2013
DOI: 10.1007/978-3-642-37282-7_4
|View full text |Cite
|
Sign up to set email alerts
|

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication

Abstract: Abstract. Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group signatures vary largely in the features they offer and in how these features are realized. Some features such as revocation or de-anonymization even require the combination of several cryptographic protocols. These differences and the complexity of the cryptographic protocols hinder the deployment of these mechanisms for pract… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 39 publications
(25 citation statements)
references
References 49 publications
0
24
0
Order By: Relevance
“…Anonymous credentials [158] allow users to obtain credentials from authorities and use these credentials while ensuring that transactions cannot be linked to each other or to the user. Attribute-based credentials rely on anonymous credentials and add features for revocation and de-anonymization [159]. Attribute-based credentials have many potential uses in smart cities, for example to allow users to authenticate with cloud providers without revealing their identities [19].…”
Section: B Data-oriented Privacy Protectionmentioning
confidence: 99%
See 1 more Smart Citation
“…Anonymous credentials [158] allow users to obtain credentials from authorities and use these credentials while ensuring that transactions cannot be linked to each other or to the user. Attribute-based credentials rely on anonymous credentials and add features for revocation and de-anonymization [159]. Attribute-based credentials have many potential uses in smart cities, for example to allow users to authenticate with cloud providers without revealing their identities [19].…”
Section: B Data-oriented Privacy Protectionmentioning
confidence: 99%
“…Even in cases where authentication is required, it is not necessary to create a link between user and transaction. Instead, attribute-based credentials allow the system to cryptographically verify certain of the user's attributes (for example, a student or discounted fares attribute would indicate that the user is entitled to discounted bus fares) without revealing the user identity [159].…”
Section: B Smart Cardsmentioning
confidence: 99%
“…Individuals conducting transactions might not need to have accounts to exchange value with each other; we surmise that the regulated intermediary would perform the service for a fee. We also suggest that the intermediary would not be required to carry out strong identification of the sort required by the FATF recommendations (Financial Action Task Force, 2018) but might require a less-stringent form of identification, such as an attribute-backed credential indicating that either the sender or the receiver are eligible to transact (Camenisch et al, 2013). Regulated intermediaries could also provide token mixing services for groups of individuals who satisfy AML criteria, without explicitly requiring knowledge of their unitary identities.…”
Section: Institutionally Mediated Private Value Exchangementioning
confidence: 99%
“…Such an architecture may optionally also include an entity that takes care of revocation of credentials, and another entity that can revoke the anonymity of otherwise anonymous users. The main interactions between Privacy-ABCs system entities [7] can be represented by the different stages of its lifecycle, that is, issuance, presentation, inspection, and revocation.…”
Section: Introductionmentioning
confidence: 99%