Anja Lehmann

Orcid: 0000-0002-2872-7899

Affiliations:
  • Hasso Plattner Institute, Potsdam, Germany
  • IBM Research Zurich, Switzerland


According to our database1, Anja Lehmann authored at least 66 papers between 2007 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Save The Implicit Flow? Enabling Privacy-Preserving RP Authentication in OpenID Connect.
Proc. Priv. Enhancing Technol., October, 2023

Privacy-Preserving Outsourced Certificate Validation.
Proc. Priv. Enhancing Technol., October, 2023

Multi-Signatures for Ad-hoc and Privacy-Preserving Group Signing.
IACR Cryptol. ePrint Arch., 2023

Provable Security Analysis of the Secure Remote Password Protocol.
IACR Cryptol. ePrint Arch., 2023

Password-Based Credentials with Security against Server Compromise.
IACR Cryptol. ePrint Arch., 2023

2022
AI Compliance - Challenges of Bridging Data Science and Law.
ACM J. Data Inf. Qual., 2022

SoK: Oblivious Pseudorandom Functions.
IACR Cryptol. ePrint Arch., 2022

DPaSE: Distributed Password-Authenticated Symmetric-Key Encryption, or How to Get Many Keys from One Password.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Selectively Linkable Group Signatures - Stronger Security and Preserved Verifiability.
IACR Cryptol. ePrint Arch., 2021

Group Signatures with User-Controlled and Sequential Linkability.
IACR Cryptol. ePrint Arch., 2021

2020
DPaSE: Distributed Password-Authenticated Symmetric Encryption.
IACR Cryptol. ePrint Arch., 2020

Security and Privacy of Decentralized Cryptographic Contact Tracing.
IACR Cryptol. ePrint Arch., 2020

Zone Encryption with Anonymous Authentication for V2V Communication.
IACR Cryptol. ePrint Arch., 2020

Short Threshold Dynamic Group Signatures.
IACR Cryptol. ePrint Arch., 2020

Compact Privacy Protocols from Post-quantum and Timed Classical Assumptions.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

2019
ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service.
Proc. Priv. Enhancing Technol., 2019

(R)CCA Secure Updatable Encryption with Integrity Protection.
IACR Cryptol. ePrint Arch., 2019

Group Signatures with Selective Linkability.
IACR Cryptol. ePrint Arch., 2019

Password-Authenticated Public-Key Encryption.
IACR Cryptol. ePrint Arch., 2019

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server.
IACR Cryptol. ePrint Arch., 2019

Identity Management: State of the Art, Challenges and Perspectives.
Proceedings of the Privacy and Identity Management. Data for Better Living: AI and Privacy, 2019

OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services.
Proceedings of the 2019 Global IoT Summit, 2019

A Framework for Efficient Lattice-Based DAA.
Proceedings of the 1st ACM Workshop on Workshop on Cyber-Security Arms Race, 2019

2018
Updatable Encryption with Post-Compromise Security.
IACR Cryptol. ePrint Arch., 2018

The Wonderful World of Global Random Oracles.
IACR Cryptol. ePrint Arch., 2018

2017
Privacy for Distributed Databases via (Un)linkable Pseudonyms.
IACR Cryptol. ePrint Arch., 2017

Anonymous Attestation with Subverted TPMs.
IACR Cryptol. ePrint Arch., 2017

One TPM to Bind Them All: Fixing TPM 2.0 for Provably Secure Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2017

Updatable Tokenization: Formal Definitions and Provably Secure Constructions.
IACR Cryptol. ePrint Arch., 2017

Privacy-Preserving User-Auditable Pseudonym Systems.
Proceedings of the 2017 IEEE European Symposium on Security and Privacy, 2017

UC-Secure Non-interactive Public-Key Encryption.
Proceedings of the 30th IEEE Computer Security Foundations Symposium, 2017

2016
Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited.
IACR Cryptol. ePrint Arch., 2016

2015
Virtual Smart Cards: How to Sign with a Password and a Server.
IACR Cryptol. ePrint Arch., 2015

Universally Composable Direct Anonymous Attestation.
IACR Cryptol. ePrint Arch., 2015

A Single Password for Everything?
ERCIM News, 2015

Optimal Distributed Password Verification.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

(Un)linkable Pseudonyms for Governmental Databases.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Recovering Lost Device-Bound Credentials.
Proceedings of the Applied Cryptography and Network Security, 2015

Cryptographic Protocols Underlying Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

An Architecture for Privacy-ABCs.
Proceedings of the Attribute-based Credentials for Trust: Identity in the Information Society, 2015

2014
Robust Multi-Property Combiners for Hash Functions.
J. Cryptol., 2014

Concepts and languages for privacy-preserving attribute-based authentication.
J. Inf. Secur. Appl., 2014

Privacy-Preserving Auditing for Attribute-Based Credentials.
IACR Cryptol. ePrint Arch., 2014

Memento: How to Reconstruct your Secrets from a Single Password in a Hostile Environment.
IACR Cryptol. ePrint Arch., 2014

Formal Treatment of Privacy-Enhancing Credential Systems.
IACR Cryptol. ePrint Arch., 2014

2013
Authentisierung mit der Open eCard App.
Datenschutz und Datensicherheit, 2013

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication.
Proceedings of the Policies and Research in Identity Management, 2013

2012
Electronic Identities Need Private Credentials.
IEEE Secur. Priv., 2012

2011
History-Free Sequential Aggregate Signatures.
IACR Cryptol. ePrint Arch., 2011

On the Joint Security of Encryption and Signature in EMV.
IACR Cryptol. ePrint Arch., 2011

2010
On the security of hash function combiners.
PhD thesis, 2010

Random Oracles in a Quantum World.
IACR Cryptol. ePrint Arch., 2010

Random Oracles in a Quantum World
CoRR, 2010

Delayed-Key Message Authentication for Streams.
Proceedings of the Theory of Cryptography, 7th Theory of Cryptography Conference, 2010

History-Free Aggregate Message Authentication Codes.
Proceedings of the Security and Cryptography for Networks, 7th International Conference, 2010

Unlinkability of Sanitizable Signatures.
Proceedings of the Public Key Cryptography, 2010

Hash Function Combiners in TLS and SSL.
Proceedings of the Topics in Cryptology, 2010

Random Oracles with(out) Programmability.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.
Proceedings of the Progress in Cryptology, 2010

2009
Security of Sanitizable Signatures Revisited.
Proceedings of the Public Key Cryptography, 2009

Santizable Signatures: How to Partially Delegate Control for Authenticated Data.
Proceedings of the BIOSIG 2009, 2009

A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.
Proceedings of the Advances in Cryptology, 2009

2008
Multi-property Preserving Combiners for Hash Functions.
Proceedings of the Theory of Cryptography, Fifth Theory of Cryptography Conference, 2008

Robust Multi-property Combiners for Hash Functions Revisited.
Proceedings of the Automata, Languages and Programming, 35th International Colloquium, 2008

2007
Security of Invertible Media Authentication Schemes Revisited.
Proceedings of the Information Hiding, 9th International Workshop, 2007

Security-Amplifying Combiners for Collision-Resistant Hash Functions.
Proceedings of the Advances in Cryptology, 2007


  Loading...