Filters








1,175 Hits in 4.4 sec

Privacy-Enhancing Proxy Signatures from Non-interactive Anonymous Credentials [chapter]

David Derler, Christian Hanser, Daniel Slamanig
2014 Lecture Notes in Computer Science  
Inspired by this observation, we examine black-box constructions of the two aforementioned proxy signatures from non-interactive anonymous credentials, i.e., anonymous credentials with a non-interactive  ...  proxy signatures, from anonymous credentials.  ...  From Anonymous Credentials to Proxy-Signatures Subsequently, we show how privacy-enhancing proxy signatures can be built from non-interactive anonymous credential systems.  ... 
doi:10.1007/978-3-662-43936-4_4 fatcat:3tdjgmmkmng3znesngeoiozsry

Extending Signatures of Reputation [chapter]

Emmanuelle Anceaume, Gilles Guette, Paul Lajoie-Mazenc, Thomas Sirvent, Valérie Viet Triem Tong
2014 IFIP Advances in Information and Communication Technology  
designs either rely on a trusted central authority to handle the casting of votes and the derivation of reputation scores, or are based on a distributed environment and use cryptographic tools (e.g. non-interactive  ...  This is achieved by combining algorithms and tools from both the distributed and the cryptographic communities.  ...  In order to guarantee the properties of unforgeability (i.e. unforgeability of votes, interaction proofs and reputation scores), we use anonymous proxy signatures [14] .  ... 
doi:10.1007/978-3-642-55137-6_13 fatcat:f7b3ddidtvcndivf5pwqp7q3um

Architecting Adaptable Security Infrastructures for Pervasive Networks through Components [chapter]

Marc Lacoste
2009 Communications in Computer and Information Science  
Many cryptographic primitives such as anonymous credentials [15] [17] , fair-blind signatures [45] , group signatures [20] , traceable signatures [33] , or ring signatures [43] have been proposed  ...  Research mostly focused on languages such as [46] to negotiate a level of privacy, and on advanced cryptography such as anonymous credentials [17] [19] [15] and new types of signatures [20] [33]  ... 
doi:10.1007/978-3-642-10844-0_34 fatcat:2g3trfavdffyhbmh4iiuw7yoh4

Privacy-enhanced, Attack-resilient Access Control in Pervasive Computing Environments with Optional Context Authentication Capability

Kui Ren, Wenjing Lou
2006 Journal on spesial topics in mobile networks and applications  
In this paper, we propose a novel privacy enhanced anonymous authentication and access control scheme to secure the interactions between mobile users and services in PCEs with optional context authentication  ...  It provides explicit mutual authentication and allows multiple current sessions between a user and a service, while allowing the user to anonymously interact with the service.  ...  This can be useful in schemes where anonymity is required. Blind signature schemes find a great deal of use in applications where sender privacy is important.  ... 
doi:10.1007/s11036-006-0008-7 fatcat:tyigwbl2lvdxzfapmh33j4kvhu

Anonymity And Accountability In Web Based Transactions

H Jayasree
2012 Advanced Computing An International Journal  
In the on-line world, the conflict between privacy and security manifests itself in a debate between anonymity and accountability.  ...  Balance between Anonymity and Accountability is a major concern in web based transactions.  ...  and privacy.  ... 
doi:10.5121/acij.2012.3217 fatcat:5qu4guzzwjdtxkezb7fs47rgpi

Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency [chapter]

Fatbardh Veseli, Jetzabel Serna
2016 IFIP Advances in Information and Communication Technology  
Privacy-enhancing attribute-based credential (Privacy-ABC) technologies use different cryptographic methods to enhance the privacy of the users.  ...  For both technologies we confirmed that inspectability, non-revocation proofs, and inequality predicates are costly operations.  ...  and innovation programme under grant agreement no. 653454 for the project CREDENTIAL.  ... 
doi:10.1007/978-3-319-41354-9_5 fatcat:lrn3oirng5f5ln2ke2tmyian6e

Current and future privacy enhancing technologies for the internet

Yves Deswarte, Carlos Aguilar Melchor
2006 Annales des télécommunications  
This paper presents an overview of the current and next solutions for privacy protection on the Internet. We highlight five categories of Privacy Enhancing Technologies (PETS).  ...  La troisième catégorie de technologies vise l'accès anonyme aux services.  ...  Acknowledgements The authors wish to thank the anonymous referees for careful reading and fruitful remarks on a previous version of this paper.  ... 
doi:10.1007/bf03219914 fatcat:6h24dvvqxzcujiydmgjz5aslam

Opportunities and Challenges of CREDENTIAL [chapter]

Farzaneh Karegar, Christoph Striecks, Stephan Krenn, Felix Hörandner, Thomas Lorünser, Simone Fischer-Hübner
2016 IFIP Advances in Information and Communication Technology  
In order to achieve this, credential will employ advanced cryptographic mechanisms, such as proxy re-encryption [1] and redactable signatures [2] .  ...  The CREDENTIAL Project The overall vision of credential is to develop a user-centric cloud-based data storage and sharing platform, which enhances the user's privacy compared to current approaches and  ... 
doi:10.1007/978-3-319-55783-0_7 fatcat:d3bagxdtwndb3cjvzhj3wlziba

Privacy-preserving solutions for Blockchain: review and challenges

Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
2019 IEEE Access  
To deal with these challenges, novel privacy-preserving solutions for blockchain based on crypto-privacy techniques are emerging to empower users with mechanisms to become anonymous and take control of  ...  with privacy regulations (e.g.  ...  Privacy as Control can be implemented through Privacy Enhancing Technologies (PET), ensuring selective and minimal disclosure of credentials and personal attributes using, for instance, Anonymous Credential  ... 
doi:10.1109/access.2019.2950872 fatcat:kf2rl7onmrbvnozjudspxrcatu

A Secure and Privacy-Preserving Targeted Ad-System [chapter]

Elli Androulaki, Steven M. Bellovin
2010 Lecture Notes in Computer Science  
However, protecting privacy through anonymity seems to encourage click-fraud.  ...  in our system, and 4. we based our protocols on ecash and unlinkable credential systems Organization In the following section we present current ad-systems' architecture.  ...  (e) Non-framability. An honest user should never be blocked from access.  ... 
doi:10.1007/978-3-642-14992-4_12 fatcat:yal2jmmyprcjbbjsvjjmfoocfe

Signatures for Privacy, Trust and Accountability in the Cloud: Applications and Requirements [chapter]

Alaa Alaqra, Simone Fischer-Hübner, Thomas Groß, Thomas Lorünser, Daniel Slamanig
2016 IFIP Advances in Information and Communication Technology  
Acknowledgements: The authors have received funding from the the European Union's Horizon 2020 research and innovation programme under grant agreement No 644962 (Prismacloud project).  ...  Anonymous credentials (often denoted Privacy ABCs or simply ABCs) [5] are an important privacy-enhancing cryptographic tool that can be used to realize a privacy-friendly authentication mechanisms.  ...  Anonymous credentials.  ... 
doi:10.1007/978-3-319-41763-9_6 fatcat:jmgjwbeuirg2hcffokhzo63kwi

Post-Quantum Era Privacy Protection for Intelligent Infrastructures

Lukas Malina, Petr Dzurenda, Sara Ricci, Jan Hajny, Gautam Srivastava, Raimundas Matulevicius, Abasi-amefon O. Affia, Maryline Laurent, Nazatul Haque Sultan, Qiang Tang
2021 IEEE Access  
Next, we summarize some selected Privacy-Enhancing Technologies (PETs) suitable for privacy-concerned II services, and then map recent PET schemes based on post-quantum cryptographic primitives which are  ...  This in-depth survey begins with an overview of security and privacy threats in IoT/IIs.  ...  PRIVACY-ENHANCING USER AUTHENTICATION 1) ATTRIBUTE-BASED CREDENTIALS Attribute-Based Credential (ABC), sometimes called anonymous credential or private certificate, is a core technology used in privacy-friendly  ... 
doi:10.1109/access.2021.3062201 fatcat:kqcwwqjfjnds7bzlrid7r6gjlu

Privacy-Enhancing Technologies for the Internet III [chapter]

Ian Goldberg
2007 Digital Privacy  
Conclusion The last five years have seen a small increase in the availability of privacy-enhancing technologies for the Internet, including at least one, Tor, which is seeing significant use.  ...  We need more technologies that move all the way from design to widespread use and we suggest that the four principles of useful security and privacy technologies-usability, deployability, effectiveness  ...  OTR avoids using traditional non-repudiable digital signatures for authentication of messages; if messages from Alice had been digitally signed, Charlie could easily check the signatures for himself.  ... 
doi:10.1201/9781420052183.ch1 fatcat:hab35uarbzeinizhv3qrpjwtqa

The Key to Intelligent Transportation: Identity and Credential Management in Vehicular Communication Systems

Mohammad Khodaei, Panos Papadimitratos
2015 IEEE Vehicular Technology Magazine  
Vehicular Communication (VC) systems will greatly enhance intelligent transportation systems. But their security and the protection of their users' privacy are a prerequisite for deployment.  ...  and privacy challenges.  ...  The research leading to these results received funding from the Preparing Secure Vehicle-to-X Communication Systems (PRESERVE) FP7 European project (http://www.preserveproject.eu).  ... 
doi:10.1109/mvt.2015.2479367 fatcat:qs7rroqh4ndydjlxskcviy2t5i

Cryptographic Approaches for Privacy Preservation in Location-Based Services

Emmanouil Magkos
2011 International Journal of Information Technologies and Systems Approach  
This paper surveys the current state of knowledge concerning the use of cryptographic primitives for privacy-preservation in LBS applications.  ...  Current research in location-based services (LBSs) highlights the importance of cryptographic primitives in privacy preservation for LBSs, and presents solutions that attempt to support the (apparently  ...  Finally, research for identity privacy in the LBS context may have something to gain from the literature on anonymous credentials (Camenisch & Lysyanskaya, (2001 ; Camenisch et al, 2006; Belenkiy et  ... 
doi:10.4018/jitsa.2011070104 fatcat:3avyvhgm5zhlbo3b47wkd56i6e
« Previous Showing results 1 — 15 out of 1,175 results