An efficient system for non-transferable anonymous credentials with optional anonymity revocation J Camenisch, A Lysyanskaya Advances in Cryptology—EUROCRYPT 2001: International Conference on the …, 2001 | 1667 | 2001 |
Signature schemes and anonymous credentials from bilinear maps J Camenisch, A Lysyanskaya Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004 | 1154 | 2004 |
Dynamic accumulators and application to efficient revocation of anonymous credentials J Camenisch, A Lysyanskaya Crypto 2442, 61-76, 2002 | 1058 | 2002 |
A signature scheme with efficient protocols J Camenisch, A Lysyanskaya Security in Communication Networks: Third International Conference, SCN 2002 …, 2003 | 963 | 2003 |
Pseudonym systems A Lysyanskaya, RL Rivest, A Sahai, S Wolf Selected Areas in Cryptography: 6th Annual International Workshop, SAC’99 …, 2000 | 700 | 2000 |
Compact e-cash J Camenisch, S Hohenberger, A Lysyanskaya Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference …, 2005 | 584 | 2005 |
How to securely outsource cryptographic computations S Hohenberger, A Lysyanskaya Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 458 | 2005 |
Sequential aggregate signatures from trapdoor permutations A Lysyanskaya, S Micali, L Reyzin, H Shacham Advances in Cryptology-EUROCRYPT 2004: International Conference on the …, 2004 | 421 | 2004 |
Randomizable proofs and delegatable anonymous credentials M Belenkiy, J Camenisch, M Chase, M Kohlweiss, A Lysyanskaya, ... Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 344 | 2009 |
Group blind digital signatures: A scalable solution to electronic cash A Lysyanskaya, Z Ramzan Financial Cryptography: Second International Conference, FC'98 Anguilla …, 1998 | 329 | 1998 |
How to win the clonewars: efficient periodic n-times anonymous authentication J Camenisch, S Hohenberger, M Kohlweiss, A Lysyanskaya, ... Proceedings of the 13th ACM conference on Computer and communications …, 2006 | 313 | 2006 |
P-signatures and noninteractive anonymous credentials M Belenkiy, M Chase, M Kohlweiss, A Lysyanskaya Theory of Cryptography: Fifth Theory of Cryptography Conference, TCC 2008 …, 2008 | 267 | 2008 |
Asynchronous verifiable secret sharing and proactive cryptosystems C Cachin, K Kursawe, A Lysyanskaya, R Strobl Proceedings of the 9th ACM Conference on Computer and Communications …, 2002 | 253 | 2002 |
On signatures of knowledge M Chase, A Lysyanskaya Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006 | 248 | 2006 |
Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering R Gennaro, A Lysyanskaya, T Malkin, S Micali, T Rabin TCC 2951, 258-277, 2004 | 241 | 2004 |
Unique signatures and verifiable random functions from the DH-DDH separation A Lysyanskaya Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology …, 2002 | 231 | 2002 |
A formal treatment of onion routing J Camenisch, A Lysyanskaya Advances in Cryptology–CRYPTO 2005: 25th Annual International Cryptology …, 2005 | 209 | 2005 |
ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption D Yao, N Fazio, Y Dodis, A Lysyanskaya Proceedings of the 11th ACM conference on Computer and communications …, 2004 | 203 | 2004 |
Rationality and adversarial behavior in multi-party computation A Lysyanskaya, N Triandopoulos Advances in Cryptology-CRYPTO 2006: 26th Annual International Cryptology …, 2006 | 189 | 2006 |
Anonymous credentials light F Baldimtsi, A Lysyanskaya Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 187 | 2013 |