Hasso-Plattner-Institut
Prof. Dr. Anja Lehmann
  
 

Publications

We try to keep an up to date list of all our publications. If you are interested in a PDF that we have not uploaded yet, feel free to send us an email to get a copy.

[ 2021 ] [ 2020 ] [ 2019 ] [ 2018 ] [ 2017 ] [ 2016 ] [ 2015 ] [ 2014 ] [ 2013 ] [ 2012 ] [ 2011 ] [ 2010 ] [ 2009 ] [ 2008 ] [ 2007 ]

2021 [ nach oben ]

  • Group Signatures with Use... - Download
    1.
    Diaz, J., Lehmann, A.: Group Signatures with User-Controlled and Sequential Linkability. Public-Key Cryptography - PKC 2021. Springer (2021).
     

2020 [ nach oben ]

  • Short Threshold Dynamic G... - Download
    1.
    Camenisch, J., Drijvers, M., Lehmann, A., Neven, G., Towa, P.: Short Threshold Dynamic Group Signatures. SCN. pp. 401–423 (2020).
     
  • PESTO: Proactively Secure... - Download
    2.
    Baum, C., Frederiksen, T., Hesse, J., Lehmann, A., Yanai, A.: PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server. IEEE EuroS&P. (2020).
     
  • Zone Encryption with Anon... - Download
    3.
    Camenisch, J., Drijvers, M., Lehmann, A., Neven, G., Towa, P.: Zone Encryption with Anonymous Authentication for V2V Communication. IEEE EuroS&P. (2020).
     
  • Compact Privacy Protocols... - Download
    4.
    Bootle, J., Lehmann, A., Lyubashevsky, V., Seiler, G.: Compact Privacy Protocols from Post-Quantum and Timed Classical Assumptions. PQCrypto. pp. 226–246 (2020).
     
  • Provable Security Analysi... - Download
    5.
    Danz, N., Derwisch, O., Lehmann, A., Pünter, W., Stolle, M., Ziemann, J.: Provable Security Analysis of Decentralized Cryptographic Contact Tracing. (Preprint) IACR ePrint. (2020).
     

2019 [ nach oben ]

  • (R)CCA Secure Updatable E... - Download
    1.
    Klooß, M., Lehmann, A., Rupp, A.: (R)CCA Secure Updatable Encryption with Integrity Protection. EUROCRYPT (1). bll. 68–99. Springer (2019).
     
  • ScrambleDB: Oblivious (Ch... - Download
    2.
    Lehmann, A.: ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service. PoPETs. 2019, 289–309 (2019).
     
  • Group Signatures with Sel... - Download
    3.
    Garms, L., Lehmann, A.: Group Signatures with Selective Linkability. Public Key Cryptography (1). bll. 190–220. Springer (2019).
     
  • Identity Management: Stat... - Download
    4.
    Frederiksen, T.K., Hesse, J., Lehmann, A., Moreno, R.T.: Identity Management: State of the Art, Challenges and Perspectives. Privacy and Identity Management. Data for Better Living: AI and Privacy. bll. 45–62. Springer (2019).
     
  • Password-Authenticated Pu... - Download
    5.
    Bradley, T., Camenisch, J., Jarecki, S., Lehmann, A., Neven, G., Xu, J.: Password-Authenticated Public-Key Encryption. ACNS. bll. 442–462. Springer (2019).
     
  • A Framework for Efficient... - Download
    6.
    Chen, L., Kassem, N.E., Lehmann, A., Lyubashevsky, V.: A Framework for Efficient Lattice-Based DAA. CYSARM@CCS. bll. 23–34. ACM (2019).
     
  • 7.
    Moreno, R.T., Bernabé, J.B., Skarmeta, A.F., Stausholm, M., Frederiksen, T.K., Mart’inez, N., Ponte, N., Sakkopoulos, E., Lehmann, A.: OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services. GIoTS. bll. 1–6. IEEE (2019).
     

2018 [ nach oben ]

  • Updatable Encryption with... - Download
    1.
    Lehmann, A., Tackmann, B.: Updatable Encryption with Post-Compromise Security. EUROCRYPT (3). bll. 685–716. Springer (2018).
     
  • 2.
    Cremers, C., Lehmann, A. reds: Security Standardisation Research - 4th International Conference, SSR 2018, Darmstadt, Germany, November 26-27, 2018, Proceedings. Springer (2018).
     
  • The Wonderful World of Gl... - Download
    3.
    Camenisch, J., Drijvers, M., Gagliardoni, T., Lehmann, A., Neven, G.: The Wonderful World of Global Random Oracles. EUROCRYPT (1). bll. 280–312. Springer (2018).
     

2017 [ nach oben ]

  • One TPM to Bind Them All:... - Download
    1.
    Camenisch, J., Chen, L., Drijvers, M., Lehmann, A., Novick, D., Urian, R.: One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation. IEEE Symposium on Security and Privacy. bll. 901–920. IEEE Computer Society (2017).
     
  • Anonymous Attestation wit... - Download
    2.
    Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous Attestation with Subverted TPMs. CRYPTO (3). bll. 427–461. Springer (2017).
     
  • Privacy-Preserving User-A... - Download
    3.
    Camenisch, J., Lehmann, A.: Privacy-Preserving User-Auditable Pseudonym Systems. EuroS&P. bll. 269–284. IEEE (2017).
     
  • Updatable Tokenization: F... - Download
    4.
    Cachin, C., Camenisch, J., Freire-Stögbuchner, E., Lehmann, A.: Updatable Tokenization: Formal Definitions and Provably Secure Constructions. Financial Cryptography. bll. 59–75. Springer (2017).
     
  • 5.
    Camenisch, J., Lehmann, A., Neven, G., Samelin, K.: UC-Secure Non-interactive Public-Key Encryption. CSF. bll. 217–233. IEEE Computer Society (2017).
     

2016 [ nach oben ]

  • Virtual Smart Cards: How ... - Download
    1.
    Camenisch, J., Lehmann, A., Neven, G., Samelin, K.: Virtual Smart Cards: How to Sign with a Password and a Server. SCN. bll. 353–371. Springer (2016).
     
  • 2.
    Lehmann, A., Whitehouse, D., Fischer-Hübner, S., Fritsch, L., Raab, C.D. reds: Privacy and Identity Management. Facing up to Next Steps - 11th IFIP WG 9.2, 9.5, 9.6/11.7, 11.4, 11.6/SIG 9.2.2 International Summer School, Karlstad, Sweden, August 21-26, 2016, Revised Selected Papers. (2016).
     
  • Universally Composable Di... - Download
    3.
    Camenisch, J., Drijvers, M., Lehmann, A.: Universally Composable Direct Anonymous Attestation. Public Key Cryptography (2). bll. 234–264. Springer (2016).
     
  • Anonymous Attestation Usi... - Download
    4.
    Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. TRUST. bll. 1–20. Springer (2016).
     

2015 [ nach oben ]

  • Optimal Distributed Passw... - Download
    1.
    Camenisch, J., Lehmann, A., Neven, G.: Optimal Distributed Password Verification. ACM Conference on Computer and Communications Security. bll. 182–194. ACM (2015).
     
  • Privacy for Distributed D... - Download
    2.
    Camenisch, J., Lehmann, A.: Privacy for Distributed Databases via (Un)linkable Pseudonyms. ACM Conference on Computer and Communications Security. bll. 1467–1479. ACM (2015).
     
  • Formal Treatment of Priva... - Download
    3.
    Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pedersen, M.O.: Formal Treatment of Privacy-Enhancing Credential Systems. SAC. bll. 3–24. Springer (2015).
     
  • 4.
    Baldimtsi, F., Camenisch, J., Hanzlik, L., Krenn, S., Lehmann, A., Neven, G.: Recovering Lost Device-Bound Credentials. ACNS. bll. 307–327. Springer (2015).
     
  • 5.
    Camenisch, J., Lehmann, A., Lysyanskaya, A., Neven, G.: A Single Password for Everything?. ERCIM News. 2015, (2015).
     
  • 6.
    Lehmann, A., Wolf, S. reds: Information Theoretic Security - 8th International Conference, ICITS 2015, Lugano, Switzerland, May 2-5, 2015. Proceedings. Springer (2015).
     
  • 7.
    Bichsel, P., Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Krenn, S., Krontiris, I., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S., Rannenberg, K., Sabouri, A.: An Architecture for Privacy-ABCs. Attribute-based Credentials for Trust. bll. 11–78. Springer (2015).
     
  • 8.
    Bichsel, P., Camenisch, J., Dubovitskaya, M., Enderlein, R.R., Krenn, S., Lehmann, A., Neven, G., Preiss, F.-S.: Cryptographic Protocols Underlying Privacy-ABCs. Attribute-based Credentials for Trust. bll. 79–108. Springer (2015).
     

2014 [ nach oben ]

  • Robust Multi-Property Com... - Download
    1.
    Fischlin, M., Lehmann, A., Pietrzak, K.: Robust Multi-Property Combiners for Hash Functions. J. Cryptology. 27, 397–428 (2014).
     
  • Privacy-Preserving Auditi... - Download
    2.
    Camenisch, J., Lehmann, A., Neven, G., Rial, A.: Privacy-Preserving Auditing for Attribute-Based Credentials. ESORICS (2). bll. 109–127. Springer (2014).
     
  • Memento: How to Reconstru... - Download
    3.
    Camenisch, J., Lehmann, A., Lysyanskaya, A., Neven, G.: Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment. CRYPTO (2). bll. 256–275. Springer (2014).
     

2013 [ nach oben ]

  • 1.
    Horsch, M., Hühnlein, D., Lehmann, A., Schmölz, J., Wich, T.: Authentisierung mit der Open eCard App. Datenschutz und Datensicherheit. 37, 507–511 (2013).
     
  • 2.
    Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. IDMAN. bll. 34–52. Springer (2013).
     

2012 [ nach oben ]

  • 1.
    Camenisch, J., Lehmann, A., Neven, G.: Electronic Identities Need Private Credentials. IEEE Security & Privacy. 10, 80–83 (2012).
     
  • History-Free Sequential A... - Download
    2.
    Fischlin, M., Lehmann, A., Schröder, D.: History-Free Sequential Aggregate Signatures. SCN. bll. 113–130. Springer (2012).
     
  • On the Joint Security of ... - Download
    3.
    Degabriele, J.P., Lehmann, A., Paterson, K.G., Smart, N.P., Strefler, M.: On the Joint Security of Encryption and Signature in EMV. CT-RSA. bll. 116–135. Springer (2012).
     

2011 [ nach oben ]

  • Random Oracles in a Quant... - Download
    1.
    Boneh, D., Dagdelen, Özgür, Fischlin, M., Lehmann, A., Schaffner, C., Zhandry, M.: Random Oracles in a Quantum World. ASIACRYPT. bll. 41–69. Springer (2011).
     

2010 [ nach oben ]

  • 1.
    Fischlin, M., Lehmann, A., Ristenpart, T., Shrimpton, T., Stam, M., Tessaro, S.: Random Oracles with(out) Programmability. ASIACRYPT. bll. 303–320. Springer (2010).
     
  • 2.
    Galindo, D., Libert, B., Fischlin, M., Fuchsbauer, G., Lehmann, A., Manulis, M., Schröder, D.: Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions. AFRICACRYPT. bll. 333–350. Springer (2010).
     
  • 3.
    Lehmann, A.: On the security of hash function combiners, (2010).
     
  • 4.
    Brzuska, C., Fischlin, M., Lehmann, A., Schröder, D.: Unlinkability of Sanitizable Signatures. Public Key Cryptography. bll. 444–461. Springer (2010).
     
  • 5.
    Fischlin, M., Lehmann, A.: Delayed-Key Message Authentication for Streams. TCC. bll. 290–307. Springer (2010).
     
  • 6.
    Fischlin, M., Lehmann, A., Wagner, D.: Hash Function Combiners in TLS and SSL. CT-RSA. bll. 268–283. Springer (2010).
     
  • 7.
    Dagdelen, Özgür, Fischlin, M., Lehmann, A., Schaffner, C.: Random Oracles in a Quantum World. CoRR. abs/1008.0931, (2010).
     
  • 8.
    Eikemeier, O., Fischlin, M., Götzmann, J.-F., Lehmann, A., Schröder, D., Schröder, P., Wagner, D.: History-Free Aggregate Message Authentication Codes. SCN. bll. 309–328. Springer (2010).
     

2009 [ nach oben ]

  • 1.
    Brzuska, C., Fischlin, M., Lehmann, A., Schröder, D.: Santizable Signatures: How to Partially Delegate Control for Authenticated Data. BIOSIG. bll. 117–128. GI (2009).
     
  • 2.
    Brzuska, C., Fischlin, M., Freudenreich, T., Lehmann, A., Page, M., Schelbert, J., Schröder, D., Volk, F.: Security of Sanitizable Signatures Revisited. Public Key Cryptography. bll. 317–336. Springer (2009).
     
  • 3.
    Lehmann, A., Tessaro, S.: A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical. ASIACRYPT. bll. 364–381. Springer (2009).
     

2008 [ nach oben ]

  • 1.
    Fischlin, M., Lehmann, A.: Multi-property Preserving Combiners for Hash Functions. TCC. bll. 375–392. Springer (2008).
     
  • 2.
    Fischlin, M., Lehmann, A., Pietrzak, K.: Robust Multi-property Combiners for Hash Functions Revisited. ICALP (2). bll. 655–666. Springer (2008).
     

2007 [ nach oben ]

  • 1.
    Fischlin, M., Lehmann, A.: Security-Amplifying Combiners for Collision-Resistant Hash Functions. CRYPTO. bll. 224–243. Springer (2007).
     
  • 2.
    Dönigus, D., Endler, S., Fischlin, M., Hülsing, A., Jäger, P., Lehmann, A., Podrazhansky, S., Schipp, S., Tews, E., Vowe, S., Walthart, M., Weidemann, F.: Security of Invertible Media Authentication Schemes Revisited. Information Hiding. bll. 189–203. Springer (2007).