2001
DOI: 10.1007/3-540-44647-8_23
|View full text |Cite
|
Sign up to set email alerts
|

An Identity Escrow Scheme with Appointed Verifiers

Abstract: Abstract. An identity escrow scheme allows a member of a group to prove membership in this group without revealing any extra information. At the same time, in case of abuse, his identity can still be discovered. Such a scheme allows anonymous access control. In this paper, we put forward the notion of an identity escrow scheme with appointed verifiers. Such a scheme allows the user to only convince an appointed verifier (or several appointed verifiers) of his membership; but no unauthorized verifier can verify… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
23
0

Year Published

2001
2001
2010
2010

Publication Types

Select...
9
1

Relationship

3
7

Authors

Journals

citations
Cited by 30 publications
(23 citation statements)
references
References 36 publications
0
23
0
Order By: Relevance
“…However, it is not hard to see how to add revocation for other schemes and systems that use some form of anonymous credentials (e.g., [5,11,12,10,13,21,23]). …”
Section: Revocation Of Anonymous Credentialsmentioning
confidence: 99%
“…However, it is not hard to see how to add revocation for other schemes and systems that use some form of anonymous credentials (e.g., [5,11,12,10,13,21,23]). …”
Section: Revocation Of Anonymous Credentialsmentioning
confidence: 99%
“…Although there have been methods proposed to reduce the round complexity of zero-knowledge proofs and the design of non-interactive zero-knowledge proofs, most protocols that use such methods require us to accept a weaker form of security [8]. In this paper we focus on applications of interactive zero-knowledge proofs in verifiable group encryption and a specific application of verifiable encryption: fair exchange of signatures.…”
Section: Cryptographic Protocolsmentioning
confidence: 99%
“…[Leighton 1994;Micali 1993]). The idea can also be traced in group signature schemes and anonymous credential systems, which are mechanisms which can be used to offer identity escrow [Camenisch and Lysyanskaya 2001;2004;Camenisch and Shoup 2003;Kiayias and Yung 2004]. Clearly, the systems break down if a single escrow agent (known as group manager or issuer ) holds the escrowed identity and he is dishonest -he can reveal Alice's identity even if the agreed conditions for doing so have not been met.…”
Section: Introductionmentioning
confidence: 99%