Proceedings of the 16th International Conference on Availability, Reliability and Security 2021
DOI: 10.1145/3465481.3469204
|View full text |Cite
|
Sign up to set email alerts
|

Towards a standardized model for privacy-preserving Verifiable Credentials

Abstract: Lack of standardization and the subsequent difficulty of integration has been one of the main reasons for the scarce adoption of privacy-preserving Attribute-Based Credentials (p-ABC). Integration with the W3C's Verifiable Credentials (VC) specification would help by encouraging homogenization between different p-ABC schemes and bringing them all closer to other digital credentials.What is more, p-ABCs can help to solve privacy issues that have been identified in applications of VCs to use cases like vaccinati… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 5 publications
0
1
0
Order By: Relevance
“…Firstly, traditional decentralized verifiable credential system has privacy leakage defect of excessive exposure of personal information, that is, credential contains many information of user, while verifier may only need to obtain some information of the user. User does not want to expose personal information to verifier excessively, which has the problem of privacy protection [4]. Secondly, traditional research does not focus on how to aggregate different credentials into one credential, which is essential in practical application scenarios.…”
Section: Introductionmentioning
confidence: 99%
“…Firstly, traditional decentralized verifiable credential system has privacy leakage defect of excessive exposure of personal information, that is, credential contains many information of user, while verifier may only need to obtain some information of the user. User does not want to expose personal information to verifier excessively, which has the problem of privacy protection [4]. Secondly, traditional research does not focus on how to aggregate different credentials into one credential, which is essential in practical application scenarios.…”
Section: Introductionmentioning
confidence: 99%