2019
DOI: 10.1007/978-3-030-17253-4_3
|View full text |Cite
|
Sign up to set email alerts
|

Non-interactive Keyed-Verification Anonymous Credentials

Abstract: Anonymous credential (AC) schemes are protocols which allow for authentication of authorized users without compromising their privacy. Of particular interest are noninteractive anonymous credential (NIAC) schemes, where the authentication process only requires the user to send a single message that still conceals its identity. Unfortunately, all known NIAC schemes in the standard model require pairing based cryptography, which limits them to a restricted set of specific assumptions and requires expensive pairi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
1
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 37 publications
(103 reference statements)
0
3
0
Order By: Relevance
“…Anonymous credentials and their constructions come in many flavours [4,24,41], and not all rely on prime order groups alone. Some use pairing groups and some use hidden order groups.…”
Section: Anonymous Credentialsmentioning
confidence: 99%
“…Anonymous credentials and their constructions come in many flavours [4,24,41], and not all rely on prime order groups alone. Some use pairing groups and some use hidden order groups.…”
Section: Anonymous Credentialsmentioning
confidence: 99%
“…Barki et al [3] propose a new KVAC scheme which is currently the most efficient: Proving posession of a credential with u hidden attributes costs u + 12 exponentiations. Couteau and Reichle [25] construct a KVAC scheme with presentation cost 2u + 3 exponentiations in a 2048-bit group, which is less efficient, but works in the standard model. Some of the new constructions were already implemented on the PC platform with promising results [29,35].…”
Section: Related Workmentioning
confidence: 99%
“…RSA Unlink. MAC Security U-Prove [33] u + 1 0 -Idemix [22] 0 u + 3 sRSA [36] Ringers et al [35] n + u + 9 0 whLRSW [40] MAC DDH [23] 6u + 12 0 DDH [8] MAC GGM [23] 5u + 4 0 GGM [37] MAC BB [4] u + 12 0 q-sDH [9] NIKVAC [25] 2u + 3 0 GGM+IND-CPA This work u + 2 0 n-SCDHI [12] 5 Implementation Results…”
Section: Efficiencymentioning
confidence: 99%