Hasso-Plattner-Institut
Prof. Dr. Anja Lehmann
  
 

Publications

We try to keep an up to date list of all our publications. If you are interested in a PDF that we have not uploaded yet, feel free to send us an email to get a copy.

[ 2020 ] [ 2019 ] [ 2018 ] [ 2017 ] [ 2016 ] [ 2015 ] [ 2014 ] [ 2013 ] [ 2012 ] [ 2011 ] [ 2010 ] [ 2009 ] [ 2008 ] [ 2007 ]

2020 [ to top ]

  • PESTO: Proactively Secure... - Download
    Baum, C., Frederiksen, T., Hesse, J., Lehmann, A., Yanai, A.: PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.IEEE EuroS&P. (2020).
     
  • Camenisch, J., Drijvers, M., Lehmann, A., Neven, G., Towa, P.: Zone Encryption with Anonymous Authentication for V2V Communication.IEEE EuroS&P. (2020).
     
  • Bootle, J., Lehmann, A., Lyubashevsky, V., Seiler, G.: Compact Privacy Protocols from Post-Quantum and Timed Classical Assumptions.PQCrypto.2020, (2020).
     
  • Camenisch, J., Drijvers, M., Lehmann, A., Neven, G., Towa, P.: Short Threshold Dynamic Group Signatures.SCN. (2020).
     

2019 [ to top ]

  • (R)CCA Secure Updatable E... - Download
    Klooß, M., Lehmann, A., Rupp, A.: (R)CCA Secure Updatable Encryption with Integrity Protection.EUROCRYPT (1). bl. 68--99. Springer (2019).
     
  • Group Signatures with Sel... - Download
    Garms, L., Lehmann, A.: Group Signatures with Selective Linkability.Public Key Cryptography (1). bl. 190--220. Springer (2019).
     
  • ScrambleDB: Oblivious (Ch... - Download
    Lehmann, A.: ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service.PoPETs.2019,289--309 (2019).
     
  • Identity Management: Stat... - Download
    Frederiksen, T.K., Hesse, J., Lehmann, A., Moreno, R.T.: Identity Management: State of the Art, Challenges and Perspectives.Privacy and Identity Management. Data for Better Living: AI and Privacy. bl. 45--62. Springer (2019).
     
  • Password-Authenticated Pu... - Download
    Bradley, T., Camenisch, J., Jarecki, S., Lehmann, A., Neven, G., Xu, J.: Password-Authenticated Public-Key Encryption.ACNS. bl. 442--462. Springer (2019).
     
  • A Framework for Efficient... - Download
    Chen, L., Kassem, N.E., Lehmann, A., Lyubashevsky, V.: A Framework for Efficient Lattice-Based DAA.CYSARM@CCS. bl. 23--34. ACM (2019).
     
  • Moreno, R.T., Bernabé, J.B., Skarmeta, A.F., Stausholm, M., Frederiksen, T.K., Mart'inez, N., Ponte, N., Sakkopoulos, E., Lehmann, A.: OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services.GIoTS. bl. 1--6. IEEE (2019).
     

2018 [ to top ]

  • Cremers, C., Lehmann, A. reds: Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings.Springer (2018).
     
  • The Wonderful World of Gl... - Download
    Camenisch, J., Drijvers, M., Gagliardoni, T., Lehmann, A., Neven, G.: The Wonderful World of Global Random Oracles.EUROCRYPT (1). bl. 280--312. Springer (2018).
     
  • Updatable Encryption with... - Download
    Lehmann, A., Tackmann, B.: Updatable Encryption with Post-Compromise Security.EUROCRYPT (3). bl. 685--716. Springer (2018).
     

2017 [ to top ]

  • One TPM to Bind Them All:... - Download
    Camenisch, J., Chen, L., Drijvers, M., Lehmann, A., Novick, D., Urian, R.: One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation.IEEE Symposium on Security and Privacy. bl. 901--920. IEEE Computer Society (2017).
     
  • Anonymous Attestation wit... - Download
    Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous Attestation with Subverted TPMs.CRYPTO (3). bl. 427--461. Springer (2017).
     
  • Privacy-Preserving User-A... - Download
    Camenisch, J., Lehmann, A.: Privacy-Preserving User-Auditable Pseudonym Systems.EuroS&P. bl. 269--284. IEEE (2017).
     
  • Camenisch, J., Lehmann, A., Neven, G., Samelin, K.: UC-Secure Non-interactive Public-Key Encryption.CSF. bl. 217--233. IEEE Computer Society (2017).
     
  • Updatable Tokenization: F... - Download
    Cachin, C., Camenisch, J., Freire-Stögbuchner, E., Lehmann, A.: Updatable Tokenization: Formal Definitions and Provably Secure Constructions.Financial Cryptography. bl. 59--75. Springer (2017).
     

2016 [ to top ]

  • Universally Composable Di... - Download
    Camenisch, J., Drijvers, M., Lehmann, A.: Universally Composable Direct Anonymous Attestation.Public Key Cryptography (2). bl. 234--264. Springer (2016).
     
  • Anonymous Attestation Usi... - Download
    Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited.TRUST. bl. 1--20. Springer (2016).
     
  • Virtual Smart Cards: How ... - Download
    Camenisch, J., Lehmann, A., Neven, G., Samelin, K.: Virtual Smart Cards: How to Sign with a Password and a Server.SCN. bl. 353--371. Springer (2016).
     
  • Lehmann, A., Whitehouse, D., Fischer-Hübner, S., Fritsch, L., Raab, C.D. reds: Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers. (2016).
     

2015 [ to top ]

  • Privacy for Distributed D... - Download
    Camenisch, J., Lehmann, A.: Privacy for Distributed Databases via (Un)linkable Pseudonyms.ACM Conference on Computer and Communications Security. bl. 1467--1479. ACM (2015).
     
  • Optimal Distributed Passw... - Download
    Camenisch, J., Lehmann, A., Neven, G.: Optimal Distributed Password Verification.ACM Conference on Computer and Communications Security. bl. 182--194. ACM (2015).
     
  • Formal Treatment of Priva... - Download
    Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pedersen, M.O.: Formal Treatment of Privacy-Enhancing Credential Systems.SAC. bl. 3--24. Springer (2015).
     
  • Baldimtsi, F., Camenisch, J., Hanzlik, L., Krenn, S., Lehmann, A., Neven, G.: Recovering Lost Device-Bound Credentials.ACNS. bl. 307--327. Springer (2015).
     
  • Camenisch, J., Lehmann, A., Lysyanskaya, A., Neven, G.: A Single Password for Everything?ERCIM News.2015, (2015).
     
  • Bichsel, P., Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Krenn, S., Lehmann, A., Neven, G., Preiss, F.-S.: Cryptographic Protocols Underlying Privacy-ABCs.Attribute-based Credentials for Trust. bl. 79--108. Springer (2015).
     
  • Bichsel, P., Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Krenn, S., Krontiris, I., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S., Rannenberg, K., Sabouri, A.: An Architecture for Privacy-ABCs.Attribute-based Credentials for Trust. bl. 11--78. Springer (2015).
     
  • Lehmann, A., Wolf, S. reds: Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings.Springer (2015).
     

2014 [ to top ]

  • Privacy-Preserving Auditi... - Download
    Camenisch, J., Lehmann, A., Neven, G., Rial, A.: Privacy-Preserving Auditing for Attribute-Based Credentials.ESORICS (2). bl. 109--127. Springer (2014).
     
  • Memento: How to Reconstru... - Download
    Camenisch, J., Lehmann, A., Lysyanskaya, A., Neven, G.: Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.CRYPTO (2). bl. 256--275. Springer (2014).
     
  • Robust Multi-Property Com... - Download
    Fischlin, M., Lehmann, A., Pietrzak, K.: Robust Multi-Property Combiners for Hash Functions.J. Cryptology.27,397--428 (2014).
     

2013 [ to top ]

  • Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.IDMAN. bl. 34--52. Springer (2013).
     
  • Horsch, M., Hühnlein, D., Lehmann, A., Schmölz, J., Wich, T.: Authentisierung mit der Open eCard App.Datenschutz und Datensicherheit.37,507--511 (2013).
     

2012 [ to top ]

  • Camenisch, J., Lehmann, A., Neven, G.: Electronic Identities Need Private Credentials.IEEE Security & Privacy.10,80--83 (2012).
     
  • History-Free Sequential A... - Download
    Fischlin, M., Lehmann, A., Schröder, D.: History-Free Sequential Aggregate Signatures.SCN. bl. 113--130. Springer (2012).
     
  • On the Joint Security of ... - Download
    Degabriele, J.P., Lehmann, A., Paterson, K.G., Smart, N.P., Strefler, M.: On the Joint Security of Encryption and Signature in EMV.CT-RSA. bl. 116--135. Springer (2012).
     

2011 [ to top ]

  • Random Oracles in a Quant... - Download
    Boneh, D., Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random Oracles in a Quantum World.ASIACRYPT. bl. 41--69. Springer (2011).
     

2010 [ to top ]

  • Galindo, D., Libert, B.^it, Fischlin, M., Fuchsbauer, G., Lehmann, A., Manulis, M., Schröder, D.: Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.AFRICACRYPT. bl. 333--350. Springer (2010).
     
  • Fischlin, M., Lehmann, A.: Delayed-Key Message Authentication for Streams.TCC. bl. 290--307. Springer (2010).
     
  • Lehmann, A.: On the security of hash function combiners, (2010).
     
  • Dagdelen, Ö., Fischlin, M., Lehmann, A., Schaffner, C.: Random Oracles in a Quantum World.CoRR.abs/1008.0931, (2010).
     
  • Fischlin, M., Lehmann, A., Ristenpart, T., Shrimpton, T., Stam, M., Tessaro, S.: Random Oracles with(out) Programmability.ASIACRYPT. bl. 303--320. Springer (2010).
     
  • Eikemeier, O., Fischlin, M., Götzmann, J.-F., Lehmann, A., Schröder, D., Schröder, P., Wagner, D.: History-Free Aggregate Message Authentication Codes.SCN. bl. 309--328. Springer (2010).
     
  • Fischlin, M., Lehmann, A., Wagner, D.: Hash Function Combiners in TLS and SSL.CT-RSA. bl. 268--283. Springer (2010).
     
  • Brzuska, C., Fischlin, M., Lehmann, A., Schröder, D.: Unlinkability of Sanitizable Signatures.Public Key Cryptography. bl. 444--461. Springer (2010).
     

2009 [ to top ]

  • Brzuska, C., Fischlin, M., Lehmann, A., Schröder, D.: Santizable Signatures: How to Partially Delegate Control for Authenticated Data.BIOSIG. bl. 117--128. GI (2009).
     
  • Lehmann, A., Tessaro, S.: A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.ASIACRYPT. bl. 364--381. Springer (2009).
     
  • Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schröder, D., Volk, F.: Security of Sanitizable Signatures Revisited.Public Key Cryptography. bl. 317--336. Springer (2009).
     

2008 [ to top ]

  • Fischlin, M., Lehmann, A.: Multi-property Preserving Combiners for Hash Functions.TCC. bl. 375--392. Springer (2008).
     
  • Fischlin, M., Lehmann, A., Pietrzak, K.: Robust Multi-property Combiners for Hash Functions Revisited.ICALP (2). bl. 655--666. Springer (2008).
     

2007 [ to top ]

  • Fischlin, M., Lehmann, A.: Security-Amplifying Combiners for Collision-Resistant Hash Functions.CRYPTO. bl. 224--243. Springer (2007).
     
  • Dönigus, D., Endler, S., Fischlin, M., Hülsing, A., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M., Weidemann, F.: Security of Invertible Media Authentication Schemes Revisited.Information Hiding. bl. 189--203. Springer (2007).