Filters








245 Hits in 2.4 sec

Design and implementation of the idemix anonymous credential system

Jan Camenisch, Els Van Herreweghen
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by [6] .  ...  Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers.  ...  Acknowledgements The authors are grateful to Marco Bove, Endre Bangerter, Roger Mathys, Martin Schaffer, and Dieter Sommer for their amazing Java programming making the idemix prototype reality.  ... 
doi:10.1145/586110.586114 dblp:conf/ccs/CamenischH02 fatcat:jt5wrnyx4bcpvoirtpcrk2yroq

Design and implementation of the idemix anonymous credential system

Jan Camenisch, Els Van Herreweghen
2002 Proceedings of the 9th ACM conference on Computer and communications security - CCS '02  
In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by [6] .  ...  Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers.  ...  Acknowledgements The authors are grateful to Marco Bove, Endre Bangerter, Roger Mathys, Martin Schaffer, and Dieter Sommer for their amazing Java programming making the idemix prototype reality.  ... 
doi:10.1145/586111.586114 fatcat:ymu6mapaorg67ayatynzeviesa

PriMan: Facilitating the Development of Secure and Privacy-Preserving Applications [chapter]

Andreas Put, Italo Dacosta, Milica Milutinovic, Bart De Decker
2014 IFIP Advances in Information and Communication Technology  
PriMan facilitates the integration of PETs and security technologies in current and future applications.  ...  In this paper, we present a flexible, technology agnostic development framework that facilitates the integration of security and privacy-preserving technologies into applications.  ...  This research was funded by the IWT-SBO Project Mob-Com: A Mobile Companion (https://www.mobcom.org).  ... 
doi:10.1007/978-3-642-55415-5_34 fatcat:y72mz6l6fbf5zjzimhz56llgom

A comprehensive framework enabling data-minimizing authentication

Patrik Bichsel, Jan Camenisch, Franz-Stefan Preiss
2011 Proceedings of the 7th ACM workshop on Digital identity management - DIM '11  
When used with anonymous credentials, the personal data disclosed can be reduced to the minimum w.r.t. a business purpose while improving the assurance of the communicated data.  ...  In this paper we review the different components of such an authentication framework and show that one remaining missing piece is a translation between high-level authentication policies and the cryptographic  ...  Anonymous credential system implementations, more specifically, idemix [18] or U-Prove [16] offer such additional features.  ... 
doi:10.1145/2046642.2046647 dblp:conf/dim/BichselCP11 fatcat:v3cqbdkabnfcdc6bxh2wd53x5m

P4G2Go: A Privacy-Preserving Scheme for Roaming Energy Consumers of the Smart Grid-to-Go

Aristeidis Farao, Eleni Veroni, Christoforos Ntantogian, Christos Xenakis
2021 Sensors  
At the heart of P4G2Go lies the Idemix cryptographic protocol suite, which utilizes anonymous credentials and provides unlinkability of the consumer activities.  ...  We have implemented the main components of P4G2Go, to quantitatively assess its performance.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/s21082686 pmid:33920337 fatcat:be7kfo5cjrelnmsfe6rnqxatlm

Mixing Identities with Ease [chapter]

Patrik Bichsel, Jan Camenisch
2010 IFIP Advances in Information and Communication Technology  
anonymous credential system.  ...  Anonymous credential systems are a key ingredient for a secure and privacy protecting electronic world.  ...  Acknowledgements We enjoyed numerous discussions about Identity Mixer and its implementation with far too many people to mention all of them here. Thanks to all of you!  ... 
doi:10.1007/978-3-642-17303-5_1 fatcat:2ep6fvh5rff77ekmkyaky7jepq

Holistic Privacy-Preserving Identity Management System for the Internet of Things

Jorge Bernal Bernabe, Jose L. Hernandez-Ramos, Antonio F. Skarmeta Gomez
2017 Mobile Information Systems  
It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock).  ...  Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.  ...  Agreement no. 700085 and also by the Spanish MICINN, project EDISON (TIN2014-52099-R).  ... 
doi:10.1155/2017/6384186 fatcat:ov3eiqf2vbem5ar44flvx6thxa

Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities

J. M. de Fuentes, L. González-Manzano, J. Serna-Olvera, F. Veseli
2017 Personal and Ubiquitous Computing  
We assess which ABC techniques are suitable for this scenario, focusing on three representative ones-Idemix, U-Prove and VANETupdated Persiano systems.  ...  Our experimental results show that they are feasible in VANETs considering state-of-theart technologies, and that Idemix is the most promising technique for most of the considered use cases.  ...  Acknowledgements This work was supported by the MINECO  ... 
doi:10.1007/s00779-017-1057-6 fatcat:frqppgar3reyxablg3qviwsr4q

Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency [chapter]

Fatbardh Veseli, Jetzabel Serna
2016 IFIP Advances in Information and Communication Technology  
Interestingly, the study showed that equality predicates, the number of attributes in a credential, and attribute disclosure are done very efficiently.  ...  In this paper, we compare the computational efficiency of two prominent Privacy-ABC technologies, IBM's Idemix and Microsoft's U-Prove, covering all known Privacy-ABC features.  ...  Tesfay and Ahmed S. Yesuf for the fruitful discussions and the feedback that helped us improve the quality of the paper.  ... 
doi:10.1007/978-3-319-41354-9_5 fatcat:lrn3oirng5f5ln2ke2tmyian6e

Preserving Smart Objects Privacy through Anonymous and Accountable Access Control for a M2M-Enabled Internet of Things

José Hernández-Ramos, Jorge Bernabe, M. Moreno, Antonio Skarmeta
2015 Sensors  
This work proposes different privacy-preserving mechanisms through the application of anonymous credential systems and certificateless public key cryptography.  ...  As we get into the Internet of Things era, security and privacy concerns remain as the main obstacles in the development of innovative and valuable services to be exploited by society.  ...  Jorge Bernal Bernabe contributed to the design of the alternatives, experimental evaluation and analysis of the different approaches. M. Victoria Moreno and Antonio F.  ... 
doi:10.3390/s150715611 pmid:26140349 pmcid:PMC4541847 fatcat:lj6fxvebhbeq3eracqxlv7ijfq

Demo

Patrik Bichsel, Franz-Stefan Preiss
2011 Proceedings of the 18th ACM conference on Computer and communications security - CCS '11  
The prototype determines whether and how the user can fulfill the policy with her credentials, which typically results in various options.  ...  Implementing such data-minimizing authentication reduces the number of attack vectors, enables enterprises to reduce the risk associated with possession of sensitive user data, and realizes better privacy  ...  The choice of Idemix as underlying credential technology has implications on the design of the GUI, where we follow the ideas proposed in [2] .  ... 
doi:10.1145/2046707.2093480 fatcat:62drziujpnbkrkhqkrlaowuv6y

PriMan : A Privacy-Preserving Identity Framework [chapter]

Kristof Verslype, Pieter Verhaeghe, Jorn Lapon, Vincent Naessens, Bart De Decker
2010 Lecture Notes in Computer Science  
Moreover, the PriMan framework defines all the components and their functionality required to raise the development of privacy enhanced client-server applications to a higher level.  ...  It offers the application developer a uniform technology-agnostic interface to use and combine different types of privacy enhancing technologies.  ...  This research is partially funded by the Interuniversity Attraction Poles Programme Belgian State, Belgian Science Policy and the Research Fund K.U.Leuven and the IWT-SBO project (ADAPID) "Advanced Applications  ... 
doi:10.1007/978-3-642-13739-6_24 fatcat:tauo3nrxhrhcnpiq5h66yum43y

Federated Identity Management Systems: A Privacy-Based Characterization

Eleanor Birrell, Fred B. Schneider
2013 IEEE Security and Privacy  
Existing systems are analyzed, and a privacy-driven taxonomy of design choices found in these identity management systems is described.  ...  Identity management systems store attributes associated with users, and they facilitate authorization on the basis of these attributes.  ...  The final version of the paper was also much improved from comments provided by editor Shari Pfleeger and the reviewers.  ... 
doi:10.1109/msp.2013.114 fatcat:u7na77cd4jd4nddajflv75aekm

I2PA: An Efficient ABC for IoT

Ibou Sene, Abdoul Aziz Ciss, Oumar Niang
2019 Cryptography  
The Internet of Things (IoT) is very attractive because of its promises. However, it brings many challenges, mainly issues about privacy preservation and lightweight cryptography.  ...  Many schemes have been designed so far but none of them simultaneously takes into account these aspects. In this paper, we propose an efficient attribute-based credential scheme for IoT devices.  ...  Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/cryptography3020016 fatcat:ryhhygqp7bgupmpuozvmsdbzoy

Data-Minimizing Authentication Goes Mobile [chapter]

Patrik Bichsel, Jan Camenisch, Bart De Decker, Jorn Lapon, Vincent Naessens, Dieter Sommer
2012 Lecture Notes in Computer Science  
The prototype uses the Identity Mixer anonymous credential system (Idemix) and realizes short-range communication between the smart phone and the terminal using visual channels over which QR codes are  ...  Our measurements show that the use of smart phones for data-minimizing authentication can be an actual "game changer" for a broad deployment of anonymous credential systems.  ...  For this paper, we implemented a credential handler for the Identity Mixer Anonymous Credential System.  ... 
doi:10.1007/978-3-642-32805-3_5 fatcat:bq2ckt45hnagjjq734dhapd4q4
« Previous Showing results 1 — 15 out of 245 results