Skip to main content

and
  1. Chapter and Conference Paper

    Formal Treatment of Privacy-Enhancing Credential Systems

    Privacy-enhancing attribute-based credentials (PABCs) are the core ingredients to privacy-friendly authentication systems. They allow users to obtain credentials on attributes and prove possession of these creden...

    Jan Camenisch, Stephan Krenn, Anja Lehmann in Selected Areas in Cryptography – SAC 2015 (2016)

  2. No Access

    Chapter

    Comparison of Mechanisms

    In this chapter we compare Privacy-ABC schemes based on the security, functionality and efficiency they offer. The aim of this is to help researchers and application developers choose an schemes and parameters...

    Michael Østergaard Pedersen, Gert Læssøe Mikkelsen in Attribute-based Credentials for Trust (2015)

  3. Article

    Batch Verification of Short Signatures

    With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particular requirements on the applicable crypt...

    Jan Camenisch, Susan Hohenberger, Michael Østergaard Pedersen in Journal of Cryptology (2012)

  4. No Access

    Chapter and Conference Paper

    Practical Short Signature Batch Verification

    In many applications, it is desirable to work with signatures that are short, and yet where many messages from different signers be verified very quickly. RSA signatures satisfy the latter condition, but are gene...

    Anna Lisa Ferrara, Matthew Green, Susan Hohenberger in Topics in Cryptology – CT-RSA 2009 (2009)

  5. No Access

    Chapter and Conference Paper

    RFID Security: Tradeoffs between Security and Efficiency

    We propose a model and definition for anonymous (group) identification that is well suited for RFID systems. This is based on the definition of Juels and Weis of strong privacy for RFID tags, where we add requ...

    Ivan Damgård, Michael Østergaard Pedersen in Topics in Cryptology – CT-RSA 2008 (2008)

  6. Chapter and Conference Paper

    Batch Verification of Short Signatures

    With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particular requirements on the applicable crypt...

    Jan Camenisch, Susan Hohenberger in Advances in Cryptology - EUROCRYPT 2007 (2007)

  7. Chapter and Conference Paper

    Unclonable Group Identification

    We introduce and motivate the concept of unclonable group identification, that provides maximal protection against sharing of identities while still protecting the anonymity of users. We prove that the notion ...

    Ivan Damgård, Kasper Dupont in Advances in Cryptology - EUROCRYPT 2006 (2006)