Anja Lehmann

Orcid: 0000-0002-2872-7899

Affiliations:
  • Hasso Plattner Institute, Potsdam, Germany
  • IBM Research Zurich, Switzerland


According to our database1, Anja Lehmann authored at least 78 papers between 2007 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
A Brief Note on Cryptographic Pseudonyms for Anonymous Credentials.
CoRR, October, 2025

Game Changer: A Modular Framework for OPRF Security.
IACR Cryptol. ePrint Arch., 2025

Commit-and-Prove System for Vectors and Applications to Threshold Signing.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Privacy-Preserving Multi-signatures: Generic Techniques and Constructions Without Pairings.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Stronger Security for Threshold Blind Signatures.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025

Security Analysis of Privately Verifiable Privacy Pass.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Updatable aPAKE: Security Against Bulk Precomputation Attacks.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025

Virtual End-to-End Encryption: Analysis of the Doctolib Protocol.
Proceedings of the 20th ACM Asia Conference on Computer and Communications Security, 2025

2024
OPPID: Single Sign-On with Oblivious Pairwise Pseudonyms.
IACR Cryptol. ePrint Arch., 2024

Multi-Signatures for Ad-Hoc and Privacy-Preserving Group Signing.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

(Strong) aPAKE Revisited: Capturing Multi-User Security and Salting.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

SEKA: Secretless Key Exchange and Authentication in LiFi Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

Provable Security Analysis of the Secure Remote Password Protocol.
Proceedings of the 37th IEEE Computer Security Foundations Symposium, 2024

Password-Protected Key Retrieval with(out) HSM Protection.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect.
Proc. Priv. Enhancing Technol., October, 2023

Privacy-Preserving Outsourced Certificate Validation.
IACR Cryptol. ePrint Arch., 2023

Password-Based Credentials with Security Against Server Compromise.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
AI Compliance - Challenges of Bridging Data Science and Law.
ACM J. Data Inf. Qual., 2022

SoK: Oblivious Pseudorandom Functions.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Group Signatures with User-Controlled and Sequential Linkability.
Proceedings of the Public-Key Cryptography - PKC 2021, 2021

Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
DPaSE: Distributed Password-Authenticated Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Security and Privacy of Decentralized Cryptographic Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

Short Threshold Dynamic Group Signatures.
Proceedings of the Security and Cryptography for Networks - 12th International Conference, 2020

Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Zone Encryption with Anonymous Authentication for V2V Communication.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020

2019
ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service.
Proc. Priv. Enhancing Technol., 2019

Identity Management: State of the Art, Challenges and Perspectives.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

Group Signatures with Selective Linkability.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services.
Proceedings of the 2019 Global IoT Summit, 2019

(R)CCA Secure Updatable Encryption with Integrity Protection.
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019

A Framework for Efficient Lattice-Based DAA.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

Password-Authenticated Public-Key Encryption.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Updatable Encryption with Post-Compromise Security.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

The Wonderful World of Global Random Oracles.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

2017
Privacy for Distributed Databases via (Un)linkable Pseudonyms.
IACR Cryptol. ePrint Arch., 2017

One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017

Updatable Tokenization: Formal Definitions and Provably Secure Constructions.
Proceedings of the Financial Cryptography and Data Security, 2017

Privacy-Preserving User-Auditable Pseudonym Systems.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

UC-Secure Non-interactive Public-Key Encryption.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

Anonymous Attestation with Subverted TPMs.
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017

2016
Robust Multi-Property Combiners for Hash Functions.
IACR Cryptol. ePrint Arch., 2016

Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited.
Proceedings of the Trust and Trustworthy Computing - 9th International Conference, 2016

Virtual Smart Cards: How to Sign with a Password and a Server.
Proceedings of the Security and Cryptography for Networks - 10th International Conference, 2016

Universally Composable Direct Anonymous Attestation.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

2015
A Single Password for Everything?
ERCIM News, 2015

Formal Treatment of Privacy-Enhancing Credential Systems.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Optimal Distributed Password Verification.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

(Un)linkable Pseudonyms for Governmental Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

Cryptographic Protocols Underlying Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Concepts and languages for privacy-preserving attribute-based authentication.
J. Inf. Secur. Appl., 2014

Privacy-Preserving Auditing for Attribute-Based Credentials.
Proceedings of the Computer Security - ESORICS 2014, 2014

Memento: How to Reconstruct Your Secrets from a Single Password in a Hostile Environment.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

2013
Authentisierung mit der Open eCard App.
Datenschutz und Datensicherheit, 2013

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.
Proceedings of the Policies and Research in Identity Management, 2013

2012
Electronic Identities Need Private Credentials.
IEEE Secur. Priv., 2012

History-Free Sequential Aggregate Signatures.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

On the Joint Security of Encryption and Signature in EMV.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
Random Oracles in a Quantum World.
Proceedings of the Advances in Cryptology - ASIACRYPT 2011, 2011

2010
On the security of hash function combiners.
PhD thesis, 2010

Random Oracles in a Quantum World
CoRR, 2010

Delayed-Key Message Authentication for Streams.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

History-Free Aggregate Message Authentication Codes.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Unlinkability of Sanitizable Signatures.
Proceedings of the Public Key Cryptography, 2010

Hash Function Combiners in TLS and SSL.
Proceedings of the Topics in Cryptology, 2010

Random Oracles with(out) Programmability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010

2009
Security of Sanitizable Signatures Revisited.
Proceedings of the Public Key Cryptography, 2009

Santizable Signatures: How to Partially Delegate Control for Authenticated Data.
Proceedings of the BIOSIG 2009, 2009

A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.
Proceedings of the Advances in Cryptology, 2009

2008
Multi-property Preserving Combiners for Hash Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Robust Multi-property Combiners for Hash Functions Revisited.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

2007
Security of Invertible Media Authentication Schemes Revisited.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Security-Amplifying Combiners for Collision-Resistant Hash Functions.
Proceedings of the Advances in Cryptology, 2007


  Loading...