[picture] Anna Lysyanskaya

Professor of Computer Science
Brown University Box 1910
Providence, RI 02912

(401) 863-7600  *  anna at cs.brown.edu

    Homepage
    Brief bio
    Contact info
    Research
    Teaching
Research papers in reverse chronological order

Foteini Baldimtsi, Anna Lysyanskaya.  "Anonymous Credentials Light."  ACM CCS 2013. pdf.

Gesine Hinterwälder, Christian T. Zenger, Foteini Baldimtsi, Anna Lysyanskaya, Christof Paar, Wayne P. Burleson.  "Efficient E-Cash in Practice: NFC-Based Payments for Public Transportation Systems."  Privacy-Enhancing Technologies Symposium (PETS) 2013. pdf.

Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn.  "Verifiable Elections That Scale for Free."  The 16th IACR Workshop on Public-Key Cryptography (PKC 2013). pdf.

Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn.  "Succinct Malleable NIZKs and Application to Compact Shuffles."  Theory of Cryptography Conference (TCC) 2013. pdf.

Jan Camenisch, Anna Lysyanskaya, Gregory Neven.  "Practical Yet Universally Composable Two-Server Password-Authenticated Secret Sharing."  ACM CCS 2012. pdf.

Feng-Hao Liu, Anna Lysyanskaya.  "Tamper and Leakage Resilience in the Split-State Model."  Crypto 2012full version.

Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Sarah Meiklejohn.  "Malleable Proof Systems and Applications."  Eurocrypt 2012full version.

Alptekin Küpçü, Anna Lysyanskaya. "Optimistic Fair Exchange with Multiple Arbiters." ESORICS 2010. pdf.

Feng-Hao Liu, Anna Lysyanskaya. "Algorithmic Tamper-Proof Security under Probing Attacks." SCN 2010. pdf.

Sarah Meiklejohn, C. Christopher Erway, Alptekin Küpçü, Theodora Hinkle, Anna Lysyanskaya. "ZKPDL:Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash." USENIX Security Symposium 2010. proceedings version. full version.

Alptekin Küpçü, Anna Lysyanskaya. "Usable Optimistic Fair Exchange." CT-RSA 2010. full version. journal version.

Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, Hovav Shacham. "Randomizable Proofs and Delegatable Anonymous Credentials." CRYPTO 2009, pdf.

Alptekin Küpçü, Anna Lysyanskaya. "Brief announcement: impossibility results for optimistic fair exchange with multiple autonomous arbiters." PODC 2009, pdf.

Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya. "Compact E-Cash and Simulatable VRFs Revisited." Pairing 2009, pdf.

Mira Belenkiy, Melissa Chase, C. Christopher Erway, John Jannotti, Alptekin Küpçü, Anna Lysyanskaya. "Incentivizing outsourced computation." NetEcon 2008, pdf.

Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya. "P-Signatures and Non-Interactive Anonymous Credentials." TCC 2008. proceedings version. full version.

Mira Belenkiy, Melissa Chase, C. Chris Erway, John Jannotti, Alptekin Küpçü, John Jannotti, Anna Lysyanskaya, Eric Rachlin. "Making P2P Accountable without Losing Privacy." WPES 2007. workshop version.

Melissa Chase, Anna Lysyanskaya. "Simulatable VRFs with Applications to Multi-Theorem NIZK." Crypto 2007 pdf.

Jan Camenisch, Anna Lysyanskaya, Mira Meyerovich. "Endorsed E-cash." IEEE Symp. on Security and Privacy. pdf.

Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, Mira Meyerovich. "How to Win the Clone Wars: Efficient Periodic n-Times Anonymous Authentication." ACM CCS 2006. .ps .ps.gz .pdf

Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya. "Balancing Accountability and Privacy Using E-Cash." Security and Cryptography for Networks (SCN) 2006. .ps .ps.gz .pdf

Melissa Chase, Anna Lysyanskaya. "On Signatures of Knowledge." Crypto 2006 full version, proceedings version.

Anna Lysyanskaya, Nikos Triandopoulos. "Rationality and Adversarial Behavior in Multi-Party Computation." Crypto 2006 .ps .ps.gz .pdf

Anna Lysyanskaya, Mira Meyerovich. "Provably Secure Steganography with Imperfect Sampling." Public Key Cryptography 2006. full version, proceedings version.

Jan Camenisch, Anna Lysyanskaya. "A Formal Treatment of Onion Routing." Crypto 2005 full version, proceedings version.

Jan Camenisch, Susan Hohenberger, Anna Lysyanskaya. "Compact E-Cash." Eurocrypt 2005. full version, proceedings version.

Melissa Chase, Alexander Healy, Anna Lysyanskaya, Tal Malkin, Leonid Reyzin. "Mercurial Commitments with Applications to Zero-Knowledge Sets." Eurocrypt 2005. full version, proceedings version.

Susan Hohenberger, Anna Lysyanskaya. "How to Securely Outsource Cryptographic Computations." TCC 2005. .ps .ps.gz .pdf

Danfeng Yao, Nelly Fazio, Yevgeniy Dodis, Anna Lysyanskaya. "ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption." ACM CCS 2004. .ps .ps.gz .pdf

Jan Camenisch, Anna Lysyanskaya. "Signature Schemes and Anonymous Credentials from Bilinear Maps." CRYPTO 2004. .ps .ps.gz .pdf

Anna Lysyanskaya, Roberto Tamassia, Nikos Triandopoulos. "Multicast Authentication in Fully Adversarial Networks." IEEE Symposium on Security and Privacy 2004. .ps .ps.gz .pdf Journal version in ACM Trans. Inf. Syst. Secur. 13(2)

Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Hovav Shacham. "Sequential Aggregate Signatures from Trapdoor Permutations." EUROCRYPT 2004. .ps .ps.gz .pdf

Rosario Gennaro, Anna Lysyanskaya, Tal Malkin, Silvio Micali, Tal Rabin. "Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering." Theory of Cryptography Conference, 2004. .ps .ps.gz .pdf

Jan Camenisch, Anna Lysyanskaya. "Signature schemes with efficient protocols." SCN 2002. .ps .ps.gz .pdf

Anna Lysyanskaya. "Unique signatures and verifiable random functions from the DH-DDH separation." CRYPTO 2002. .ps .ps.gz .pdf

Jan Camenisch, Anna Lysyanskaya. "Dynamic accumulators and application to efficient revocation of anonymous credentials." CRYPTO 2002. .ps .ps.gz .pdf

Yehuda Lindell, Anna Lysyanskaya, Tal Rabin. "Sequential composition of protocols without simultaneous termination." PODC 2002. .ps .ps.gz .pdf

Yehuda Lindell, Anna Lysyanskaya, Tal Rabin. "On the composition of authenticated Byzantine agreement." STOC 2002. .ps .ps.gz .pdf

Moses Liskov, Anna Lysyanskaya, Silvio Micali, Leonid Reyzin, Adam Smith. "Mutually independent commitments." ASIACRYPT 2001: 385-401. .ps .ps.gz .pdf

Anna Lysyanskaya, Christopher Peikert. "Adaptive security in the threshold setting: From cryptosystems to signature schemes." ASIACRYPT 2001: 331-350. .ps .ps.gz .pdf

Jan Camenisch, Anna Lysyanskaya. "An identity escrow scheme with appointed verifiers."CRYPTO 2001: 388-407. .ps .ps.gz .pdf

Jan Camenisch, Anna Lysyanskaya. "An efficient system for non-transferable anonymous credentials with optional anonymity revocation." EUROCRYPT 2001 : 93-118. .ps .ps.gz .pdf

Stanislaw Jarecki, Anna Lysyanskaya. "Concurrent and erasure-free models in adaptively secure threshold cryptography." EUROCRYPT 2000 : 221-242. .ps .ps.gz .pdf

Anna Lysyanskaya, Ronald L. Rivest, Amit Sahai, Stefan Wolf. "Pseudonym systems." Selected Areas in Cryptography 1999 : 184-199 .ps .ps.gz .pdf

Anna Lysyanskaya, Zulfikar Ramzan. "Group blind digital signatures: A scalable solution to electronic cash." Financial Cryptography 1998 : 184-197 .ps