Filters








3,832 Hits in 2.6 sec

Minimal information disclosure with efficiently verifiable credentials

David Bauer, Douglas M. Blough, David Cash
2008 Proceedings of the 4th ACM workshop on Digital identity management - DIM '08  
In addition to describing the hash tree structure and protocols for constructing and verifying our proposed credential, we formally prove that it provides unforgeability and privacy and we present performance  ...  results demonstrating its efficiency.  ...  Department of Homeland Security under Grant Award Number 2006-CS-001-000001, under the auspices of the Institute for Information Infrastructure Protection (I3P) research program.  ... 
doi:10.1145/1456424.1456428 dblp:conf/dim/BauerBC08 fatcat:yixx4bajlzbyrdhh573dtj575a

Minimal credential disclosure in trust negotiations

Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Squicciarini, Aditi Gupta
2009 Identity in the Information Society  
The approach is based on the integration of trust negotiation and minimal credential disclosure techniques.  ...  Trust negotiations support selective and incremental disclosure of identity attributes, while minimal credential disclosure guarantees that only the attributes necessary to complete the on line interactions  ...  Algorithms 1 reports the steps of credential exchange phase with minimal credential disclosure.  ... 
doi:10.1007/s12394-009-0022-6 fatcat:6imc54lsivdfvhksueiuvhf7ga

Minimal credential disclosure in trust negotiations

Federica Paci, David Bauer, Elisa Bertino, Douglas M. Blough, Anna Squicciarini
2008 Proceedings of the 4th ACM workshop on Digital identity management - DIM '08  
The approach is based on the integration of trust negotiation and minimal credential disclosure techniques.  ...  Trust negotiations support selective and incremental disclosure of identity attributes, while minimal credential disclosure guarantees that only the attributes necessary to complete the on line interactions  ...  Algorithms 1 reports the steps of credential exchange phase with minimal credential disclosure.  ... 
doi:10.1145/1456424.1456439 dblp:conf/dim/PaciBBBS08 fatcat:5qmvxaagyneo5huhskmorvwo3y

Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency [chapter]

Fatbardh Veseli, Jetzabel Serna
2016 IFIP Advances in Information and Communication Technology  
Interestingly, the study showed that equality predicates, the number of attributes in a credential, and attribute disclosure are done very efficiently.  ...  The results show that overall presentation is in general is more efficient with Idemix, whereas U-Prove is more efficient for the User side (proving) operations during the presentation, and overall when  ...  Community's 7th Framework Programme under Grant Agreement no. 257782 for the project ABC4Trust, and from the Horizon 2020 research and innovation programme under grant agreement no. 653454 for the project CREDENTIAL  ... 
doi:10.1007/978-3-319-41354-9_5 fatcat:lrn3oirng5f5ln2ke2tmyian6e

Mechanism of Minimum Credential Disclosure with Privacy Preserved in Trust Builder 2 Framework

Dhiraj Shrestha, Li Jianli
2012 Journal of clean energy technologies  
The privacy of integrated credential is achieved by associating policy that setup conditions for credential disclosure.  ...  Present credential disclosure technique requires disclosing more than one credential to establish a trust during Automated Trust Negotiation (ATN), which is time consuming and requires additional burden  ...  While in parsimonious strategy exchange credentials request that focus on credential exchange, gaining disclosure minimality. Ryan D.  ... 
doi:10.7763/ijcte.2012.v4.615 fatcat:ihmbhhtj4fa7vfqba2lkyp7hpa

A CPN-based Trust Negotiation Model on Service Level Agreement in Cloud Environment

Hongwei Chen, Qiuxia Chen, Chunzhi Wang
2015 International Journal of Grid and Distributed Computing  
A Minimal Credential Path Searching (MCPS) algorithm is proposed to find a minimum credential disclosure set in the reachable marking graph.  ...  credential disclosure set is put forward On the basis of the reachable graph.  ...  A Minimal Credential Path Searching algorithm is proposed to find a minimum credential disclosure set in the reachable graph.  ... 
doi:10.14257/ijgdc.2015.8.2.22 fatcat:6dsgesqucvhwni5mx3hvlbfogu

Authentication Without Identification using Anonymous Credential System [article]

A. Damodaram, H. Jayasri
2009 arXiv   pre-print
A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials.  ...  To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com).  ...  The technology was also called minimal disclosure certificates by Stefan Brands.  ... 
arXiv:0908.0979v1 fatcat:vkofx23mqffq5i4v2ydztcspb4

Secure E-Health: Managing Risks to Patient Personal Identity

Haryadi Amran D., Mike Yuliana, Reni Soelistijorini, Amang Sudarsono
2017 European Scientific Journal  
By using this credential, the user can prove the ownership to the third party without revealing the information that contained in credential information more than necessary.  ...  Anonymous credential allows an organization to give a credential to a user. This credential consists of user attribute such as address and date of birth.  ...  Anonymous credential system allows users to prove the ownership of the credential, by minimizing the disclosure of information.  ... 
doi:10.19044/esj.2017.v13n24p377 fatcat:q3nqkb3k2jbzjesaojmdrjxvie

Towards a Framework for Benchmarking Privacy-ABC Technologies [chapter]

Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
2014 IFIP Advances in Information and Communication Technology  
Technologies based on attribute-based credentials (Privacy-ABC) enable identity management systems that require minimal disclosure of personal information and provide unlinkability of user's transactions  ...  They eliminate the need for an active participation of the identity service provider during the authentication of the user, and enable minimal disclosure of personal information for authentication purposes  ...  In a presentation protocol the User can prove the possession of credentials and disclose certain information to the Verifier using Privacy-ABC.  ... 
doi:10.1007/978-3-642-55415-5_16 fatcat:huxxhnyhjbez5erkwnfowknyxi

PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale [article]

Muhammad Rizwan Asghar, Michael Backes, Milivoj Simeonovski
2016 arXiv   pre-print
Moreover, throughout the authentication process, PRIMA provides a mechanism for controlled disclosure of the users' private information.  ...  In this work, we propose PRIMA, a universal credential-based authentication system for supporting federated identity management in a privacy-preserving manner.  ...  Online Cinema -Minimal disclosure.  ... 
arXiv:1612.01787v1 fatcat:bkofutaufbbahglmwfndx4twbq

Minimizing Disclosure of Private Information in Credential-based Interactions: A Graph-based Approach

Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati
2010 2010 IEEE Second International Conference on Social Computing  
Exploiting a graph modeling of the problem, we develop a heuristic approach for determining a disclosure minimizing released information, that offers execution times compatible with the requirements of  ...  We address the problem of enabling clients to regulate disclosure of their credentials and properties when interacting with servers in open scenarios.  ...  Among all the minimal disclosures G d1 , . . . , G di , the one with lowest sensitivity is returned.  ... 
doi:10.1109/socialcom.2010.115 dblp:conf/socialcom/ArdagnaVFPS10 fatcat:ben5xhe2rzbofhpyludtubk76u

I2PA : An Efficient ABC for IoT [article]

Ibou Sene, Abdoul Aziz Ciss, Oumar Niang
2019 arXiv   pre-print
Our scheme supports block signing, selective disclosure and randomization. It provides data minimization and transactions' unlinkability.  ...  Our construction is efficient since smaller key size can be used and computing time can be reduced.  ...  information : Refers to the privacy feature that guarantees that during the verification protocols no other information is revealed to the verifier beyond the disclosed attributes, the credential names  ... 
arXiv:1904.08342v1 fatcat:7coirkrqkffqlh3izfcdxmityu

Redactable signatures on data with dependencies and their application to personal health records

David Bauer, Douglas M. Blough, Apurva Mohan
2009 Proceedings of the 8th ACM workshop on Privacy in the electronic society - WPES '09  
Our prior work on minimal disclosure credentials presented a mechanism to control the dissemination of personal information.  ...  In this work, we provide an efficient way to provide minimal disclosure, but with cryptographic enforcement of dependencies between claims, as specified by the claims certifier.  ...  While digital credentials are one application area for minimal disclosure technology, it can also be applied to general disclosure of sensitive personal information, e.g. financial records or medical records  ... 
doi:10.1145/1655188.1655201 dblp:conf/wpes/BauerBM09 fatcat:rpn5ngjyzrh3hcmattcyflypfq

Minimising disclosure of client information in credential-based interactions

Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Sara Foresti, Stefano Paraboschi, Pierangela Samarati
2012 International Journal of Information Privacy Security and Integrity  
impose on information disclosure.  ...  Exploiting a graph modeling of the problem, the user can determine the credentials and properties to disclose to satisfy a server request while minimizing the sensitivity of the information disclosed.  ...  Section 10 describes our heuristic algorithm for computing a minimal disclosure satisfying a given request and presents experimental results proving its efficiency and effectiveness.  ... 
doi:10.1504/ijipsi.2012.046133 fatcat:d5yc4s3sa5bm3e67hmkp2a6riu

Privacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential

Nan Guo, Jia Wang, Tianhan Gao, Kangbin Yim
2014 Journal of Internet Services and Information Security  
To adhere to the minimal information disclose principle, the anonymous credential facilitates predicate proofs of attributes without revealing the values.  ...  The anonymous credential system allows users to convince relying parties the possession of a credential released by an issuer.  ...  The reason of the anonymous credentials having become so popular is that they allow users to anonymously prove the possession of a credential, and adhere to minimal information disclosure principle as  ... 
doi:10.22667/jisis.2014.02.31.037 dblp:journals/jisis/GuoWGY14 fatcat:yffx7imranco7m3ufz2cmpohke
« Previous Showing results 1 — 15 out of 3,832 results