2022
DOI: 10.56553/popets-2022-0123
|View full text |Cite
|
Sign up to set email alerts
|

Hidden Issuer Anonymous Credential

Abstract: Identity Management Systems (IMS) allow users to prove characteristics about themselves to multiple service providers. IMS evolved from impractical, site-by-site authentication, to versatile, privacyenhancing Self Sovereign Identity (SSI) Frameworks. SSI frameworks often use Anonymous Credential schemes to provide user privacy, and more precisely unlinkability between uses of these credentials. However, these schemes imply the disclosure of the identity of the Issuer of a given credential to any service provid… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
2
2
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(3 citation statements)
references
References 29 publications
0
2
0
Order By: Relevance
“…Bosk et al identifies the problem that a traditional DID exposes the Issuer's identity to all participants, leading to data breaches. They propose a new anonymous credential using NIZK, a modified PS (Pointcheval Sanders) Signature, and Aggregate, allowing the Holder to hide the Issuer of credentials while ensuring trust in a trustless setting [33]. However, it is not secure when it comes to Sybil attacks, as attackers can create multiple fake identities and exert undue influence within the DID.…”
Section: Scheme Of Anonymity In Didmentioning
confidence: 99%
See 1 more Smart Citation
“…Bosk et al identifies the problem that a traditional DID exposes the Issuer's identity to all participants, leading to data breaches. They propose a new anonymous credential using NIZK, a modified PS (Pointcheval Sanders) Signature, and Aggregate, allowing the Holder to hide the Issuer of credentials while ensuring trust in a trustless setting [33]. However, it is not secure when it comes to Sybil attacks, as attackers can create multiple fake identities and exert undue influence within the DID.…”
Section: Scheme Of Anonymity In Didmentioning
confidence: 99%
“…When creating a single VP based on n VCs for a delegation to provide delegation to m Delegatees, the existing schemes [21,22,32,33] generate with the size being the number of VC for delegation (n) * the number of Delegatee (m) + n * m * VC for delegation. The existing scheme requires m separate original VCs rather than VCs for delegation.…”
Section: Optimization Of Vc Managementmentioning
confidence: 99%
“…Private authentication was introduced by Abadi [17], where the identity of each protocol participant will not be revealed to its peers unless authorized by the participant. There are several techniques that can be applied to achieve private authentication, e.g., secret handshakes [18], that allow members of a group to identify each other privately; hidden credentials [19] that enable the sender to send encrypted messages; mechanisms that ensure that only recipients who meet certain access policies can decrypt the message; and attribute-based encryption schemes [20] that support fine-grained access control over decryption capabilities.…”
Section: Related Workmentioning
confidence: 99%