Publications
2012
- P. Bichsel, J. Camenisch, B. De Decker, J. Lapon, V. Naessens, and D. Sommer.
Data-minimizing Authentication goes Mobile.
13th Joint IFIP TC6 and TC11 Conference on Communications and Multimedia Security (CMS), Canterbury, UK, Sept. 2012.
BibTeX - P. Bichsel, J. Camenisch, and D. Sommer.
A Calculus for Privacy-Friendly Authentication.
17th ACM Symposium on Access Control Models and Technologies (SACMAT), Newark, NJ, USA, June 2012.
PDF | BibTeX - P. Bichsel.
Cryptographic Protocols and System Aspects for Practical Data-minimizing Authentication.
PhD Thesis, Katholieke Universiteit Leuven, ISBN 978-94-6018-492-5, March 2012.
PDF | BibTeX - P. Bichsel, J. Camenisch, and M. Verdicchio.
Recognizing Your Digital Friends.
Chapter in Security and Privacy in Social Networks, Springer, ISBN ..., 2012.
BibTeX
2011
- P. Bichsel, J. Camenisch, and F-S. Preiss.
A Comprehensive Framework Enabling Data-Minimizing Authentication.
7th ACM Workshop on Digital Identity Management (ACM DIM '11), Chicago, IL, USA, October 21, 2011.
PDF | BibTeX | DOI | Slides (by P.B.) - P. Bichsel, and F-S. Preiss.
DEMO: A Comprehensive Framework Enabling Data-Minimizing Authentication.
Demonstration at the 18th ACM CCS '11, Chicago, IL, USA, October 17-21, 2011.
PDF | BibTeX - P. Bichsel, J. Camenisch, and M. Verdicchio.
Recognizing Your Digital Friends.
First International Workshop on Security and Privacy in Social Networks (SPSN '11), Boston, MS, USA, October 9-11, 2011.
PDF | BibTeX | DOI | Slides (by M.V.) - P. Bichsel, D. Ragget, and R. Wenning.
Position paper: Web authentication is deeply flawed - it's time to fix it.
W3C Workshop on Identity in the Browser, Mountain View, USA, May 24-25, 2011.
Paper | BibTeX - P. Bichsel, J. Camenisch, T. Groß, and V. Shoup.
Anonymous Credentials on Java Card.
21st Fraunhofer SIT-Smartcard Workshop 2011, Darmstadt, Germany, February 2-3, 2011.
PDF | BibTeX | Slides (by T.G.)
2010
- P. Bichsel and J. Camenisch.
Mixing Identities with Ease.
IFIP Working Conference on Policies & Research in Identity Management (IDMAN '10), Oslo, Norway, November 18-19, 2010.
PDF | BibTeX | DOI | Slides (by P.B.) - P. Bichsel, J. Camenisch, G. Neven, N.P. Smart and B. Warinschi.
Get Shorty via Group Signatures without Encryption.
7th Conference on Security and Cryptography for Networks (SCN '10), Amalfi, Italy, September 13-15, 2010.
PDF | BibTeX | DOI | DBLP | Slides (by P.B.)
2009
- P. Bichsel, J. Camenisch, T. Groß and V. Shoup.
Anonymous Credentials on a Standard Java Card.
16th ACM Conference on Computer and Communications Security (ACM CCS '09), Chicago, IL, USA, November 9-13, 2009.
PDF | BibTeX | DOI | DBLP | Slides (by T.G.) - P. Bichsel, S. Müller, F.-S. Preiss, D. Sommer and
M. Verdicchio.
Security and Trust through Electronic Social Network-based Interactions.
Workshop on Security and Privacy in Online Social Networking (SPOSN '09), Vancouver, BC, Canada, August 29-31, 2009.
PDF | BibTeX | DOI | DBLP | Slides (by M.V. and P.B.)
Awards
- IBM/Identity Mixer.
European Identity Award 2010 in the category Best Innovation
Prize winners | Press Release | Technology Overview... - P. Bichsel, and others.
Certificate of Appreciation for the 2009 Outstanding Technical Accomplishment: Privacy-Enhancing Identity Management
IBM Research Award | Technology Overview | Prototype | Getting Started... - P. Bichsel, J. Camenisch, T. Groß.
IBM Significant External Honor
IBM Award | Technology Overview | Prototype | Getting Started... - P. Bichsel, J. Camenisch, T. Groß and V. Shoup.
Innovation Award 2009 of the Gesellschaft für Informatik (GI)
Prize winners | Press Release | Interview (October 19, 2009) | Technology Overview | Prototype | Getting Started...
Patents
- P. Bichsel, F-S. Preiss, M. Verdicchio.
Set Definition in Data Processing Systems.
United States Patent Application US 2011/0087999 A1 (12/924,600), April 2011.
- P. Bichsel, J. Camenisch, T. Groß.
Transaction Auditing for Data Security Devices.
World Intellectual Property Organization (WIPO), International Patent Application WO 2011/104654 A1 (PCT/IB2011/050638), September 2011.
Panel Discussions and Invited Talks
- P. Bichsel.
Invited Talk: Building Privacy into the Future Internet
Workshop on Future Internet Security (FIS 2011), Seoul, Korea, August 31, 2011. - P. Bichsel, L. Fritsch, A. Jøsang, M. Volkamer.
Panel: Challenges in Identity Management.
IFIP Working Conference on Policies & Research in Identity Management (IDMAN '10), Oslo, Norway, November 18-19, 2010.
Research Reports
- Security Team, IBM Research (correspondance to Jan Camenisch).
Specification of the Identity Mixer Cryptographic Library (a.k.a. Cryptographic Protocols of the Identity Mixer Library)
PDF | BibTeX | Link | Questions - P. Bichsel, J. Camenisch, F-S. Preiss, D. Sommer.
Dynamically-changing Interface for Interactive Selection of Information Cards Satisfying Policy Requirements
PDF | Link | Questions - P. Bichsel, C. Binding, J. Camenisch, T. Groß, T.
Heydt-Benjamin, D. Sommer, and G. Zaverucha (Contributors).
Cryptographic Protocols of the Identity Mixer Library
PDF | Link | Questions
Background
I began my studies in electrical engineering and information
technology in 2002 at ETH Zürich and finished by getting the M.Sc.
degree in November 2007. The focus of my studies was on communication
networks and their security aspects as well as security of operating
systems in general. It was an honor to get the possibility to write the
master thesis at the IBM
Research Laboratory in Rüschlikon under the supervision of Jan
Camenisch and with the guidance of Dieter Sommer and Thomas Groß.
The subject of the thesis was the analysis and implementation of theft
and misuse protection mechanisms for anonymous credentials. The
underlying anonymous credential system has been introduced by Camenisch
et al. and is a means for privacy friendly and secure exchange of
information. The privacy enhancement lies mainly in the minimisation of
information that needs to be revealed to the communication partner. This
is achieved by enabling selective disclosure of attributes and proofs
(e.g., the Swiss government certifies that I am older than 18) about
attributes. More on anonymous credential systems can be found on our IDMX blog or the cryptographic
library can be downloaded from http://prime.inf.tu-dresden.de/idemix/.
The library used for the implementation was the Idemix library designed
and largely implemented by Dieter Sommer. As a result of the thesis,
different mechanisms for theft prevention and protection could be added.
The current version of the Idemix library is available at http://prime.inf.tu-dresden.de/idemix/.
It does include many features such as pseudonyms (for pseudonymous
access to web sites), updateable credentials, or verifiable encryption.
The theft prevention features will be added after a review of the code.
In addition to the code, we provide a tutorial on how to get
it running.
Due to the challenging work and the great atmosphere fostering
collaboration and innovation, I applied for a research position and
became a part of the security
group in March 2008.