We present a secure e-commerce architecture that is resistant to client compromise and man-in-the-middle attacks on SSL. To this end, we propose several security protocols that us...
It is well known that universally composable multiparty computation cannot, in general, be achieved in the standard model without setup assumptions when the adversary can corrupt a...
This paper is concerned with key escrow protocols for use in international communications environments, where communication domains do not necessarily trust one another. It is conc...
This paper examines a model of trusted computing wherein a computing platform is able to make assertions about its current software configuration that may be trusted by the user ...
In this paper we present the first public key encryption scheme that is structure preserving, i.e., our encryption scheme uses only algebraic operations. In particular it does not...
Jan Camenisch, Kristiyan Haralambiev, Markulf Kohl...