2009
DOI: 10.1007/978-3-642-00468-1_27
|View full text |Cite
|
Sign up to set email alerts
|

An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials

Abstract: Abstract. The success of electronic authentication systems, be it e-ID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of user-privacy. Thereby, an important requirement is an efficient means for revocation of the authentication credentials. In this paper we consider the problem of revocation for certificate-based privacy-protecting authentication systems. To date, the most efficient solutions for revocation for such systems are based on cryptographic acc… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
202
0

Year Published

2011
2011
2019
2019

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 212 publications
(210 citation statements)
references
References 40 publications
1
202
0
Order By: Relevance
“…The issuer will include this revocation value in the credential without ever learning its value. 8 Option 1: only the user knows the revocation value. The privacy of the credential owner is best protected when only she knows the revocation value.…”
Section: Obtaining Revocation Informationmentioning
confidence: 99%
See 2 more Smart Citations
“…The issuer will include this revocation value in the credential without ever learning its value. 8 Option 1: only the user knows the revocation value. The privacy of the credential owner is best protected when only she knows the revocation value.…”
Section: Obtaining Revocation Informationmentioning
confidence: 99%
“…Table 1. We compare CRLs [14], accumulators [8,10,24], traditional VLR schemes [1,4,6], VLR schemes with backward unlinkability (VLR-BU) [22], blacklistable anonymous credentials (BLAC) [28], and our scheme. We compare the complexity of the operations and data transfers.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Thereafter, many revocable group signature schemes were built, e.g. [3,11,12,13,14,15,16,18,19,20,21,23,24,25,26,31,32]. The first popular approach for handling revocation in group signature schemes is based on dynamic accumulators, originally applied by Camenisch and Lysyanskaya [16], and later adopted to further constructions [20,15,30].…”
Section: Prior Work On Revocable Group Signaturesmentioning
confidence: 99%
“…This property, known as BU-anonymity, was introduced in [13] and further considered in [12,19,25,26,31,32]. Many of existing revocable group signature schemes [3,11,12,13,14,15,16,19,25,26,31,32] have linear computation complexity for the generation and/or verification of group signatures, either O(N) with N being the number of group members, or O(R) with R being the number of revoked members. 1 Jin et al [18] claim that their revocable group signature scheme has constant costs with regard to signing/verifying and lengths of signatures, group public key, and individual secret signing keys.…”
Section: Prior Work On Revocable Group Signaturesmentioning
confidence: 99%