[{"_id":"45901","intvolume":" 412","citation":{"mla":"Blömer, Johannes, et al. “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems.” On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–46, doi:10.5281/zenodo.8068755.","bibtex":"@inbook{Blömer_Bobolz_Eidens_Jager_Kramer_2023, place={Paderborn}, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems}, volume={412}, DOI={10.5281/zenodo.8068755}, booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets}, publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes and Bobolz, Jan and Eidens, Fabian and Jager, Tibor and Kramer, Paul}, editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco and Wachsmuth, Henning and Wehrheim, Heike}, year={2023}, pages={237–246}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts} }","chicago":"Blömer, Johannes, Jan Bobolz, Fabian Eidens, Tibor Jager, and Paul Kramer. “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems.” In On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:237–46. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. https://doi.org/10.5281/zenodo.8068755.","ama":"Blömer J, Bobolz J, Eidens F, Jager T, Kramer P. Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems. In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:237-246. doi:10.5281/zenodo.8068755","apa":"Blömer, J., Bobolz, J., Eidens, F., Jager, T., & Kramer, P. (2023). Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems. In C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, & H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-services in dynamic markets (Vol. 412, pp. 237–246). Heinz Nixdorf Institut, Universität Paderborn. https://doi.org/10.5281/zenodo.8068755","ieee":"J. Blömer, J. Bobolz, F. Eidens, T. Jager, and P. Kramer, “Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems,” in On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 237–246.","short":"J. Blömer, J. Bobolz, F. Eidens, T. Jager, P. Kramer, in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 237–246."},"type":"book_chapter","year":"2023","page":"237-246","user_id":"477","ddc":["004"],"has_accepted_license":"1","status":"public","date_created":"2023-07-07T08:41:44Z","volume":412,"file":[{"file_size":5944790,"creator":"florida","file_id":"45902","date_updated":"2023-07-07T11:13:37Z","content_type":"application/pdf","relation":"main_file","date_created":"2023-07-07T08:41:35Z","file_name":"T2-Chapter-SFB-Buch-Final.pdf","access_level":"open_access"}],"publisher":"Heinz Nixdorf Institut, Universität Paderborn","author":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"},{"id":"27207","last_name":"Bobolz","full_name":"Bobolz, Jan","first_name":"Jan"},{"last_name":"Eidens","id":"25078","first_name":"Fabian","full_name":"Eidens, Fabian"},{"id":"64669","last_name":"Jager","full_name":"Jager, Tibor","first_name":"Tibor"},{"last_name":"Kramer","id":"64594","first_name":"Paul","full_name":"Kramer, Paul"}],"publication":"On-The-Fly Computing -- Individualized IT-services in dynamic markets","file_date_updated":"2023-07-07T11:13:37Z","oa":"1","doi":"10.5281/zenodo.8068755","date_updated":"2023-07-07T11:13:37Z","language":[{"iso":"eng"}],"series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts","title":"Practical Cryptograhic Techniques for Secure and Privacy-Preserving Customer Loyalty Systems","place":"Paderborn","project":[{"grant_number":"160364472","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","_id":"1"},{"name":"SFB 901 - T: SFB 901 - Project Area T","_id":"82"},{"name":"SFB 901 - T2: SFB 901 -Subproject T2","_id":"84"}],"editor":[{"full_name":"Haake, Claus-Jochen","first_name":"Claus-Jochen","last_name":"Haake"},{"first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm","last_name":"Meyer auf der Heide"},{"last_name":"Platzner","full_name":"Platzner, Marco","first_name":"Marco"},{"full_name":"Wachsmuth, Henning","first_name":"Henning","last_name":"Wachsmuth"},{"full_name":"Wehrheim, Heike","first_name":"Heike","last_name":"Wehrheim"}],"department":[{"_id":"7"}]},{"type":"book_chapter","citation":{"bibtex":"@inbook{Blömer_Eidens_Jager_Niehues_Scheideler_2023, place={Paderborn}, series={Verlagsschriftenreihe des Heinz Nixdorf Instituts}, title={Robustness and Security}, volume={412}, DOI={10.5281/zenodo.8068629}, booktitle={On-The-Fly Computing -- Individualized IT-services in dynamic markets}, publisher={Heinz Nixdorf Institut, Universität Paderborn}, author={Blömer, Johannes and Eidens, Fabian and Jager, Tibor and Niehues, David and Scheideler, Christian}, editor={Haake, Claus-Jochen and Meyer auf der Heide, Friedhelm and Platzner, Marco and Wachsmuth, Henning and Wehrheim, Heike}, year={2023}, pages={145–164}, collection={Verlagsschriftenreihe des Heinz Nixdorf Instituts} }","mla":"Blömer, Johannes, et al. “Robustness and Security.” On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake et al., vol. 412, Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–64, doi:10.5281/zenodo.8068629.","chicago":"Blömer, Johannes, Fabian Eidens, Tibor Jager, David Niehues, and Christian Scheideler. “Robustness and Security.” In On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, edited by Claus-Jochen Haake, Friedhelm Meyer auf der Heide, Marco Platzner, Henning Wachsmuth, and Heike Wehrheim, 412:145–64. Verlagsschriftenreihe Des Heinz Nixdorf Instituts. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023. https://doi.org/10.5281/zenodo.8068629.","apa":"Blömer, J., Eidens, F., Jager, T., Niehues, D., & Scheideler, C. (2023). Robustness and Security. In C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, & H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-services in dynamic markets (Vol. 412, pp. 145–164). Heinz Nixdorf Institut, Universität Paderborn. https://doi.org/10.5281/zenodo.8068629","ama":"Blömer J, Eidens F, Jager T, Niehues D, Scheideler C. Robustness and Security. In: Haake C-J, Meyer auf der Heide F, Platzner M, Wachsmuth H, Wehrheim H, eds. On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets. Vol 412. Verlagsschriftenreihe des Heinz Nixdorf Instituts. Heinz Nixdorf Institut, Universität Paderborn; 2023:145-164. doi:10.5281/zenodo.8068629","ieee":"J. Blömer, F. Eidens, T. Jager, D. Niehues, and C. Scheideler, “Robustness and Security,” in On-The-Fly Computing -- Individualized IT-services in dynamic markets, vol. 412, C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, and H. Wehrheim, Eds. Paderborn: Heinz Nixdorf Institut, Universität Paderborn, 2023, pp. 145–164.","short":"J. Blömer, F. Eidens, T. Jager, D. Niehues, C. Scheideler, in: C.-J. Haake, F. Meyer auf der Heide, M. Platzner, H. Wachsmuth, H. Wehrheim (Eds.), On-The-Fly Computing -- Individualized IT-Services in Dynamic Markets, Heinz Nixdorf Institut, Universität Paderborn, Paderborn, 2023, pp. 145–164."},"year":"2023","page":"145-164","_id":"45891","intvolume":" 412","publisher":"Heinz Nixdorf Institut, Universität Paderborn","author":[{"last_name":"Blömer","id":"23","first_name":"Johannes","full_name":"Blömer, Johannes"},{"last_name":"Eidens","id":"25078","first_name":"Fabian","full_name":"Eidens, Fabian"},{"first_name":"Tibor","full_name":"Jager, Tibor","last_name":"Jager","id":"64669"},{"id":"36113","last_name":"Niehues","full_name":"Niehues, David","first_name":"David"},{"first_name":"Christian","full_name":"Scheideler, Christian","last_name":"Scheideler","id":"20792"}],"file_date_updated":"2023-07-07T11:18:21Z","publication":"On-The-Fly Computing -- Individualized IT-services in dynamic markets","file":[{"access_level":"open_access","date_created":"2023-07-07T08:08:37Z","file_name":"C1-Chapter-SFB-Buch-Final.pdf","relation":"main_file","content_type":"application/pdf","date_updated":"2023-07-07T11:18:21Z","creator":"florida","file_id":"45892","file_size":320980}],"volume":412,"status":"public","has_accepted_license":"1","date_created":"2023-07-07T08:08:47Z","ddc":["004"],"user_id":"477","series_title":"Verlagsschriftenreihe des Heinz Nixdorf Instituts","language":[{"iso":"eng"}],"date_updated":"2023-07-07T11:18:21Z","doi":"10.5281/zenodo.8068629","oa":"1","department":[{"_id":"7"}],"editor":[{"full_name":"Haake, Claus-Jochen","first_name":"Claus-Jochen","last_name":"Haake"},{"last_name":"Meyer auf der Heide","first_name":"Friedhelm","full_name":"Meyer auf der Heide, Friedhelm"},{"last_name":"Platzner","first_name":"Marco","full_name":"Platzner, Marco"},{"full_name":"Wachsmuth, Henning","first_name":"Henning","last_name":"Wachsmuth"},{"last_name":"Wehrheim","first_name":"Heike","full_name":"Wehrheim, Heike"}],"project":[{"grant_number":"160364472","name":"SFB 901: SFB 901: On-The-Fly Computing - Individualisierte IT-Dienstleistungen in dynamischen Märkten ","_id":"1"},{"_id":"4","name":"SFB 901 - C: SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"place":"Paderborn","title":"Robustness and Security"},{"title":"Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials","user_id":"25078","department":[{"_id":"64"}],"author":[{"full_name":"Eidens, Fabian","first_name":"Fabian","id":"25078","last_name":"Eidens"}],"date_created":"2023-01-04T09:01:48Z","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"_id":"82","name":"SFB 901 - T: SFB 901 - Project Area T"},{"name":"SFB 901 - T2: SFB 901 -Subproject T2","_id":"84"}],"status":"public","date_updated":"2023-02-08T21:07:41Z","_id":"35188","doi":"10.17619/UNIPB/1-1653","type":"dissertation","citation":{"mla":"Eidens, Fabian. Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials. 2022, doi:10.17619/UNIPB/1-1653.","bibtex":"@book{Eidens_2022, title={Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials}, DOI={10.17619/UNIPB/1-1653}, author={Eidens, Fabian}, year={2022} }","apa":"Eidens, F. (2022). Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials. https://doi.org/10.17619/UNIPB/1-1653","ama":"Eidens F. Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials.; 2022. doi:10.17619/UNIPB/1-1653","chicago":"Eidens, Fabian. Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022. https://doi.org/10.17619/UNIPB/1-1653.","ieee":"F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials. 2022.","short":"F. Eidens, Privacy-Preserving Cryptography: Attribute-Based Signatures and Updatable Credentials, 2022."},"year":"2022","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","last_name":"Blömer","id":"23"}],"language":[{"iso":"eng"}]},{"oa":"1","date_updated":"2022-11-18T09:38:42Z","_id":"26645","year":"2021","citation":{"ieee":"J. Bobolz, F. Eidens, R. Heitjohann, and J. Fell, “Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes.” IACR eprint, 2021.","short":"J. Bobolz, F. Eidens, R. Heitjohann, J. Fell, (2021).","mla":"Bobolz, Jan, et al. Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes. IACR eprint, 2021.","bibtex":"@article{Bobolz_Eidens_Heitjohann_Fell_2021, title={Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes}, publisher={IACR eprint}, author={Bobolz, Jan and Eidens, Fabian and Heitjohann, Raphael and Fell, Jeremy}, year={2021} }","chicago":"Bobolz, Jan, Fabian Eidens, Raphael Heitjohann, and Jeremy Fell. “Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes.” IACR eprint, 2021.","apa":"Bobolz, J., Eidens, F., Heitjohann, R., & Fell, J. (2021). Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes. IACR eprint.","ama":"Bobolz J, Eidens F, Heitjohann R, Fell J. Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes. Published online 2021."},"type":"preprint","language":[{"iso":"eng"}],"main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2021/961"}],"title":"Cryptimeleon: A Library for Fast Prototyping of Privacy-Preserving Cryptographic Schemes","user_id":"477","status":"public","date_created":"2021-10-21T07:51:32Z","project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"name":"SFB 901 - Project Area T","_id":"82"},{"name":"SFB 901 -Subproject T2","_id":"84"},{"name":"SFB 901: SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"author":[{"id":"27207","last_name":"Bobolz","full_name":"Bobolz, Jan","first_name":"Jan"},{"id":"25078","last_name":"Eidens","full_name":"Eidens, Fabian","first_name":"Fabian"},{"last_name":"Heitjohann","first_name":"Raphael","full_name":"Heitjohann, Raphael"},{"last_name":"Fell","full_name":"Fell, Jeremy","first_name":"Jeremy"}],"publisher":"IACR eprint","department":[{"_id":"64"}]},{"language":[{"iso":"eng"}],"year":"2021","type":"conference","citation":{"bibtex":"@inproceedings{Bobolz_Eidens_Krenn_Ramacher_Samelin_2021, place={Cham}, title={Issuer-Hiding Attribute-Based Credentials}, DOI={10.1007/978-3-030-92548-2_9}, booktitle={Cryptology and Network Security}, publisher={Springer International Publishing}, author={Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Ramacher, Sebastian and Samelin, Kai}, year={2021} }","mla":"Bobolz, Jan, et al. “Issuer-Hiding Attribute-Based Credentials.” Cryptology and Network Security, Springer International Publishing, 2021, doi:10.1007/978-3-030-92548-2_9.","ama":"Bobolz J, Eidens F, Krenn S, Ramacher S, Samelin K. Issuer-Hiding Attribute-Based Credentials. In: Cryptology and Network Security. Springer International Publishing; 2021. doi:10.1007/978-3-030-92548-2_9","apa":"Bobolz, J., Eidens, F., Krenn, S., Ramacher, S., & Samelin, K. (2021). Issuer-Hiding Attribute-Based Credentials. Cryptology and Network Security. https://doi.org/10.1007/978-3-030-92548-2_9","chicago":"Bobolz, Jan, Fabian Eidens, Stephan Krenn, Sebastian Ramacher, and Kai Samelin. “Issuer-Hiding Attribute-Based Credentials.” In Cryptology and Network Security. Cham: Springer International Publishing, 2021. https://doi.org/10.1007/978-3-030-92548-2_9.","ieee":"J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, and K. Samelin, “Issuer-Hiding Attribute-Based Credentials,” 2021, doi: 10.1007/978-3-030-92548-2_9.","short":"J. Bobolz, F. Eidens, S. Krenn, S. Ramacher, K. Samelin, in: Cryptology and Network Security, Springer International Publishing, Cham, 2021."},"_id":"29566","date_updated":"2022-01-27T13:02:23Z","doi":"10.1007/978-3-030-92548-2_9","publisher":"Springer International Publishing","author":[{"id":"27207","last_name":"Bobolz","full_name":"Bobolz, Jan","first_name":"Jan"},{"id":"25078","last_name":"Eidens","full_name":"Eidens, Fabian","first_name":"Fabian"},{"first_name":"Stephan","full_name":"Krenn, Stephan","last_name":"Krenn"},{"last_name":"Ramacher","full_name":"Ramacher, Sebastian","first_name":"Sebastian"},{"first_name":"Kai","full_name":"Samelin, Kai","last_name":"Samelin"}],"publication":"Cryptology and Network Security","department":[{"_id":"7"},{"_id":"64"}],"status":"public","date_created":"2022-01-27T13:00:21Z","project":[{"_id":"1","name":"SFB 901: SFB 901"},{"name":"SFB 901 - C: SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - C1: SFB 901 - Subproject C1"}],"publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783030925475","9783030925482"]},"publication_status":"published","place":"Cham","user_id":"27207","title":"Issuer-Hiding Attribute-Based Credentials"},{"ddc":["000"],"user_id":"477","publication":"Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),","file_date_updated":"2020-04-09T09:59:03Z","publisher":"ACM","author":[{"first_name":"Jan","full_name":"Bobolz, Jan","last_name":"Bobolz","id":"27207"},{"last_name":"Eidens","id":"25078","first_name":"Fabian","full_name":"Eidens, Fabian"},{"last_name":"Krenn","full_name":"Krenn, Stephan","first_name":"Stephan"},{"full_name":"Slamanig, Daniel","first_name":"Daniel","last_name":"Slamanig"},{"full_name":"Striecks, Christoph","first_name":"Christoph","last_name":"Striecks"}],"file":[{"date_created":"2020-04-09T09:59:03Z","file_name":"main.pdf","access_level":"closed","creator":"feidens","file_id":"16488","file_size":553623,"success":1,"relation":"main_file","date_updated":"2020-04-09T09:59:03Z","content_type":"application/pdf"}],"date_created":"2020-04-09T10:00:29Z","status":"public","has_accepted_license":"1","conference":{"name":"ASIA CCS'20","location":"Taiwan"},"_id":"16487","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2020/382"}],"year":"2020","citation":{"short":"J. Bobolz, F. Eidens, S. Krenn, D. Slamanig, C. Striecks, in: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), ACM, New York, NY, USA, 2020.","ieee":"J. Bobolz, F. Eidens, S. Krenn, D. Slamanig, and C. Striecks, “Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection,” in Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), Taiwan, 2020.","chicago":"Bobolz, Jan, Fabian Eidens, Stephan Krenn, Daniel Slamanig, and Christoph Striecks. “Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.” In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),. New York, NY, USA: ACM, 2020. https://doi.org/10.1145/3320269.3384769.","ama":"Bobolz J, Eidens F, Krenn S, Slamanig D, Striecks C. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),. New York, NY, USA: ACM; 2020. doi:10.1145/3320269.3384769","apa":"Bobolz, J., Eidens, F., Krenn, S., Slamanig, D., & Striecks, C. (2020). Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. In Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),. New York, NY, USA: ACM. https://doi.org/10.1145/3320269.3384769","bibtex":"@inproceedings{Bobolz_Eidens_Krenn_Slamanig_Striecks_2020, place={New York, NY, USA}, title={Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection}, DOI={10.1145/3320269.3384769}, booktitle={Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20),}, publisher={ACM}, author={Bobolz, Jan and Eidens, Fabian and Krenn, Stephan and Slamanig, Daniel and Striecks, Christoph}, year={2020} }","mla":"Bobolz, Jan, et al. “Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection.” Proceedings of the 15th ACM Asia Conference on Computer and Communications Security (ASIA CCS ’20), ACM, 2020, doi:10.1145/3320269.3384769."},"type":"conference","place":"New York, NY, USA","title":"Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 -Subproject T2","_id":"84"},{"name":"SFB 901 - Project Area T","_id":"82"}],"date_updated":"2022-01-06T06:52:51Z","doi":"10.1145/3320269.3384769","oa":"1","language":[{"iso":"eng"}]},{"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"department":[{"_id":"7"},{"_id":"64"}],"title":"Updatable Anonymous Credentials and Applications to Incentive Systems","language":[{"iso":"eng"}],"series_title":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19","oa":"1","doi":"10.1145/3319535.3354223","date_updated":"2023-01-10T10:25:27Z","status":"public","has_accepted_license":"1","date_created":"2019-10-18T08:09:44Z","file":[{"creator":"jbobolz","file_id":"13907","file_size":838949,"relation":"main_file","content_type":"application/pdf","date_updated":"2019-10-18T08:07:49Z","file_name":"full_eprinted_v2.pdf","date_created":"2019-10-18T08:07:49Z","access_level":"closed"}],"author":[{"full_name":"Blömer, Johannes","first_name":"Johannes","id":"23","last_name":"Blömer"},{"id":"27207","last_name":"Bobolz","full_name":"Bobolz, Jan","first_name":"Jan"},{"last_name":"Diemert","id":"44071","first_name":"Denis Pascal","full_name":"Diemert, Denis Pascal"},{"full_name":"Eidens, Fabian","first_name":"Fabian","id":"25078","last_name":"Eidens"}],"file_date_updated":"2019-10-18T08:07:49Z","publication":"Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS '19","user_id":"25078","ddc":["006"],"abstract":[{"lang":"eng","text":"In this paper, we introduce updatable anonymous credential systems (UACS) and use them to construct a new privacy-preserving incentive system. In a UACS, a user holding a credential certifying some attributes can interact with the corresponding issuer to update his attributes. During this, the issuer knows which update function is run, but does not learn the user's previous attributes. Hence the update process preserves anonymity of the user. One example for a class of update functions are additive updates of integer attributes, where the issuer increments an unknown integer attribute value v by some known value k. This kind of update is motivated by an application of UACS to incentive systems. Users in an incentive system can anonymously accumulate points, e.g. in a shop at checkout, and spend them later, e.g. for a discount."}],"year":"2019","citation":{"apa":"Blömer, J., Bobolz, J., Diemert, D. P., & Eidens, F. (2019). Updatable Anonymous Credentials and Applications to Incentive Systems. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. 26th ACM Conference on Computer and Communications Security, London. https://doi.org/10.1145/3319535.3354223","ama":"Blömer J, Bobolz J, Diemert DP, Eidens F. Updatable Anonymous Credentials and Applications to Incentive Systems. In: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. ; 2019. doi:10.1145/3319535.3354223","chicago":"Blömer, Johannes, Jan Bobolz, Denis Pascal Diemert, and Fabian Eidens. “Updatable Anonymous Credentials and Applications to Incentive Systems.” In Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019. https://doi.org/10.1145/3319535.3354223.","bibtex":"@inproceedings{Blömer_Bobolz_Diemert_Eidens_2019, series={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19}, title={Updatable Anonymous Credentials and Applications to Incentive Systems}, DOI={10.1145/3319535.3354223}, booktitle={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19}, author={Blömer, Johannes and Bobolz, Jan and Diemert, Denis Pascal and Eidens, Fabian}, year={2019}, collection={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19} }","mla":"Blömer, Johannes, et al. “Updatable Anonymous Credentials and Applications to Incentive Systems.” Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019, doi:10.1145/3319535.3354223.","short":"J. Blömer, J. Bobolz, D.P. Diemert, F. Eidens, in: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security - CCS ’19, 2019.","ieee":"J. Blömer, J. Bobolz, D. P. Diemert, and F. Eidens, “Updatable Anonymous Credentials and Applications to Incentive Systems,” presented at the 26th ACM Conference on Computer and Communications Security, London, 2019, doi: 10.1145/3319535.3354223."},"type":"conference","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2019/169.pdf"}],"_id":"13904","conference":{"end_date":"2019-11-15","name":"26th ACM Conference on Computer and Communications Security","start_date":"2019-11-11","location":"London"}},{"date_updated":"2022-01-06T06:58:12Z","oa":"1","doi":"10.1007/978-3-319-76953-0_25","language":[{"iso":"eng"}],"place":"Cham","title":"Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems","department":[{"_id":"7"},{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"publication_status":"published","publication_identifier":{"issn":["0302-9743","1611-3349"],"isbn":["9783319769523","9783319769530"]},"conference":{"end_date":"2018-04-20","name":"Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018","start_date":"2018-04-16","location":"San Francisco, CA, USA"},"_id":"2862","main_file_link":[{"url":"https://eprint.iacr.org/2018/029","open_access":"1"}],"page":"470-490","type":"conference","citation":{"ieee":"J. Blömer, F. Eidens, and J. Juhnke, “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems,” in Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, San Francisco, CA, USA, 2018, pp. 470–490.","short":"J. Blömer, F. Eidens, J. Juhnke, in: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, Cham, 2018, pp. 470–490.","bibtex":"@inproceedings{Blömer_Eidens_Juhnke_2018, place={Cham}, title={Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems}, DOI={10.1007/978-3-319-76953-0_25}, booktitle={Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings}, publisher={Springer International Publishing}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={470–490} }","mla":"Blömer, Johannes, et al. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, Springer International Publishing, 2018, pp. 470–90, doi:10.1007/978-3-319-76953-0_25.","apa":"Blömer, J., Eidens, F., & Juhnke, J. (2018). Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings (pp. 470–490). Cham: Springer International Publishing. https://doi.org/10.1007/978-3-319-76953-0_25","ama":"Blömer J, Eidens F, Juhnke J. Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems. In: Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings. Cham: Springer International Publishing; 2018:470-490. doi:10.1007/978-3-319-76953-0_25","chicago":"Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Practical, Anonymous, and Publicly Linkable Universally-Composable Reputation Systems.” In Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers’ Track at the {RSA} Conference 2018, Proceedings, 470–90. Cham: Springer International Publishing, 2018. https://doi.org/10.1007/978-3-319-76953-0_25."},"year":"2018","user_id":"477","ddc":["004"],"file":[{"access_level":"closed","file_name":"PracticalAnonymousAndPubliclyL.pdf","date_created":"2018-11-02T13:45:40Z","relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-11-02T13:45:40Z","creator":"ups","file_id":"5253","file_size":3371773}],"publication":"Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, Proceedings","file_date_updated":"2018-11-02T13:45:40Z","author":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"},{"last_name":"Eidens","id":"25078","first_name":"Fabian","full_name":"Eidens, Fabian"},{"id":"48090","last_name":"Juhnke","full_name":"Juhnke, Jakob","first_name":"Jakob"}],"publisher":"Springer International Publishing","date_created":"2018-05-24T11:14:02Z","has_accepted_license":"1","status":"public"},{"language":[{"iso":"eng"}],"date_updated":"2022-01-06T06:59:07Z","oa":"1","doi":"10.1145/3230833.3234517","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - Subproject C1"},{"_id":"44","name":"KogniHome - die mitdenkende Wohnung"}],"publication_identifier":{"isbn":["978-1-4503-6448-5"]},"publication_status":"accepted","place":"New York, NY, USA","related_material":{"link":[{"relation":"software","url":"https://github.com/upbcuk"}]},"title":"Fully-Featured Anonymous Credentials with Reputation System","main_file_link":[{"open_access":"1","url":"https://eprint.iacr.org/2018/835"}],"citation":{"ama":"Bemmann K, Blömer J, Bobolz J, et al. Fully-Featured Anonymous Credentials with Reputation System. In: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. doi:10.1145/3230833.3234517","apa":"Bemmann, K., Blömer, J., Bobolz, J., Bröcher, H., Diemert, D. P., Eidens, F., … Stienemeier, M. (n.d.). Fully-Featured Anonymous Credentials with Reputation System. In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM. https://doi.org/10.1145/3230833.3234517","chicago":"Bemmann, Kai, Johannes Blömer, Jan Bobolz, Henrik Bröcher, Denis Pascal Diemert, Fabian Eidens, Lukas Eilers, et al. “Fully-Featured Anonymous Credentials with Reputation System.” In Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18. New York, NY, USA: ACM, n.d. https://doi.org/10.1145/3230833.3234517.","mla":"Bemmann, Kai, et al. “Fully-Featured Anonymous Credentials with Reputation System.” Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, doi:10.1145/3230833.3234517.","bibtex":"@inproceedings{Bemmann_Blömer_Bobolz_Bröcher_Diemert_Eidens_Eilers_Haltermann_Juhnke_Otour_et al., place={New York, NY, USA}, title={Fully-Featured Anonymous Credentials with Reputation System}, DOI={10.1145/3230833.3234517}, booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18}, publisher={ACM}, author={Bemmann, Kai and Blömer, Johannes and Bobolz, Jan and Bröcher, Henrik and Diemert, Denis Pascal and Eidens, Fabian and Eilers, Lukas and Haltermann, Jan Frederik and Juhnke, Jakob and Otour, Burhan and et al.} }","short":"K. Bemmann, J. Blömer, J. Bobolz, H. Bröcher, D.P. Diemert, F. Eidens, L. Eilers, J.F. Haltermann, J. Juhnke, B. Otour, L.A. Porzenheim, S. Pukrop, E. Schilling, M. Schlichtig, M. Stienemeier, in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, ACM, New York, NY, USA, n.d.","ieee":"K. Bemmann et al., “Fully-Featured Anonymous Credentials with Reputation System,” in Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES ’18, Hamburg, Germany."},"type":"conference","year":"2018","_id":"3265","conference":{"end_date":"2018-08-30","location":"Hamburg, Germany","start_date":"2018-08-27","name":"ARES 2018 - SECPID"},"file":[{"date_updated":"2018-11-08T10:17:39Z","content_type":"application/pdf","relation":"main_file","file_size":920843,"file_id":"5428","creator":"feidens","access_level":"closed","date_created":"2018-11-08T10:17:39Z","file_name":"react_acs.pdf"}],"publisher":"ACM","author":[{"full_name":"Bemmann, Kai","first_name":"Kai","last_name":"Bemmann"},{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"},{"full_name":"Bobolz, Jan","first_name":"Jan","id":"27207","last_name":"Bobolz"},{"last_name":"Bröcher","id":"41047","first_name":"Henrik","full_name":"Bröcher, Henrik"},{"last_name":"Diemert","id":"44071","first_name":"Denis Pascal","full_name":"Diemert, Denis Pascal"},{"full_name":"Eidens, Fabian","first_name":"Fabian","id":"25078","last_name":"Eidens"},{"first_name":"Lukas","full_name":"Eilers, Lukas","last_name":"Eilers"},{"first_name":"Jan Frederik","full_name":"Haltermann, Jan Frederik","last_name":"Haltermann","id":"44413"},{"last_name":"Juhnke","id":"48090","first_name":"Jakob","full_name":"Juhnke, Jakob"},{"first_name":"Burhan","full_name":"Otour, Burhan","last_name":"Otour"},{"id":"47434","last_name":"Porzenheim","full_name":"Porzenheim, Laurens Alexander","first_name":"Laurens Alexander"},{"first_name":"Simon","full_name":"Pukrop, Simon","last_name":"Pukrop"},{"last_name":"Schilling","first_name":"Erik","full_name":"Schilling, Erik"},{"first_name":"Michael","full_name":"Schlichtig, Michael","last_name":"Schlichtig","id":"32312"},{"last_name":"Stienemeier","full_name":"Stienemeier, Marcel","first_name":"Marcel"}],"quality_controlled":"1","publication":"Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES '18","file_date_updated":"2018-11-08T10:17:39Z","has_accepted_license":"1","status":"public","date_created":"2018-06-14T11:19:29Z","abstract":[{"text":"We present CLARC (Cryptographic Library for Anonymous Reputation and Credentials), an anonymous credentials system (ACS) combined with an anonymous reputation system.\r\n\r\nUsing CLARC, users can receive attribute-based credentials from issuers. They can efficiently prove that their credentials satisfy complex (access) policies in a privacy-preserving way. This implements anonymous access control with complex policies.\r\n\r\nFurthermore, CLARC is the first ACS that is combined with an anonymous reputation system where users can anonymously rate services. A user who gets access to a service via a credential, also anonymously receives a review token to rate the service. If a user creates more than a single rating, this can be detected by anyone, preventing users from spamming ratings to sway public opinion.\r\n\r\nTo evaluate feasibility of our construction, we present an open-source prototype implementation.","lang":"eng"}],"user_id":"25078","ddc":["000"]},{"language":[{"iso":"eng"}],"series_title":"Lecture Notes in Computer Science","oa":"1","doi":"10.1007/978-3-030-00434-7_12","date_updated":"2023-01-10T10:26:13Z","project":[{"name":"SFB 901 - Project Area C","_id":"4"},{"_id":"13","name":"SFB 901 - Subproject C1"},{"_id":"1","name":"SFB 901"}],"publication_status":"published","publication_identifier":{"isbn":["978-3-030-00434-7"]},"department":[{"_id":"64"}],"title":"Enhanced Security of Attribute-Based Signatures","page":"235-255","type":"conference","year":"2018","citation":{"bibtex":"@inproceedings{Blömer_Eidens_Juhnke_2018, series={Lecture Notes in Computer Science}, title={Enhanced Security of Attribute-Based Signatures}, volume={11124}, DOI={10.1007/978-3-030-00434-7_12}, booktitle={The International Conference on Cryptology And Network Security (CANS)}, publisher={Springer}, author={Blömer, Johannes and Eidens, Fabian and Juhnke, Jakob}, year={2018}, pages={235–255}, collection={Lecture Notes in Computer Science} }","mla":"Blömer, Johannes, et al. “Enhanced Security of Attribute-Based Signatures.” The International Conference on Cryptology And Network Security (CANS), vol. 11124, Springer, 2018, pp. 235–55, doi:10.1007/978-3-030-00434-7_12.","chicago":"Blömer, Johannes, Fabian Eidens, and Jakob Juhnke. “Enhanced Security of Attribute-Based Signatures.” In The International Conference on Cryptology And Network Security (CANS), 11124:235–55. Lecture Notes in Computer Science. Springer, 2018. https://doi.org/10.1007/978-3-030-00434-7_12.","ama":"Blömer J, Eidens F, Juhnke J. Enhanced Security of Attribute-Based Signatures. In: The International Conference on Cryptology And Network Security (CANS). Vol 11124. Lecture Notes in Computer Science. Springer; 2018:235-255. doi:10.1007/978-3-030-00434-7_12","apa":"Blömer, J., Eidens, F., & Juhnke, J. (2018). Enhanced Security of Attribute-Based Signatures. The International Conference on Cryptology And Network Security (CANS), 11124, 235–255. https://doi.org/10.1007/978-3-030-00434-7_12","ieee":"J. Blömer, F. Eidens, and J. Juhnke, “Enhanced Security of Attribute-Based Signatures,” in The International Conference on Cryptology And Network Security (CANS), Naples, Italy, 2018, vol. 11124, pp. 235–255, doi: 10.1007/978-3-030-00434-7_12.","short":"J. Blömer, F. Eidens, J. Juhnke, in: The International Conference on Cryptology And Network Security (CANS), Springer, 2018, pp. 235–255."},"main_file_link":[{"url":"https://eprint.iacr.org/2018/874","open_access":"1"}],"conference":{"location":"Naples, Italy","name":"The International Conference on Cryptology And Network Security (CANS)"},"intvolume":" 11124","_id":"3873","date_created":"2018-08-10T09:44:09Z","status":"public","has_accepted_license":"1","volume":11124,"file":[{"content_type":"application/pdf","date_updated":"2018-11-08T10:15:00Z","relation":"main_file","file_size":574228,"file_id":"5427","creator":"feidens","access_level":"closed","date_created":"2018-11-08T10:15:00Z","file_name":"uc_abs.pdf"}],"file_date_updated":"2018-11-08T10:15:00Z","publication":"The International Conference on Cryptology And Network Security (CANS)","author":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"},{"last_name":"Eidens","id":"25078","first_name":"Fabian","full_name":"Eidens, Fabian"},{"first_name":"Jakob","full_name":"Juhnke, Jakob","last_name":"Juhnke","id":"48090"}],"publisher":"Springer","user_id":"25078","ddc":["000"]},{"ddc":["040"],"title":"Anonymous credential system based on q-Strong Diffie-Hellman Assumption","user_id":"477","author":[{"last_name":"Eidens","id":"25078","first_name":"Fabian","full_name":"Eidens, Fabian"}],"publisher":"Universität Paderborn","department":[{"_id":"64"}],"file_date_updated":"2018-03-20T07:40:22Z","file":[{"access_level":"closed","date_created":"2018-03-20T07:40:22Z","file_name":"321-eidens_masterthesis_01.pdf","relation":"main_file","success":1,"content_type":"application/pdf","date_updated":"2018-03-20T07:40:22Z","creator":"florida","file_id":"1432","file_size":879285}],"status":"public","has_accepted_license":"1","project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"name":"SFB 901 - Project Area C","_id":"4"}],"date_created":"2017-10-17T12:41:54Z","date_updated":"2022-01-06T06:59:05Z","_id":"321","year":"2015","type":"mastersthesis","citation":{"ieee":"F. Eidens, Anonymous credential system based on q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.","short":"F. Eidens, Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption, Universität Paderborn, 2015.","mla":"Eidens, Fabian. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015.","bibtex":"@book{Eidens_2015, title={Anonymous credential system based on q-Strong Diffie-Hellman Assumption}, publisher={Universität Paderborn}, author={Eidens, Fabian}, year={2015} }","apa":"Eidens, F. (2015). Anonymous credential system based on q-Strong Diffie-Hellman Assumption. Universität Paderborn.","ama":"Eidens F. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn; 2015.","chicago":"Eidens, Fabian. Anonymous Credential System Based on Q-Strong Diffie-Hellman Assumption. Universität Paderborn, 2015."},"supervisor":[{"id":"23","last_name":"Blömer","full_name":"Blömer, Johannes","first_name":"Johannes"}]},{"department":[{"_id":"63"}],"author":[{"first_name":"Fabian","full_name":"Eidens, Fabian","last_name":"Eidens","id":"25078"}],"publisher":"Universität Paderborn","date_created":"2017-10-17T12:42:56Z","project":[{"_id":"1","name":"SFB 901"},{"_id":"5","name":"SFB 901 - Subprojekt A1"},{"name":"SFB 901 - Project Area A","_id":"2"}],"status":"public","title":"Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken","user_id":"477","citation":{"ieee":"F. Eidens, Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken. Universität Paderborn, 2012.","short":"F. Eidens, Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken, Universität Paderborn, 2012.","bibtex":"@book{Eidens_2012, title={Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken}, publisher={Universität Paderborn}, author={Eidens, Fabian}, year={2012} }","mla":"Eidens, Fabian. Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken. Universität Paderborn, 2012.","chicago":"Eidens, Fabian. Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken. Universität Paderborn, 2012.","apa":"Eidens, F. (2012). Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken. Universität Paderborn.","ama":"Eidens F. Adaptive Verbindungsstrategien in dynamischen Suchnetzwerken. Universität Paderborn; 2012."},"year":"2012","type":"bachelorsthesis","language":[{"iso":"ger"}],"date_updated":"2022-01-06T07:03:03Z","_id":"638"}]