D-Index & Metrics Best Publications

D-Index & Metrics

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 64 Citations 24,154 224 World Ranking 1212 National Ranking 36

Research.com Recognitions

Awards & Achievements

2018 - ACM Fellow For contributions to privacy-enhancing cryptographic protocols and leadership in their practical realization

2013 - Edward J. McCluskey Technical Achievement Award, IEEE Computer Society For pioneering theoretical work on privacy-enhancing cryptographic protocols and leadership in their practical realization

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • The Internet
  • Cryptography

Jan Camenisch focuses on Computer security, Theoretical computer science, Ring signature, Group signature and Cryptography. His research in Encryption, Random oracle, Authentication, Cryptographic protocol and Credential are components of Computer security. Jan Camenisch combines subjects such as Access structure, Proof of knowledge and Public-key cryptography with his study of Theoretical computer science.

His Ring signature research includes elements of Signature, Schnorr signature, Blind signature and Commitment scheme. The various areas that Jan Camenisch examines in his Group signature study include Discrete logarithm and Group. His Cryptography research includes themes of Trusted third party and Key size.

His most cited work include:

  • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation (1005 citations)
  • Efficient Group Signature Schemes for Large Groups (Extended Abstract) (818 citations)
  • Direct anonymous attestation (800 citations)

What are the main themes of his work throughout his whole career to date?

His main research concerns Computer security, Cryptography, Encryption, Theoretical computer science and Credential. His study in Computer security is interdisciplinary in nature, drawing from both Revocation and Internet privacy. His studies deal with areas such as Cryptographic protocol, Mathematical proof, Group signature, Proof of knowledge and Scheme as well as Theoretical computer science.

His work deals with themes such as Discrete logarithm, Group and Ring signature, which intersect with Group signature. His Ring signature study combines topics in areas such as Random oracle and Schnorr signature, Blind signature. His Credential research incorporates themes from Security token and Set.

He most often published in these fields:

  • Computer security (48.62%)
  • Cryptography (21.23%)
  • Encryption (20.00%)

What were the highlights of his more recent work (between 2015-2021)?

  • Encryption (20.00%)
  • Computer security (48.62%)
  • Computer network (8.92%)

In recent papers he was focusing on the following fields of study:

Jan Camenisch spends much of his time researching Encryption, Computer security, Computer network, Theoretical computer science and Cryptography. His Encryption study deals with Cryptographic primitive intersecting with Trusted third party and Dictionary attack. His study ties his expertise on Scheme together with the subject of Computer security.

In the field of Computer network, his study on Identifier, Server and Node overlaps with subjects such as Leakage. His research investigates the connection with Theoretical computer science and areas like Cryptographic protocol which intersect with concerns in Provable security, Verifiable secret sharing and Modular design. In his study, Message encoding and Homomorphic encryption is strongly linked to Signature, which falls under the umbrella field of Cryptography.

Between 2015 and 2021, his most popular works were:

  • Practical UC-Secure Delegatable Credentials with Attributes and Their Application to Blockchain (32 citations)
  • Universally Composable Direct Anonymous Attestation (32 citations)
  • Chameleon-Hashes with Ephemeral Trapdoors (30 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • The Internet
  • Cryptography

Computer security, Scheme, Cryptography, Theoretical computer science and Encryption are his primary areas of study. His research in the fields of Credential and Authentication overlaps with other disciplines such as Pseudonym. His Scheme study integrates concerns from other disciplines, such as Random oracle, Set and Ideal.

His Cryptography research is multidisciplinary, relying on both Signature, Mathematical proof, Host and Direct Anonymous Attestation. Jan Camenisch has included themes like Cryptographic protocol and Cryptographic primitive in his Encryption study. His biological study spans a wide range of topics, including Group signature, Public-key cryptography and Lattice.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation

Jan Camenisch;Anna Lysyanskaya.
theory and application of cryptographic techniques (2001)

1506 Citations

Efficient Group Signature Schemes for Large Groups (Extended Abstract)

Jan Camenisch;Markus Stadler.
international cryptology conference (1997)

1279 Citations

A Practical and Provably Secure Coalition-Resistant Group Signature Scheme

Giuseppe Ateniese;Jan Camenisch;Marc Joye;Gene Tsudik.
international cryptology conference (2000)

1213 Citations

Direct anonymous attestation

Ernie Brickell;Jan Camenisch;Liqun Chen.
computer and communications security (2004)

1193 Citations

Signature Schemes and Anonymous Credentials from Bilinear Maps

Jan Camenisch;Anna Lysyanskaya.
international cryptology conference (2004)

1037 Citations

Dynamic accumulators and application to efficient revocation of anonymous credentials

Jan Camenisch;Anna Lysyanskaya.
Lecture Notes in Computer Science (2002)

964 Citations

Efficient group signature schemes for large groups

J. Camenisch;M. Stadler.
Lecture Notes in Computer Science (1997)

946 Citations

A signature scheme with efficient protocols

Jan Camenisch;Anna Lysyanskaya.
international workshop on security (2002)

859 Citations

Design and implementation of the idemix anonymous credential system

Jan Camenisch;Els Van Herreweghen.
computer and communications security (2002)

728 Citations

Practical Verifiable Encryption and Decryption of Discrete Logarithms

Jan Camenisch;Victor Shoup.
international cryptology conference (2003)

593 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Jan Camenisch

Willy Susilo

Willy Susilo

University of Wollongong

Publications: 117

Yi Mu

Yi Mu

Fujian Normal University

Publications: 103

Man Ho Au

Man Ho Au

University of Hong Kong

Publications: 66

Liqun Chen

Liqun Chen

University of Surrey

Publications: 62

Joseph K. Liu

Joseph K. Liu

Monash University

Publications: 58

Benoît Libert

Benoît Libert

École Normale Supérieure de Lyon

Publications: 48

Ahmad-Reza Sadeghi

Ahmad-Reza Sadeghi

TU Darmstadt

Publications: 47

Moti Yung

Moti Yung

Columbia University

Publications: 47

Gene Tsudik

Gene Tsudik

University of California, Irvine

Publications: 46

Roberto Tamassia

Roberto Tamassia

Brown University

Publications: 42

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 40

Dan Boneh

Dan Boneh

Stanford University

Publications: 38

Huaxiong Wang

Huaxiong Wang

Nanyang Technological University

Publications: 38

Markulf Kohlweiss

Markulf Kohlweiss

University of Edinburgh

Publications: 36

Robert H. Deng

Robert H. Deng

Singapore Management University

Publications: 33

Xiaofeng Chen

Xiaofeng Chen

Xidian University

Publications: 33

Something went wrong. Please try again later.