[{"ddc":["004"],"file_date_updated":"2020-11-09T14:25:20Z","language":[{"iso":"eng"}],"_id":"20191","department":[{"_id":"568"}],"user_id":"13703","status":"public","file":[{"file_id":"20192","access_level":"open_access","file_name":"cw_symposium_exa.pdf","file_size":126966,"date_created":"2020-10-26T09:32:00Z","creator":"nilo","date_updated":"2020-11-09T14:25:20Z","relation":"main_file","content_type":"application/pdf"}],"publication":"2nd Crowdworking Symposium","type":"conference_abstract","title":"Platform-independent Reputation and Qualification System for Crowdwork","conference":{"name":"2nd Crowdworking Symposium","start_date":"2020-10-08","end_date":"2020-10-09","location":"Paderborn"},"date_updated":"2022-01-06T06:54:22Z","oa":"1","author":[{"last_name":"Hemsen","full_name":"Hemsen, Paul","first_name":"Paul"},{"full_name":"Hesse, Marc","last_name":"Hesse","first_name":"Marc"},{"first_name":"Nils","last_name":"Löken","full_name":"Löken, Nils","id":"13703"},{"id":"35802","full_name":"Nouri, Zahra","last_name":"Nouri","first_name":"Zahra"}],"date_created":"2020-10-26T09:38:31Z","year":"2020","citation":{"bibtex":"@inproceedings{Hemsen_Hesse_Löken_Nouri_2020, title={Platform-independent Reputation and Qualification System for Crowdwork}, booktitle={2nd Crowdworking Symposium}, author={Hemsen, Paul and Hesse, Marc and Löken, Nils and Nouri, Zahra}, year={2020} }","short":"P. Hemsen, M. Hesse, N. Löken, Z. Nouri, in: 2nd Crowdworking Symposium, 2020.","mla":"Hemsen, Paul, et al. “Platform-Independent Reputation and Qualification System for Crowdwork.” <i>2nd Crowdworking Symposium</i>, 2020.","apa":"Hemsen, P., Hesse, M., Löken, N., &#38; Nouri, Z. (2020). Platform-independent Reputation and Qualification System for Crowdwork. In <i>2nd Crowdworking Symposium</i>. Paderborn.","ieee":"P. Hemsen, M. Hesse, N. Löken, and Z. Nouri, “Platform-independent Reputation and Qualification System for Crowdwork,” in <i>2nd Crowdworking Symposium</i>, Paderborn, 2020.","chicago":"Hemsen, Paul, Marc Hesse, Nils Löken, and Zahra Nouri. “Platform-Independent Reputation and Qualification System for Crowdwork.” In <i>2nd Crowdworking Symposium</i>, 2020.","ama":"Hemsen P, Hesse M, Löken N, Nouri Z. Platform-independent Reputation and Qualification System for Crowdwork. In: <i>2nd Crowdworking Symposium</i>. ; 2020."},"has_accepted_license":"1"},{"citation":{"ama":"Löken N. <i>Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work</i>.; 2020. doi:<a href=\"https://doi.org/10.17619/UNIPB/1-854\">10.17619/UNIPB/1-854</a>","ieee":"N. Löken, <i>Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work</i>. 2020.","chicago":"Löken, Nils. <i>Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work</i>, 2020. <a href=\"https://doi.org/10.17619/UNIPB/1-854\">https://doi.org/10.17619/UNIPB/1-854</a>.","apa":"Löken, N. (2020). <i>Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work</i>. <a href=\"https://doi.org/10.17619/UNIPB/1-854\">https://doi.org/10.17619/UNIPB/1-854</a>","short":"N. Löken, Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work, 2020.","mla":"Löken, Nils. <i>Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work</i>. 2020, doi:<a href=\"https://doi.org/10.17619/UNIPB/1-854\">10.17619/UNIPB/1-854</a>.","bibtex":"@book{Löken_2020, title={Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work}, DOI={<a href=\"https://doi.org/10.17619/UNIPB/1-854\">10.17619/UNIPB/1-854</a>}, author={Löken, Nils}, year={2020} }"},"year":"2020","doi":"10.17619/UNIPB/1-854","title":"Cryptography for the Crowd — A Study of Cryptographic Schemes with Applications to Crowd Work","supervisor":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"}],"author":[{"first_name":"Nils","full_name":"Löken, Nils","id":"13703","last_name":"Löken"}],"date_created":"2020-01-10T08:23:30Z","date_updated":"2022-01-06T06:52:27Z","status":"public","type":"dissertation","language":[{"iso":"eng"}],"department":[{"_id":"64"},{"_id":"568"}],"user_id":"13703","_id":"15482"},{"year":"2019","date_created":"2019-10-01T07:50:03Z","title":"Personal Cross-Platform Reputation","publication":"Security and Trust Management, STM 2019","abstract":[{"text":"We propose a novel personal reputation system for cross-platform reputation. We observe that, in certain usage scenarios, e.g. crowd work, the rater anonymity property typically imposed on reputation systems is not necessary. Instead, we propose a relaxed notion of rater anonymity that is more applicable in the crowd work scenario. This allows us to construct a secure personal reputation system from simple cryptographic primitives.","lang":"eng"}],"file":[{"content_type":"application/pdf","creator":"nilo","file_size":507736,"file_name":"informal.pdf","relation":"main_file","date_updated":"2019-10-01T07:45:17Z","date_created":"2019-10-01T07:45:17Z","description":"This is an author's version of the paper presented at STM 2019.","title":"Personal cross-platform reputation, author's version","file_id":"13555","access_level":"open_access"}],"ddc":["000"],"language":[{"iso":"eng"}],"has_accepted_license":"1","intvolume":"     11738","citation":{"short":"J. Blömer, N. Löken, in: Security and Trust Management, STM 2019, 2019.","bibtex":"@inproceedings{Blömer_Löken_2019, series={LNCS}, title={Personal Cross-Platform Reputation}, volume={11738}, DOI={<a href=\"https://doi.org/10.1007/978-3-030-31511-5_9\">10.1007/978-3-030-31511-5_9</a>}, booktitle={Security and Trust Management, STM 2019}, author={Blömer, Johannes and Löken, Nils}, year={2019}, collection={LNCS} }","mla":"Blömer, Johannes, and Nils Löken. “Personal Cross-Platform Reputation.” <i>Security and Trust Management, STM 2019</i>, vol. 11738, 2019, doi:<a href=\"https://doi.org/10.1007/978-3-030-31511-5_9\">10.1007/978-3-030-31511-5_9</a>.","apa":"Blömer, J., &#38; Löken, N. (2019). Personal Cross-Platform Reputation. In <i>Security and Trust Management, STM 2019</i> (Vol. 11738). <a href=\"https://doi.org/10.1007/978-3-030-31511-5_9\">https://doi.org/10.1007/978-3-030-31511-5_9</a>","ama":"Blömer J, Löken N. Personal Cross-Platform Reputation. In: <i>Security and Trust Management, STM 2019</i>. Vol 11738. LNCS. ; 2019. doi:<a href=\"https://doi.org/10.1007/978-3-030-31511-5_9\">10.1007/978-3-030-31511-5_9</a>","chicago":"Blömer, Johannes, and Nils Löken. “Personal Cross-Platform Reputation.” In <i>Security and Trust Management, STM 2019</i>, Vol. 11738. LNCS, 2019. <a href=\"https://doi.org/10.1007/978-3-030-31511-5_9\">https://doi.org/10.1007/978-3-030-31511-5_9</a>.","ieee":"J. Blömer and N. Löken, “Personal Cross-Platform Reputation,” in <i>Security and Trust Management, STM 2019</i>, 2019, vol. 11738."},"date_updated":"2022-01-06T06:51:38Z","oa":"1","volume":11738,"author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"last_name":"Löken","id":"13703","full_name":"Löken, Nils","first_name":"Nils"}],"conference":{"name":"Security and Trust Management, STM 2019"},"doi":"10.1007/978-3-030-31511-5_9","type":"conference","status":"public","_id":"13554","department":[{"_id":"568"},{"_id":"64"}],"user_id":"13703","series_title":"LNCS","file_date_updated":"2019-10-01T07:45:17Z"},{"main_file_link":[{"url":"http://eprint.iacr.org/2019/1038","open_access":"1"}],"title":"Dynamic Searchable Encryption with Access Control","author":[{"first_name":"Johannes","last_name":"Blömer","full_name":"Blömer, Johannes","id":"23"},{"id":"13703","full_name":"Löken, Nils","last_name":"Löken","first_name":"Nils"}],"date_created":"2019-10-01T08:05:31Z","volume":12056,"publisher":"Springer","oa":"1","date_updated":"2022-01-06T06:51:38Z","citation":{"bibtex":"@inproceedings{Blömer_Löken_2019, series={LNCS}, title={Dynamic Searchable Encryption with Access Control}, volume={12056}, booktitle={12th International Symposium on Foundations and Practice of Security, FPS 2019}, publisher={Springer}, author={Blömer, Johannes and Löken, Nils}, year={2019}, collection={LNCS} }","mla":"Blömer, Johannes, and Nils Löken. “Dynamic Searchable Encryption with Access Control.” <i>12th International Symposium on Foundations and Practice of Security, FPS 2019</i>, vol. 12056, Springer, 2019.","short":"J. Blömer, N. Löken, in: 12th International Symposium on Foundations and Practice of Security, FPS 2019, Springer, 2019.","apa":"Blömer, J., &#38; Löken, N. (2019). Dynamic Searchable Encryption with Access Control. In <i>12th International Symposium on Foundations and Practice of Security, FPS 2019</i> (Vol. 12056). Springer.","ama":"Blömer J, Löken N. Dynamic Searchable Encryption with Access Control. In: <i>12th International Symposium on Foundations and Practice of Security, FPS 2019</i>. Vol 12056. LNCS. Springer; 2019.","ieee":"J. Blömer and N. Löken, “Dynamic Searchable Encryption with Access Control,” in <i>12th International Symposium on Foundations and Practice of Security, FPS 2019</i>, 2019, vol. 12056.","chicago":"Blömer, Johannes, and Nils Löken. “Dynamic Searchable Encryption with Access Control.” In <i>12th International Symposium on Foundations and Practice of Security, FPS 2019</i>, Vol. 12056. LNCS. Springer, 2019."},"intvolume":"     12056","year":"2019","language":[{"iso":"eng"}],"series_title":"LNCS","user_id":"13703","department":[{"_id":"64"},{"_id":"568"}],"_id":"13557","status":"public","abstract":[{"lang":"eng","text":"We present a searchable encryption scheme for dynamic document collections in a multi-user scenario. Our scheme features fine-grained access control to search results, as well as access control to operations such as adding documents to the document collection, or changing individual documents. The scheme features verifiability of search results. Our scheme also satisfies the forward privacy notion crucial for the security of dynamic searchable encryption schemes."}],"type":"conference","publication":"12th International Symposium on Foundations and Practice of Security, FPS 2019"},{"date_created":"2018-06-04T11:33:15Z","publisher":"ACM","title":"Cloud Architectures for Searchable Encryption","quality_controlled":"1","year":"2018","language":[{"iso":"eng"}],"ddc":["000"],"publication":"Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018","file":[{"creator":"ups","date_created":"2018-11-02T14:39:46Z","date_updated":"2018-11-02T14:39:46Z","file_name":"a25-Blomer.pdf","access_level":"closed","file_id":"5278","file_size":769807,"content_type":"application/pdf","relation":"main_file","success":1}],"author":[{"full_name":"Blömer, Johannes","id":"23","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Nils","last_name":"Löken","full_name":"Löken, Nils","id":"13703"}],"date_updated":"2022-01-06T06:58:49Z","conference":{"name":"ARES 2018","location":"Hamburg, Germany"},"doi":"10.1145/3230833.3230853","publication_identifier":{"isbn":["978-1-4503-6448-5"]},"has_accepted_license":"1","publication_status":"accepted","page":"25:1--25:10","citation":{"chicago":"Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” In <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>, 25:1--25:10. New York, NY, USA: ACM, n.d. <a href=\"https://doi.org/10.1145/3230833.3230853\">https://doi.org/10.1145/3230833.3230853</a>.","ieee":"J. Blömer and N. Löken, “Cloud Architectures for Searchable Encryption,” in <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>, Hamburg, Germany, pp. 25:1--25:10.","ama":"Blömer J, Löken N. Cloud Architectures for Searchable Encryption. In: <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>. New York, NY, USA: ACM; :25:1--25:10. doi:<a href=\"https://doi.org/10.1145/3230833.3230853\">10.1145/3230833.3230853</a>","short":"J. Blömer, N. Löken, in: Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018, ACM, New York, NY, USA, n.d., pp. 25:1--25:10.","mla":"Blömer, Johannes, and Nils Löken. “Cloud Architectures for Searchable Encryption.” <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i>, ACM, pp. 25:1--25:10, doi:<a href=\"https://doi.org/10.1145/3230833.3230853\">10.1145/3230833.3230853</a>.","bibtex":"@inproceedings{Blömer_Löken, place={New York, NY, USA}, title={Cloud Architectures for Searchable Encryption}, DOI={<a href=\"https://doi.org/10.1145/3230833.3230853\">10.1145/3230833.3230853</a>}, booktitle={Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018}, publisher={ACM}, author={Blömer, Johannes and Löken, Nils}, pages={25:1--25:10} }","apa":"Blömer, J., &#38; Löken, N. (n.d.). Cloud Architectures for Searchable Encryption. In <i>Proceedings of the 13th International Conference on Availability, Reliability and Security, ARES 2018</i> (pp. 25:1--25:10). New York, NY, USA: ACM. <a href=\"https://doi.org/10.1145/3230833.3230853\">https://doi.org/10.1145/3230833.3230853</a>"},"place":"New York, NY, USA","department":[{"_id":"64"},{"_id":"568"}],"user_id":"13703","_id":"2965","project":[{"name":"SFB 901","_id":"1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"13","name":"SFB 901 - Subproject C1"}],"file_date_updated":"2018-11-02T14:39:46Z","type":"conference","status":"public"},{"ddc":["000"],"language":[{"iso":"eng"}],"file":[{"content_type":"application/pdf","relation":"main_file","date_created":"2018-11-08T10:56:15Z","creator":"nilo","date_updated":"2018-11-08T10:56:15Z","access_level":"open_access","file_name":"searchable_encryption_access_control_website.pdf","file_id":"5431","file_size":658797}],"publication":"Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES '17","title":"Searchable Encryption with Access Control","publisher":"ACM Press","date_created":"2018-04-13T11:40:23Z","year":"2017","article_number":"24","file_date_updated":"2018-11-08T10:56:15Z","project":[{"name":"Securing the Financial Cloud","_id":"43"}],"_id":"2343","series_title":"ICPS","user_id":"13703","department":[{"_id":"64"}],"status":"public","type":"conference","main_file_link":[{"open_access":"1","url":"http://eprint.iacr.org/2017/679"}],"doi":"10.1145/3098954.3098987","oa":"1","date_updated":"2022-01-06T06:55:54Z","author":[{"last_name":"Löken","full_name":"Löken, Nils","id":"13703","first_name":"Nils"}],"citation":{"chicago":"Löken, Nils. “Searchable Encryption with Access Control.” In <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ICPS. ACM Press, 2017. <a href=\"https://doi.org/10.1145/3098954.3098987\">https://doi.org/10.1145/3098954.3098987</a>.","ieee":"N. Löken, “Searchable Encryption with Access Control,” in <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>, 2017.","ama":"Löken N. Searchable Encryption with Access Control. In: <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ICPS. ACM Press; 2017. doi:<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>","mla":"Löken, Nils. “Searchable Encryption with Access Control.” <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>, 24, ACM Press, 2017, doi:<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>.","bibtex":"@inproceedings{Löken_2017, series={ICPS}, title={Searchable Encryption with Access Control}, DOI={<a href=\"https://doi.org/10.1145/3098954.3098987\">10.1145/3098954.3098987</a>}, number={24}, booktitle={Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17}, publisher={ACM Press}, author={Löken, Nils}, year={2017}, collection={ICPS} }","short":"N. Löken, in: Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17, ACM Press, 2017.","apa":"Löken, N. (2017). Searchable Encryption with Access Control. In <i>Proceedings of the 12th International Conference on Availability, Reliability and Security  - ARES ’17</i>. ACM Press. <a href=\"https://doi.org/10.1145/3098954.3098987\">https://doi.org/10.1145/3098954.3098987</a>"},"publication_status":"published","has_accepted_license":"1","publication_identifier":{"isbn":["9781450352574"]}},{"place":"Cham","page":"3-17","citation":{"ieee":"J. Blömer, P. Günther, V. Krummel, and N. Löken, “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations,” in <i>Foundations and Practice of Security</i>, 2017, pp. 3–17.","chicago":"Blömer, Johannes, Peter Günther, Volker Krummel, and Nils Löken. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” In <i>Foundations and Practice of Security</i>, 3–17. Cham: Springer International Publishing, 2017. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>.","ama":"Blömer J, Günther P, Krummel V, Löken N. Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In: <i>Foundations and Practice of Security</i>. Cham: Springer International Publishing; 2017:3-17. doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>","mla":"Blömer, Johannes, et al. “Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations.” <i>Foundations and Practice of Security</i>, Springer International Publishing, 2017, pp. 3–17, doi:<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>.","short":"J. Blömer, P. Günther, V. Krummel, N. Löken, in: Foundations and Practice of Security, Springer International Publishing, Cham, 2017, pp. 3–17.","bibtex":"@inproceedings{Blömer_Günther_Krummel_Löken_2017, place={Cham}, title={Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">10.1007/978-3-319-75650-9_1</a>}, booktitle={Foundations and Practice of Security}, publisher={Springer International Publishing}, author={Blömer, Johannes and Günther, Peter and Krummel, Volker and Löken, Nils}, year={2017}, pages={3–17} }","apa":"Blömer, J., Günther, P., Krummel, V., &#38; Löken, N. (2017). Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations. In <i>Foundations and Practice of Security</i> (pp. 3–17). Cham: Springer International Publishing. <a href=\"https://doi.org/10.1007/978-3-319-75650-9_1\">https://doi.org/10.1007/978-3-319-75650-9_1</a>"},"publication_identifier":{"isbn":["9783319756493","9783319756509"],"issn":["0302-9743","1611-3349"]},"has_accepted_license":"1","publication_status":"published","doi":"10.1007/978-3-319-75650-9_1","oa":"1","date_updated":"2022-01-06T06:55:55Z","author":[{"id":"23","full_name":"Blömer, Johannes","last_name":"Blömer","first_name":"Johannes"},{"first_name":"Peter","full_name":"Günther, Peter","last_name":"Günther"},{"last_name":"Krummel","full_name":"Krummel, Volker","first_name":"Volker"},{"first_name":"Nils","last_name":"Löken","id":"13703","full_name":"Löken, Nils"}],"status":"public","type":"conference","file_date_updated":"2018-11-08T09:53:34Z","_id":"2344","project":[{"name":"SFB 901 - Subproject C1","_id":"13"},{"_id":"4","name":"SFB 901 - Project Area C"},{"_id":"1","name":"SFB 901"},{"name":"Securing the Financial Cloud","_id":"43"}],"department":[{"_id":"64"}],"user_id":"13703","year":"2017","title":"Attribute-Based Encryption as a Service for Access Control in Large-Scale Organizations","publisher":"Springer International Publishing","date_created":"2018-04-13T11:40:48Z","file":[{"relation":"main_file","success":1,"content_type":"application/pdf","access_level":"closed","file_id":"5292","file_name":"Attribute-BasedEncryptionAsASe.pdf","file_size":634736,"date_created":"2018-11-02T15:04:13Z","creator":"ups","date_updated":"2018-11-02T15:04:13Z"},{"date_updated":"2018-11-08T09:53:34Z","creator":"nilo","date_created":"2018-11-08T09:53:34Z","file_size":522516,"access_level":"open_access","file_id":"5425","file_name":"abe_aas.pdf","content_type":"application/pdf","relation":"main_file"}],"publication":"Foundations and Practice of Security","ddc":["000"],"language":[{"iso":"eng"}]},{"file_date_updated":"2018-11-02T14:08:23Z","department":[{"_id":"64"}],"user_id":"13703","series_title":"LNCS","_id":"253","project":[{"name":"SFB 901","_id":"1"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"},{"name":"KogniHome - die mitdenkende Wohnung","_id":"44"}],"status":"public","type":"conference","doi":"10.1007/978-3-319-32859-1_14","author":[{"last_name":"Blömer","full_name":"Blömer, Johannes","id":"23","first_name":"Johannes"},{"first_name":"Jakob","last_name":"Juhnke","id":"48090","full_name":"Juhnke, Jakob"},{"last_name":"Löken","id":"13703","full_name":"Löken, Nils","first_name":"Nils"}],"date_updated":"2022-01-06T06:59:07Z","page":"166-180","citation":{"bibtex":"@inproceedings{Blömer_Juhnke_Löken_2015, series={LNCS}, title={Short Group Signatures with Distributed Traceability}, DOI={<a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">10.1007/978-3-319-32859-1_14</a>}, booktitle={Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)}, author={Blömer, Johannes and Juhnke, Jakob and Löken, Nils}, year={2015}, pages={166–180}, collection={LNCS} }","mla":"Blömer, Johannes, et al. “Short Group Signatures with Distributed Traceability.” <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2015, pp. 166–80, doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">10.1007/978-3-319-32859-1_14</a>.","short":"J. Blömer, J. Juhnke, N. Löken, in: Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS), 2015, pp. 166–180.","apa":"Blömer, J., Juhnke, J., &#38; Löken, N. (2015). Short Group Signatures with Distributed Traceability. In <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i> (pp. 166–180). <a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">https://doi.org/10.1007/978-3-319-32859-1_14</a>","ieee":"J. Blömer, J. Juhnke, and N. Löken, “Short Group Signatures with Distributed Traceability,” in <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 2015, pp. 166–180.","chicago":"Blömer, Johannes, Jakob Juhnke, and Nils Löken. “Short Group Signatures with Distributed Traceability.” In <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>, 166–80. LNCS, 2015. <a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">https://doi.org/10.1007/978-3-319-32859-1_14</a>.","ama":"Blömer J, Juhnke J, Löken N. Short Group Signatures with Distributed Traceability. In: <i>Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)</i>. LNCS. ; 2015:166-180. doi:<a href=\"https://doi.org/10.1007/978-3-319-32859-1_14\">10.1007/978-3-319-32859-1_14</a>"},"related_material":{"record":[{"id":"325","relation":"other","status":"public"}]},"has_accepted_license":"1","language":[{"iso":"eng"}],"ddc":["000"],"file":[{"success":1,"relation":"main_file","content_type":"application/pdf","file_size":262436,"file_id":"5262","file_name":"ShortGroupSignaturesWithDistri.pdf","access_level":"closed","date_updated":"2018-11-02T14:08:23Z","creator":"ups","date_created":"2018-11-02T14:08:23Z"}],"abstract":[{"text":"Group signatures, introduced by Chaum and van Heyst [15], are an important primitive in cryptography. In group signature schemes every group member can anonymously sign messages on behalf of the group. In case of disputes a dedicated opening manager is able to trace signatures - he can extract the identity of the producer of a given signature. A formal model for static group signatures schemes and their security is defined by Bellare, Micciancio, and Warinschi [4], the case of dynamic groups is considered by Bellare, Shi, and Zhang [5]. Both models define group signature schemes with a single opening manager. The main difference between these models is that the number of group members in static schemes is fixed, while in dynamic schemes group members can join the group over time.","lang":"eng"}],"publication":"Proceedings of the Sixth International Conference on Mathematical Aspects of Computer and Information Sciences (MACIS)","title":"Short Group Signatures with Distributed Traceability","date_created":"2017-10-17T12:41:41Z","year":"2015"},{"citation":{"apa":"Löken, N. (2015). <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn.","short":"N. Löken, A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption, Universität Paderborn, 2015.","mla":"Löken, Nils. <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn, 2015.","bibtex":"@book{Löken_2015, title={A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption}, publisher={Universität Paderborn}, author={Löken, Nils}, year={2015} }","ama":"Löken N. <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn; 2015.","chicago":"Löken, Nils. <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn, 2015.","ieee":"N. Löken, <i>A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption</i>. Universität Paderborn, 2015."},"year":"2015","related_material":{"record":[{"status":"public","id":"253","relation":"other"}]},"title":"A Group Signature Scheme with Distributed Group Management - An Application of Threshold Encryption","supervisor":[{"first_name":"Johannes","last_name":"Blömer","id":"23","full_name":"Blömer, Johannes"}],"author":[{"id":"13703","full_name":"Löken, Nils","last_name":"Löken","first_name":"Nils"}],"date_created":"2017-10-17T12:41:55Z","publisher":"Universität Paderborn","date_updated":"2022-01-06T06:59:07Z","status":"public","type":"mastersthesis","user_id":"477","department":[{"_id":"64"}],"project":[{"_id":"1","name":"SFB 901"},{"_id":"13","name":"SFB 901 - Subprojekt C1"},{"_id":"4","name":"SFB 901 - Project Area C"}],"_id":"325"},{"user_id":"13703","department":[{"_id":"64"}],"project":[{"name":"SFB 901","_id":"1"},{"name":"SFB 901 - Subprojekt C1","_id":"13"},{"name":"SFB 901 - Project Area C","_id":"4"}],"_id":"606","language":[{"iso":"ger"}],"type":"bachelorsthesis","status":"public","author":[{"last_name":"Löken","id":"13703","full_name":"Löken, Nils","first_name":"Nils"}],"date_created":"2017-10-17T12:42:50Z","supervisor":[{"first_name":"Johannes","full_name":"Blömer, Johannes","id":"23","last_name":"Blömer"}],"publisher":"Universität Paderborn","date_updated":"2022-01-06T07:02:51Z","title":"Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas","citation":{"mla":"Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012.","short":"N. Löken, Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas, Universität Paderborn, 2012.","bibtex":"@book{Löken_2012, title={Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas}, publisher={Universität Paderborn}, author={Löken, Nils}, year={2012} }","apa":"Löken, N. (2012). <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn.","ama":"Löken N. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn; 2012.","chicago":"Löken, Nils. <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012.","ieee":"N. Löken, <i>Identitätsbasierte Signaturen - Ein Sicherheitsbeweis für Signaturen auf Grundlage von Gap-Diffie-Hellman-Gruppen mit Hilfe des Forking-Lemmas</i>. Universität Paderborn, 2012."},"year":"2012"}]
