Concepts Around Privacy-Preserving Attribute-Based Credentials - Making Authentication with Anonymous Credentials Practical

This article provides a short overview of the concepts around privacy-preserving attribute-based authentication. It then briefly discusses the cryptographic realisation of these concepts and describes an architecture implementing them.

[1]  Marit Hansen,et al.  PRIME white paper v3, May 2008 , 2008 .

[2]  Moti Yung,et al.  A New Randomness Extraction Paradigm for Hybrid Encryption , 2009, EUROCRYPT.

[3]  Jan Camenisch,et al.  An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..

[4]  Aggelos Kiayias,et al.  On the Portability of Generalized Schnorr Proofs , 2009, EUROCRYPT.

[5]  Jan Camenisch,et al.  Mixing Identities with Ease , 2010, IDMAN.

[6]  Jan Camenisch,et al.  A Signature Scheme with Efficient Protocols , 2002, SCN.

[7]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[8]  Jan Camenisch,et al.  Electronic Identities Need Private Credentials , 2012, IEEE Security & Privacy.

[9]  Jan Camenisch,et al.  Concepts and languages for privacy-preserving attribute-based authentication , 2013, J. Inf. Secur. Appl..

[10]  Erik Wästlund,et al.  The Users' Mental Models' Effect on their Comprehension of Anonymous Credentials , 2011, Privacy and Identity Management for Life.

[11]  Yannis C. Stamatiou Privacy Respecting ICT Innovations in Education: Electronic Course Evaluations in Higher Education and Beyond , 2013, Privacy and Identity Management.

[12]  Jan Camenisch,et al.  Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.

[13]  Dan Boneh,et al.  Advances in Cryptology - CRYPTO 2003 , 2003, Lecture Notes in Computer Science.

[14]  Jan Camenisch,et al.  Practical Verifiable Encryption and Decryption of Discrete Logarithms , 2003, CRYPTO.

[15]  Simone Fischer-Hübner,et al.  Policies and Research in Identity Management - First IFIP WG11.6 Working Conference on Policies and Research in Identity Management (IDMAN'07), RSM Erasmus University, Rotterdam, The Netherlands, October 11-12, 2007 , 2008, IDMAN.

[16]  Matthew Franklin,et al.  Advances in Cryptology – CRYPTO 2004 , 2004, Lecture Notes in Computer Science.