Maria Dubovitskaya
Maria Dubovitskaya
DFINITY Research
Geverifieerd e-mailadres voor dfinity.org
Titel
Geciteerd door
Geciteerd door
Jaar
Oblivious transfer with access control
J Camenisch, M Dubovitskaya, G Neven
Proceedings of the 16th ACM conference on Computer and communications …, 2009
218*2009
Unlinkable priced oblivious transfer with rechargeable wallets
J Camenisch, M Dubovitskaya, G Neven
International Conference on Financial Cryptography and Data Security, 66-81, 2010
612010
Composable and modular anonymous credentials: Definitions and practical constructions
J Camenisch, M Dubovitskaya, K Haralambiev, M Kohlweiss
International Conference on the Theory and Application of Cryptology and …, 2015
602015
Oblivious transfer with hidden access control policies
J Camenisch, M Dubovitskaya, G Neven, GM Zaverucha
International Workshop on Public Key Cryptography, 192-209, 2011
572011
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, A Lehmann, G Neven, C Paquin, ...
IFIP Working Conference on Policies and Research in Identity Management, 34-52, 2013
512013
Accumulators with applications to anonymity-preserving revocation
F Baldimtsi, J Camenisch, M Dubovitskaya, A Lysyanskaya, L Reyzin, ...
2017 IEEE European Symposium on Security and Privacy (EuroS&P), 301-315, 2017
422017
Oblivious transfer with hidden access control from attribute-based encryption
J Camenisch, M Dubovitskaya, RR Enderlein, G Neven
International Conference on Security and Cryptography for Networks, 559-579, 2012
412012
Practical UC-secure delegatable credentials with attributes and their application to blockchain
J Camenisch, M Drijvers, M Dubovitskaya
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications …, 2017
372017
Concepts and languages for privacy-preserving attribute-based authentication
J Camenisch, M Dubovitskaya, RR Enderlein, A Lehmann, G Neven, ...
Journal of information security and applications 19 (1), 25-44, 2014
272014
Efficient structure-preserving signature scheme from standard assumptions
J Camenisch, M Dubovitskaya, K Haralambiev
International Conference on Security and Cryptography for Networks, 76-94, 2012
262012
D2. 2 Architecture for attribute-based credential technologies-final version
P Bichsel, J Camenisch, M Dubovitskaya, R Enderlein, S Krenn, I Krontiris, ...
ABC4TRUST project deliverable. Available online at https://abc4trust. eu …, 2014
162014
Oblivious transfer with hidden access control lists
JL Cameniisch, M Dubovitskaya, G Neven, G Zaverucha
US Patent 8,577,029, 2013
162013
Universally composable adaptive oblivious transfer (with access control) from standard assumptions
M Abe, J Camenisch, M Dubovitskaya, R Nishimaki
Proceedings of the 2013 ACM workshop on Digital identity management, 1-12, 2013
152013
UC commitments for modular protocol design and applications to revocation and attribute tokens
J Camenisch, M Dubovitskaya, A Rial
Annual International Cryptology Conference, 208-239, 2016
112016
On Efficient Non-Interactive Oblivious Transfer with Tamper-Proof Hardware.
M Dubovitskaya, A Scafuro, I Visconti
IACR Cryptol. ePrint Arch. 2010, 509, 2010
112010
Flexible revocation of credentials
JL Camenisch, M Dubovitskaya, AR Duran
US Patent 9,906,512, 2018
92018
Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies-Final …
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
82015
An architecture for privacy-ABCs
P Bichsel, J Camenisch, M Dubovitskaya, RR Enderlein, S Krenn, ...
Attribute-Based Credentials for Trust, 11-78, 2015
82015
On the impossibility of structure-preserving deterministic primitives
M Abe, J Camenisch, R Dowsley, M Dubovitskaya
Theory of Cryptography Conference, 713-738, 2014
82014
Privacy-preserving auditable token payments in a permissioned blockchain system
E Androulaki, J Camenisch, AD Caro, M Dubovitskaya, K Elkhiyaoui, ...
Proceedings of the 2nd ACM Conference on Advances in Financial Technologies …, 2020
72020
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20