Proceedings 2014 Network and Distributed System Security Symposium 2014
DOI: 10.14722/ndss.2014.23253
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Anonymous Credentials

Abstract: Anonymous credentials provide a powerful tool for making assertions about identity while maintaining privacy. However, a limitation of today's anonymous credential systems is the need for a trusted credential issuer -which is both a single point of failure and a target for compromise. Furthermore, the need for such a trusted issuer can make it challenging to deploy credential systems in practice, particularly in the ad hoc network setting (e.g., anonymous peer-to-peer networks) where no single party can be tru… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
39
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 97 publications
(45 citation statements)
references
References 45 publications
0
39
0
Order By: Relevance
“…This problem is shared with other schemes for pseudoanymization: for example, Bitnym [FWB15] requires that a Trusted Third Party must check the real identity of a user before allowing the creation of a bounded number of valid genesis pseudonyms. Decentralized Anonymous Credentials [GGM13] was first to show how to decentralise the issuance of anonymous credentials and integrate them within a blockchain (i.e., Bitcoin), but they do not re-use previously existing credentials and they still rely on Proof-of-Work for Sybil-resistance. Decentralized Blacklistable Anonymous Credentials with Reputation [YAXY17] introduce blacklistable reputation on blockchains, but users must also publish their real-world identity (i.e., non-anonymous).…”
Section: Related Literaturementioning
confidence: 99%
“…This problem is shared with other schemes for pseudoanymization: for example, Bitnym [FWB15] requires that a Trusted Third Party must check the real identity of a user before allowing the creation of a bounded number of valid genesis pseudonyms. Decentralized Anonymous Credentials [GGM13] was first to show how to decentralise the issuance of anonymous credentials and integrate them within a blockchain (i.e., Bitcoin), but they do not re-use previously existing credentials and they still rely on Proof-of-Work for Sybil-resistance. Decentralized Blacklistable Anonymous Credentials with Reputation [YAXY17] introduce blacklistable reputation on blockchains, but users must also publish their real-world identity (i.e., non-anonymous).…”
Section: Related Literaturementioning
confidence: 99%
“…Documents and other messages can be notarized by publishing a hash of the data in a Bitcoin transaction, which can later be used to prove that the document existed at a specific time. Other applications of the blockchain technology include the Internet name service (Namecoin) and anonymous credentials [10]. Recently, there has been a rush to propose new financial applications from land registry to diamond trade and from energy markets to tax audits [26].…”
Section: A Bitcoin Blockchain and Public Ledgermentioning
confidence: 99%
“…Some of the authors told that the blockchain technology is decentralized network [10,11] and it is a ledger of all transactions [12] and linked like a linked list [13]. The transactions are shared by all the participants in the network [14]. Every transaction is secured with public-key cryptography concept [15].…”
Section: Literature Surveymentioning
confidence: 99%