2015
DOI: 10.1007/978-3-319-27239-9_4
|View full text |Cite
|
Sign up to set email alerts
|

A New Approach to Efficient Revocable Attribute-Based Anonymous Credentials

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
20
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(20 citation statements)
references
References 38 publications
0
20
0
Order By: Relevance
“…In the revocations of the group signature scheme and anonymous credential systems (e.g., Refs. [3], [11], [17], [21], [22], [24] shown as the related works in Section 1.4), the same approach is often adopted, where the IDs of revoked users are not hidden.…”
Section: Our Contributionsmentioning
confidence: 99%
“…In the revocations of the group signature scheme and anonymous credential systems (e.g., Refs. [3], [11], [17], [21], [22], [24] shown as the related works in Section 1.4), the same approach is often adopted, where the IDs of revoked users are not hidden.…”
Section: Our Contributionsmentioning
confidence: 99%
“…Hébant and Pointcheval proposed [15] a TABAC scheme that allows traceability in case of abuse of credentials, but the tracing authority is needed, and they also did not consider access policy. Similarly, Hajny et al [16] presented an ABAC scheme supporting practical revocation of users, and Derler et al [17] proposed a revocable attribute-based anonymous credential (RABAC) scheme, but they cannot achieve the public traceability and hold the functionality of access control.…”
Section: 2mentioning
confidence: 99%
“…We briefly mention the candidate solutions in the literature. A line of work that can be useful is anonymous credential schemes [3,14,15,17,18,23,31,48] that can be utilized for proving conformation to some attribute policy while keeping the anonymity. However, they cannot be trivially modified for directly providing all requirements of the e-donation at once (e.g., fair distribution of donations among recipients).…”
Section: Related Workmentioning
confidence: 99%
“…The anonymous decentralized e-cash schemes [51,60] cannot be directly applied for the e-donation purpose, as they do not provide a mechanism for anonymous attribute-based money transfer between donors and recipients who are non-privy to each other. Also, it is non-trivial to directly combine these with the existing anonymous attribute proving techniques (e.g., anonymous credentials [14,15,17,18,23,31,48]), attribute based signatures [19,26,32,49,56,67], group signatures [5,16,27,35,55,62,71]), while satisfying the above-mentioned requirements. We note that even letting ICOs use anonymous cryptocurrencies (e.g., Zerocash [60]) does not help with all of our e-donation requirements.…”
Section: Introductionmentioning
confidence: 99%