Anna Lysyanskaya - Publications

Affiliations: 
Computer Science Brown University, Providence, RI 
Area:
Security and Cryptography

39 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2014 Chase M, Kohlweiss M, Lysyanskaya A, Meiklejohn S. Malleable signatures: New definitions and delegatable anonymous credentials Proceedings of the Computer Security Foundations Workshop. 2014: 199-213. DOI: 10.1109/CSF.2014.22  0.361
2014 Dachman-Soled D, Fleischhacker N, Katz J, Lysyanskaya A, Schröder D. Feasibility and infeasibility of secure computation with malicious PUFs Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8617: 405-420. DOI: 10.1007/S00145-019-09329-9  0.508
2013 Baldimtsi F, Lysyanskaya A. Anonymous credentials light Proceedings of the Acm Conference On Computer and Communications Security. 1087-1098. DOI: 10.1145/2508859.2516687  0.383
2013 Chase M, Healy A, Lysyanskaya A, Malkin T, Reyzin L. Mercurial commitments with applications to zero-knowledge sets Journal of Cryptology. 26: 251-279. DOI: 10.1007/S00145-012-9122-9  0.337
2013 Baldimtsi F, Lysyanskaya A. On the security of one-witness blind signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8270: 82-99. DOI: 10.1007/978-3-642-42045-0_5  0.362
2013 Hinterwälder G, Zenger CT, Baldimtsi F, Lysyanskaya A, Paar C, Burleson WP. Efficient e-cash in practice: NFC-based payments for public transportation systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7981: 40-59. DOI: 10.1007/978-3-642-39077-7_3  0.499
2013 Chase M, Kohlweiss M, Lysyanskaya A, Meiklejohn S. Verifiable elections that scale for free Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7778: 479-496. DOI: 10.1007/978-3-642-36362-7_29  0.461
2012 Camenisch J, Lysyanskaya A, Neven G. Practical yet universally composable two-server password-authenticated secret sharing Proceedings of the Acm Conference On Computer and Communications Security. 525-536. DOI: 10.1145/2382196.2382252  0.51
2012 Küpçü A, Lysyanskaya A. Usable optimistic fair exchange Computer Networks. 56: 50-63. DOI: 10.1016/J.Comnet.2011.08.005  0.577
2012 Chase M, Kohlweiss M, Lysyanskaya A, Meiklejohn S. Malleable proof systems and applications Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7237: 281-300. DOI: 10.1007/978-3-642-29011-4_18  0.307
2010 Lysyanskaya A, Tamassia R, Triandopoulos N. Authenticated error-correcting codes with applications to multicast authentication Acm Transactions On Information and System Security. 13. DOI: 10.1145/1698750.1698757  0.414
2010 Liu FH, Lysyanskaya A. Algorithmic tamper-proof security under probing attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 6280: 106-120. DOI: 10.1007/978-3-642-15317-4_8  0.334
2009 Yao D, Fazio N, Dodis Y, Lysyanskaya A. Forward-secure hierarchical IBE with applications to broadcast encryption Cryptology and Information Security Series. 2: 100-118. DOI: 10.3233/978-1-58603-947-9-100  0.445
2009 Belenkiy M, Camenisch J, Chase M, Kohlweiss M, Lysyanskaya A, Shacham H. Randomizable proofs and delegatable anonymous credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5677: 108-125. DOI: 10.1007/978-3-642-03356-8_7  0.338
2009 Belenkiy M, Chase M, Kohlweiss M, Lysyanskaya A. Compact E-cash and simulatable VRFs revisited Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 5671: 114-131. DOI: 10.1007/978-3-642-03298-1_9  0.378
2008 Lysyanskaya A. How to keep secrets safe. Scientific American. 299: 88-95. PMID 18783057 DOI: 10.1038/Scientificamerican0908-88  0.449
2008 Belenkiy M, Chase M, Kohlweiss M, Lysyanskaya A. P-signatures and noninteractive anonymous credentials Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4948: 356-374. DOI: 10.1007/978-3-540-78524-8_20  0.383
2007 Belenkiy M, Chase M, Erway CC, Jannotti J, Küpçü A, Lysyanskaya A, Rachlin E. Making P2P accountable without losing privacy Wpes'07 - Proceedings of the 2007 Acm Workshop On Privacy in Electronic Society. 31-40. DOI: 10.1145/1314333.1314339  0.357
2007 Camenisch J, Lysyanskaya A, Meyerovich M. Endorsed e-cash Proceedings - Ieee Symposium On Security and Privacy. 101-115. DOI: 10.1109/SP.2007.15  0.464
2007 Lysyanskaya A. Authentication without identification Ieee Security and Privacy. 5: 69-71. DOI: 10.1109/MSP.2007.52  0.385
2006 Lindell Y, Lysyanskaya A, Rabin T. On the composition of authenticated Byzantine Agreement Journal of the Acm. 53: 881-917. DOI: 10.1145/1217856.1217857  0.54
2006 Camenisch J, Hohenberger S, Kohlweiss M, Lysyanskaya A, Meyerovich M. How to win the clonewars: Efficient periodic n-times anonymous authentication Proceedings of the Acm Conference On Computer and Communications Security. 201-210. DOI: 10.1145/1180405.1180431  0.632
2006 Camenisch J, Hohenberger S, Lysyanskaya A. Balancing accountability and privacy using E-cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 4116: 141-155.  0.649
2006 Camenisch J, Lysyanskaya A. A formal treatment of onion routing Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3621: 169-187.  0.426
2005 Hohenberger S, Lysyanskaya A. How to securely outsource cryptographic computations Lecture Notes in Computer Science. 3378: 264-282.  0.626
2004 Lysyanskaya A, Tamassia R, Triandopoulos N. Multicast authentication in fully adversarial networks Proceedings - Ieee Symposium On Security and Privacy. 2004: 241-255. DOI: 10.1109/SECPRI.2004.1301327  0.375
2004 Lysyanskaya A, Malkin T, Micali S, Rabin T. Algorithmic tamper-proof (ATP) security: Theoretical foundations for security against hardware tampering Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2951: 258-277.  0.407
2004 Yao D, Dodis Y, Fazio N, Lysyanskaya A. ID-based encryption for complex hierarchies with applications to forward security and broadcast encryption Proceedings of the Acm Conference On Computer and Communications Security. 354-363.  0.442
2004 Camenisch J, Lysyanskaya A. Signature Schemes and Anonymous Credentials from Bilinear Maps Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 3152: 56-72.  0.38
2003 Camenisch J, Lysyanskaya A. A signature scheme with efficient protocols Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2576: 268-289.  0.407
2002 Cachin C, Kursawe K, Lysyanskaya A. Asynchronous verifiable secret sharing and proactive cryptosystems Proceedings of the Acm Conference On Computer and Communications Security. 88-97.  0.368
2002 Lindell Y, Lysyanskaya A, Rabin T. Sequential composition of protocols without simultaneous termination Proceedings of the Annual Acm Symposium On Principles of Distributed Computing. 203-212.  0.365
2002 Lysyanskaya A. Unique signatures and verifiable random functions from the DH-DDH separation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2442: 597-612.  0.35
2001 Camenisch J, Lysyanskaya A. An identity escrow scheme with appointed verifiers Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2139: 388-407.  0.403
2001 Lysyanskaya A, Peikert C. Adaptive security in the threshold setting: From cryptosystems to signature schemes Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2248: 331-350.  0.412
2001 Camenisch J, Lysyanskaya A. An efficient system for non-transferable anonymous credentials with optional anonymity revocation Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 2045: 93-118.  0.464
2000 Jarecki S, Lysyanskaya A. Adaptively secure threshold cryptography: Introducing concurrency, removing erasures Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1807: 221-242.  0.439
2000 Lysyanskaya A, Rivest RL, Sahai A, Wolf S. Pseudonym systems Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1758: 184-199.  0.366
1998 Lysyanskaya A, Ramzan Z. Group blind digital signatures: A scalable solution to electronic cash Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 1465: 184-197. DOI: 10.1007/BFb0055483  0.344
Show low-probability matches.