},
  pages     = {8},
  year      = {1999},
  url       = {http://eprint.iacr.org/1999/008},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/iacr/CamenischD99.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Camenisch98,
  author    = {Jan Camenisch},
  title     = {Group signature schemes and payment systems based on the discrete
               logarithm problem},
  school    = {{ETH} Zurich, Z{\"{u}}rich, Switzerland},
  year      = {1998},
  url       = {http://d-nb.info/953066045},
  isbn      = {978-3-89649-286-9},
  timestamp = {Fri, 13 Jan 2017 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/phd/dnb/Camenisch98.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/CamenischM98,
  author    = {Jan Camenisch and
               Markus Michels},
  editor    = {Kazuo Ohta and
               Dingyi Pei},
  title     = {A Group Signature Scheme with Improved Efficiency},
  booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
               on the Theory and Applications of Cryptology and Information Security,
               Beijing, China, October 18-22, 1998, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1514},
  pages     = {160--174},
  publisher = {Springer},
  year      = {1998},
  url       = {https://doi.org/10.1007/3-540-49649-1\_14},
  doi       = {10.1007/3-540-49649-1\_14},
  timestamp = {Tue, 14 May 2019 10:00:40 +0200},
  biburl    = {https://dblp.org/rec/conf/asiacrypt/CamenischM98.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcs/CamenischMS97,
  author    = {Jan Camenisch and
               Ueli M. Maurer and
               Markus Stadler},
  title     = {Digital Payment Systems With Passive Anonymity-Revoking Trustees},
  journal   = {J. Comput. Secur.},
  volume    = {5},
  number    = {1},
  pages     = {69--90},
  year      = {1997},
  url       = {https://doi.org/10.3233/JCS-1997-5104},
  doi       = {10.3233/JCS-1997-5104},
  timestamp = {Mon, 11 May 2020 01:00:00 +0200},
  biburl    = {https://dblp.org/rec/journals/jcs/CamenischMS97.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/CamenischS97,
  author    = {Jan Camenisch and
               Markus Stadler},
  editor    = {Burton S. Kaliski Jr.},
  title     = {Efficient Group Signature Schemes for Large Groups (Extended Abstract)},
  booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
               Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1294},
  pages     = {410--424},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/BFb0052252},
  doi       = {10.1007/BFb0052252},
  timestamp = {Tue, 14 May 2019 10:00:48 +0200},
  biburl    = {https://dblp.org/rec/conf/crypto/CamenischS97.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Camenisch97,
  author    = {Jan Camenisch},
  editor    = {Walter Fumy},
  title     = {Efficient and Generalized Group Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '97, International Conference
               on the Theory and Application of Cryptographic Techniques, Konstanz,
               Germany, May 11-15, 1997, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {1233},
  pages     = {465--479},
  publisher = {Springer},
  year      = {1997},
  url       = {https://doi.org/10.1007/3-540-69053-0\_32},
  doi       = {10.1007/3-540-69053-0\_32},
  timestamp = {Tue, 14 May 2019 10:00:54 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/Camenisch97.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/CamenischPS96,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  editor    = {Li Gong and
               Jacques Stearn},
  title     = {An Efficient Fair Payment System},
  booktitle = {{CCS} '96, Proceedings of the 3rd {ACM} Conference on Computer and
               Communications Security, New Delhi, India, March 14-16, 1996},
  pages     = {88--94},
  publisher = {{ACM}},
  year      = {1996},
  url       = {https://doi.org/10.1145/238168.238193},
  doi       = {10.1145/238168.238193},
  timestamp = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl    = {https://dblp.org/rec/conf/ccs/CamenischPS96.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischMS96,
  author    = {Jan Camenisch and
               Ueli M. Maurer and
               Markus Stadler},
  editor    = {Elisa Bertino and
               Helmut Kurth and
               Giancarlo Martella and
               Emilio Montolivo},
  title     = {Digital Payment Systems with Passive Anonymity-Revoking Trustees},
  booktitle = {Computer Security - {ESORICS} 96, 4th European Symposium on Research
               in Computer Security, Rome, Italy, September 25-27, 1996, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {1146},
  pages     = {33--43},
  publisher = {Springer},
  year      = {1996},
  url       = {https://doi.org/10.1007/3-540-61770-1\_26},
  doi       = {10.1007/3-540-61770-1\_26},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/CamenischMS96.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/StadlerPC95,
  author    = {Markus Stadler and
               Jean{-}Marc Piveteau and
               Jan Camenisch},
  editor    = {Louis C. Guillou and
               Jean{-}Jacques Quisquater},
  title     = {Fair Blind Signatures},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '95, International Conference
               on the Theory and Application of Cryptographic Techniques, Saint-Malo,
               France, May 21-25, 1995, Proceeding},
  series    = {Lecture Notes in Computer Science},
  volume    = {921},
  pages     = {209--219},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/3-540-49264-X\_17},
  doi       = {10.1007/3-540-49264-X\_17},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/StadlerPC95.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gi/CamenischPS95,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  editor    = {Friedbert Huber{-}W{\"{a}}schle and
               Helmut Schauer and
               Peter Widmayer},
  title     = {Faire anonyme Zahlungssysteme},
  booktitle = {{GISI} 95, Herausforderungen eines globalen Informationsverbundes
               f{\"{u}}r die Informatik, 25. GI-Jahrestagung und 13. Schweizer
               Informatikertag, Z{\"{u}}rich, Schweiz, 18.-20. September 1995},
  series    = {Informatik Aktuell},
  pages     = {254--265},
  publisher = {Springer},
  year      = {1995},
  url       = {https://doi.org/10.1007/978-3-642-79958-7\_33},
  doi       = {10.1007/978-3-642-79958-7\_33},
  timestamp = {Tue, 23 May 2017 01:10:34 +0200},
  biburl    = {https://dblp.org/rec/conf/gi/CamenischPS95.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/CamenischPS94,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  editor    = {Dieter Gollmann},
  title     = {An Efficient Electronic Payment System Protecting Privacy},
  booktitle = {Computer Security - {ESORICS} 94, Third European Symposium on Research
               in Computer Security, Brighton, UK, November 7-9, 1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {875},
  pages     = {207--215},
  publisher = {Springer},
  year      = {1994},
  url       = {https://doi.org/10.1007/3-540-58618-0\_65},
  doi       = {10.1007/3-540-58618-0\_65},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/esorics/CamenischPS94.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/CamenischPS94,
  author    = {Jan Camenisch and
               Jean{-}Marc Piveteau and
               Markus Stadler},
  editor    = {Alfredo De Santis},
  title     = {Blind Signatures Based on the Discrete Logarithm Problem},
  booktitle = {Advances in Cryptology - {EUROCRYPT} '94, Workshop on the Theory and
               Application of Cryptographic Techniques, Perugia, Italy, May 9-12,
               1994, Proceedings},
  series    = {Lecture Notes in Computer Science},
  volume    = {950},
  pages     = {428--432},
  publisher = {Springer},
  year      = {1994},
  url       = {https://doi.org/10.1007/BFb0053458},
  doi       = {10.1007/BFb0053458},
  timestamp = {Tue, 14 May 2019 10:00:53 +0200},
  biburl    = {https://dblp.org/rec/conf/eurocrypt/CamenischPS94.bib},
  bibsource = {dblp computer science bibliography, https://dblp.org}
}
a service of Schloss Dagstuhl - Leibniz Center for Informatics