2016
DOI: 10.1007/978-3-319-41354-9_5
|View full text |Cite
|
Sign up to set email alerts
|

Evaluation of Privacy-ABC Technologies - a Study on the Computational Efficiency

Abstract: Privacy-enhancing attribute-based credential (Privacy-ABC) technologies use different cryptographic methods to enhance the privacy of the users. This results in important practical differences between these technologies, especially with regard to efficiency, which have not been studied in depth, but is necessary for assessing their suitability for different user devices and for highly dynamic scenarios. In this paper, we compare the computational efficiency of two prominent Privacy-ABC technologies, IBM's Idem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 21 publications
(29 reference statements)
0
2
0
Order By: Relevance
“…However, our model could be extended to include a separate entity or entities such as, inspector which can be responsible for de-anonymizing vehicles instead of the CA. The inspection key could be divided between multiple organizations where at least two of them need to come together to join their key parts and perform inspection [28]. The system could also be extended to give provers the ability to prove possession of a known certified attribute and the ability to share that attribute.…”
Section: Discussionmentioning
confidence: 99%
“…However, our model could be extended to include a separate entity or entities such as, inspector which can be responsible for de-anonymizing vehicles instead of the CA. The inspection key could be divided between multiple organizations where at least two of them need to come together to join their key parts and perform inspection [28]. The system could also be extended to give provers the ability to prove possession of a known certified attribute and the ability to share that attribute.…”
Section: Discussionmentioning
confidence: 99%
“…On a theoretical level, authors of [15], [16] have addressed the importance of computational efficiency in resource-constrained devices. Fatbardh et al [17] have evaluated the computational efficiency of Idemix and U-prove. Their results shown that U-prove is more efficient than Idemix for the User operation (proving) and in general when a credential has more attributes.…”
Section: Related Workmentioning
confidence: 99%
“…More specifically, at the heart of P4G2Go lies the Idemix anonymous credential system that enables selective disclosure of attributes that prove that an energy consumer (i.e., the tenant) is legitimate without however disclosing their real identity to untrusted utilities. Idemix provides unlinkability of charging sessions and energy consumption by roaming consumers [13,14], regardless of the number of times the same credential has been used for verification. This is of paramount importance as colluding utilities can try to track the trajectory of roaming consumers as they move from one place to another.…”
Section: Introductionmentioning
confidence: 99%