Filters








175 Hits in 5.5 sec

Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards [chapter]

Jan Hajny, Lukas Malina
2013 Lecture Notes in Computer Science  
The problem of existing credential schemes is that they do not allow the practical revocation of malicious or expired users when slow off-line devices (for example, smart-cards) are used for storing attributes  ...  Attribute-based credentials are cryptographic schemes designed to enhance user privacy. These schemes can be used for constructing anonymous proofs of the ownership of personal attributes.  ...  The proposal is the first practical scheme implementable on off-line smart-cards.  ... 
doi:10.1007/978-3-642-37288-9_5 fatcat:gsqke5qhkrdnvn5wnqjfgvtllm

Fast revocation of attribute-based credentials for both users and verifiers

Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers
2017 Computers & security  
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking such credentials, which requires singling them out, is hard because it is at odds with anonymity.  ...  We trade only a limited, but well-defined, amount of anonymity to make the first practical revocation scheme that is efficient at large scales and fast enough for smart cards.  ...  It can be combined with ABC showing protocols and can be fully implemented on a smart card.  ... 
doi:10.1016/j.cose.2016.11.018 fatcat:mqmvzwuhlfgwvbqfhaamr32pku

Fast Revocation of Attribute-Based Credentials for Both Users and Verifiers [chapter]

Wouter Lueks, Gergely Alpár, Jaap- Henk Hoepman, Pim Vullers
2015 IFIP Advances in Information and Communication Technology  
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking such credentials, which requires singling them out, is hard because it is at odds with anonymity.  ...  This research is part of the ongoing research project "I Reveal My Attributes" (IRMA). 2 The goal of this project is to demonstrate the practicality of attribute-based credentials.  ...  To achieve this, epochs are, in practice, based on time.  ... 
doi:10.1007/978-3-319-18467-8_31 fatcat:b5gohmj63bezfk7scznxzd55ua

Readiness of Anonymous Credentials for Real Environment Deployment

Raúl Casanova-Marqués, Petr Dzurenda
2022 Zenodo  
acknowledge funding from European Union's Horizon 2020 Research and Innovation programme under the Marie Skłodowska Curie grant agreement No. 813278 (A-WEAR: A network for dynamic wearable applications with  ...  The system is based on an attribute-based credentials protocol with the capability to revoke users. PEAS was tested on smart cards, smartphones, and smartwatches.  ...  In addition, it is also practical to run on restricted platforms such as smart cards, smartphones, and smartwatches.  ... 
doi:10.5281/zenodo.6623793 fatcat:s4y3h5yzzvghlfmesxa3bnv5na

Towards a Framework for Benchmarking Privacy-ABC Technologies [chapter]

Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ioannis Krontiris, Kai Rannenberg, Neeraj Suri
2014 IFIP Advances in Information and Communication Technology  
Technologies based on attribute-based credentials (Privacy-ABC) enable identity management systems that require minimal disclosure of personal information and provide unlinkability of user's transactions  ...  enables revocation of the secret key instead of a credential attribute (for instance, to revoke all credentials based on a given key at once).  ...  her credentials are not revoked, limiting the deployability of these technologies on devices with network capabilitiy (making them infeasible such as smart cards).  ... 
doi:10.1007/978-3-642-55415-5_16 fatcat:huxxhnyhjbez5erkwnfowknyxi

Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency [chapter]

Fatbardh Veseli, Jetzabel Serna
2016 IFIP Advances in Information and Communication Technology  
Privacy-enhancing attribute-based credential (Privacy-ABC) technologies use different cryptographic methods to enhance the privacy of the users.  ...  there are more attributes in a credential.  ...  Community's 7th Framework Programme under Grant Agreement no. 257782 for the project ABC4Trust, and from the Horizon 2020 research and innovation programme under grant agreement no. 653454 for the project CREDENTIAL  ... 
doi:10.1007/978-3-319-41354-9_5 fatcat:lrn3oirng5f5ln2ke2tmyian6e

Trusted Computing to Increase Security and Privacy in eID Authentication [chapter]

Jan Vossaert, Jorn Lapon, Bart De Decker, Vincent Naessens
2014 IFIP Advances in Information and Communication Technology  
The solution further extends existing smart card assisted authentication technology based on X.509 credentials with privacy-preserving features such as multi-show unlinkability and selective disclosure  ...  The solution relies on a secure execution environment running on the workstation. We have put our solution into practice and implemented a prototype.  ...  The solution further extends existing smart card assisted authentication technology based on X.509 credentials with privacy-preserving features such as multi-show unlinkability and selective disclosure  ... 
doi:10.1007/978-3-642-55415-5_41 fatcat:yxxxtzao2vepnd6g67iu6ebfsi

Practical Revocable Anonymous Credentials [chapter]

Jan Hajny, Lukas Malina
2012 Lecture Notes in Computer Science  
In this paper, a novel conception for anonymous credentials with practical revocation is proposed.  ...  Mostly, the authentication protocols based on traditional cryptographic constructions, such as digital signatures, hash functions and symmetric encryption schemes, are used.  ...  Unlike existing systems, our system provides efficient revocation. The conception proposed in this paper is currently being implemented on smart-cards.  ... 
doi:10.1007/978-3-642-32805-3_22 fatcat:btschksqxfb5rm7i6c4blp56ey

A secure channel for attribute-based credentials

Gergely Alpár, Jaap-Henk Hoepman
2013 Proceedings of the 2013 ACM workshop on Digital identity management - DIM '13  
Attribute-based credentials (ABCs) are building blocks for user-centric identity management.  ...  Based on this concept, we propose a security model that includes mutual authentication and setting up a channel between a card and a verifier.  ...  For instance, a membership attribute on one card could be combined with an "over 18" attribute on another card.  ... 
doi:10.1145/2517881.2517884 dblp:conf/dim/AlparH13 fatcat:d64hv4lc3ze5vawworkw5wh55u

Saving On-Line Privacy [chapter]

Jan Camenisch, Gregory Neven
2010 IFIP Advances in Information and Communication Technology  
With the increasing use of electronic media for our daily transactions, we widely distribute our personal information.  ...  Privacy-enhancing technologies can help to minimize the amount of information that needs to be revealed in transactions, on the one hand, and to limit the dispersal, on the other hand.  ...  Acknowledgements The authors enjoyed many exciting discussions with the participants of the PrimeLife project, some of them leading us to write this overview. Thank you all!  ... 
doi:10.1007/978-3-642-14282-6_3 fatcat:vkrzndnqsved3o263ihe5gdqya

Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities

J. M. de Fuentes, L. González-Manzano, J. Serna-Olvera, F. Veseli
2017 Personal and Ubiquitous Computing  
Assessment of attribute-based credentials for privacypreserving road traffic services in smart cities. Abstract Smart cities involve the provision of advanced services for road traffic users.  ...  A set of techniques, referred to as Attribute-Based Credentials (ABCs), have been proposed to address this need in traditional computation scenarios.  ...  For instance, that the name contained on a credit card and on a passport match.  ... 
doi:10.1007/s00779-017-1057-6 fatcat:frqppgar3reyxablg3qviwsr4q

Self-blindable Credential: Towards Anonymous Entity Authentication Upon Resource Constrained Devices [chapter]

Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng, Jianying Zhou
2015 Lecture Notes in Computer Science  
The first scheme implements verifier-local revocation and the second scheme enhances the former with forward security.  ...  The need for individual privacy protection calls for anonymous entity authentication techniques with affordable efficiency upon the resource-constrained smart devices.  ...  Although the IDEMIX anonymous credential and the Direct Anonymous Attestation (both are RSA-based) have been implemented on JAVA card, e.g., [5, 9, 16, 29] , the implementations either are not practically  ... 
doi:10.1007/978-3-319-27659-5_17 fatcat:xvxbwm4avfc2xmuh4dfqljx2cu

Efficient and Traceable Anonymous Credentials on Smart Cards

Wei Wu
2022 Computer and Information Science  
Anonymous credential (AC) systems allow users, obtaining a credential on a set of attributes, to anonymously prove ownership of the credential and then to selectively disclose a subset of attributes without  ...  To demonstrate the efficiency and feasibility, we present an implementation of our scheme on standard Multos smart cards.  ...  Due to MEL providing the full base for programming MULTOS cards, we can easily write programs and implement our KVAC system on the MULTOS smart cards.  ... 
doi:10.5539/cis.v15n2p58 fatcat:ej6xv33znzcttmkvsl2c5fwgie

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication [chapter]

Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, Franz-Stefan Preiss
2013 IFIP Advances in Information and Communication Technology  
We define and unify the concepts and features of privacy-preserving attribute-based credentials (Privacy-ABCs) and provide a language framework in XML schema.  ...  Some features such as revocation or de-anonymization even require the combination of several cryptographic protocols.  ...  Issuer-driven revocation is performed based on the revocation handle, which is a dedicated unique attribute embedded in a credential.  ... 
doi:10.1007/978-3-642-37282-7_4 fatcat:a2upj4ei7zcspkw5km5bmhcs4e

Anonymous credentials on a standard java card

Patrik Bichsel, Jan Camenisch, Thomas Groß, Victor Shoup
2009 Proceedings of the 16th ACM conference on Computer and communications security - CCS '09  
Still, we present the first practical implementation of an anonymous credential system on a Java Card 2.2.1.  ...  In addition, we provide a formal system specification and share our solution strategies and experiences gained and with the Java Card.  ...  Relations based on blind signatures such as those by Brands have a severe drawback when it comes to implementations on a smart card: Proving possession of a credential in an unlinkable, i.e., privacy-maintaining  ... 
doi:10.1145/1653662.1653734 dblp:conf/ccs/BichselCGS09 fatcat:oxcpzpptovhz7k7sg24tr7jlye
« Previous Showing results 1 — 15 out of 175 results