Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    On the Privacy Enhancement of In-Transit Health Data Inspection: A Preliminary Study

    A new healthcare paradigm has emerged lately placing patients at the center of the healthcare scenario, providing more control over their data. Allowing patients to access data from outside healthcare organiza...

    Jorge Sancho, Gert Læssøe Mikkelsen in XV Mediterranean Conference on Medical and… (2020)

  2. Article

    Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first ...

    Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin, Tomas Toft in Journal of Cryptology (2019)

  3. Chapter and Conference Paper

    Formal Treatment of Privacy-Enhancing Credential Systems

    Privacy-enhancing attribute-based credentials (PABCs) are the core ingredients to privacy-friendly authentication systems. They allow users to obtain credentials on attributes and prove possession of these creden...

    Jan Camenisch, Stephan Krenn, Anja Lehmann in Selected Areas in Cryptography – SAC 2015 (2016)

  4. No Access

    Chapter

    Comparison of Mechanisms

    In this chapter we compare Privacy-ABC schemes based on the security, functionality and efficiency they offer. The aim of this is to help researchers and application developers choose an schemes and parameters...

    Michael Østergaard Pedersen, Gert Læssøe Mikkelsen in Attribute-based Credentials for Trust (2015)

  5. No Access

    Chapter and Conference Paper

    ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use, and Legal Issues

    The project “ABC4Trust – Attribute-based Credentials for Trust” presented its two pilot trials in a workshop and engaged participants in discussions on the two existing as well as potential future application ...

    Felix Bieker, Marit Hansen in Privacy and Identity Management for the Fu… (2015)

  6. No Access

    Chapter

    Technical Implementation and Feasibility

    This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using th...

    Gert Læssøe Mikkelsen, Kasper Damgård in Attribute-based Credentials for Trust (2015)

  7. No Access

    Chapter and Conference Paper

    On the Security of Distributed Multiprime RSA

    Threshold RSA encryption and signing is a very useful tool to increase the security of the secret keys used. Key generation is, however, either done in a non-threshold way, or computationally inefficient proto...

    Ivan Damgård, Gert Læssøe Mikkelsen in Information Security and Cryptology - ICIS… (2015)

  8. No Access

    Chapter and Conference Paper

    Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting

    The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first ...

    Carmit Hazay, Gert Læssøe Mikkelsen, Tal Rabin in Topics in Cryptology – CT-RSA 2012 (2012)

  9. No Access

    Chapter and Conference Paper

    Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols

    In this paper, we investigate on threshold proofs, a framework for distributing the prover’s side of interactive proofs of knowledge over multiple parties. Interactive proofs of knowledge (PoK) are widely used pr...

    Marcel Keller, Gert Læssøe Mikkelsen, Andy Rupp in Information Theoretic Security (2012)

  10. Chapter and Conference Paper

    Efficient, Robust and Constant-Round Distributed RSA Key Generation

    We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one ite...

    Ivan Damgård, Gert Læssøe Mikkelsen in Theory of Cryptography (2010)

  11. Chapter and Conference Paper

    On the Theory and Practice of Personal Digital Signatures

    We take a step towards a more realistic modeling of personal digital signatures, where a human user, his mobile equipment, his PC and a server are all considered as independent players in the protocol, and whe...

    Ivan Damgård, Gert Læssøe Mikkelsen in Public Key Cryptography – PKC 2009 (2009)