Advertisement

\(\mathcal {PCS}\), A Privacy-Preserving Certification Scheme

  • Nesrine Kaaniche
  • Maryline Laurent
  • Pierre-Olivier Rocher
  • Christophe Kiennert
  • Joaquin Garcia-Alfaro
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10436)

Abstract

We present \(\mathcal {PCS}\), a privacy-preserving certification mechanism that allows users to conduct anonymous and unlinkable actions. The mechanism is built over an attribute-based signature construction. The proposal is proved secure against forgery and anonymity attacks. A use case on the integration of \(\mathcal {PCS}\) to enhance the privacy of learners of an e-assessment environment, and some details of the ongoing implementation, are briefly presented.

Keywords

Attribute-based signatures Attribute-based credentials Anonymity Bilinear pairings Anonymous certification 

Notes

Acknowledgements

This work is supported by the H2020-ICT-2015/H2020-ICT-2015 TeSLA project An Adaptive Trust-based e-assessment System for Learning, Number 688520.

References

  1. 1.
    Beimel, A.: Secret sharing and key distribution. Research thesis (1996)Google Scholar
  2. 2.
    Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pederson, M.O.: Scientific comparison of ABC protocols: part i - formal treatment of privacy-enhancing credential systems (2014)Google Scholar
  3. 3.
    Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001). doi: 10.1007/3-540-44987-6_7 CrossRefGoogle Scholar
  4. 4.
    Camenisch, J., Mödersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198–214. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-15898-8_13 CrossRefGoogle Scholar
  5. 5.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985)CrossRefGoogle Scholar
  6. 6.
    Europe, C.: Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. In: General Data Protection Regulation, January 2016 (2016)Google Scholar
  7. 7.
    Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: A proactive threshold secret sharing scheme handling Gen2 privacy threats. Technical report, Carleton University, March 2009Google Scholar
  8. 8.
    Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: Proactive threshold cryptosystem for EPC tags. Ad hoc Sensor Wirel. Netw. 12(3–4), 187–208 (2011)Google Scholar
  9. 9.
    Herranz, J., Laguillaumie, F., Libert, B., Ràfols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51–67. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-27954-6_4 CrossRefGoogle Scholar
  10. 10.
    Kaaniche, N., Laurent, M.: Attribute-based signatures for supporting anonymous certification. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 279–300. Springer, Cham (2016). doi: 10.1007/978-3-319-45744-4_14 CrossRefGoogle Scholar
  11. 11.
    Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of the 8th IEEE Structure in Complexity Theory (1993)Google Scholar
  12. 12.
    Kiennert, C., Rocher, P.O., Ivanova, M., Rozeva, A., Durcheva, M., Garcia-Alfaro, J.: Security challenges in e-assessment and technical solutions. In 8th International Workshop on Interactive Environments and Emerging Technologies for eLearning, 21st International Conference on Information Visualization, London, UK (2017)Google Scholar
  13. 13.
    Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: ASIACCS 2010 (2010)Google Scholar
  14. 14.
    Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-19074-2_24 CrossRefGoogle Scholar
  15. 15.
    Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35–52. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-19379-8_3 CrossRefGoogle Scholar
  16. 16.
    Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-02384-2_13 CrossRefGoogle Scholar
  17. 17.
    Shigeo, M.: MCL - Generic and fast pairing-based cryptography library. https://github.com/herumi/mcl. Version: release20170402
  18. 18.
    Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)MathSciNetCrossRefMATHGoogle Scholar
  19. 19.
    Stanford University: PBC - The Pairing-Based Cryptography Library. https://crypto.stanford.edu/pbc/. Version: 0.5.14
  20. 20.
    Vergnaud, D.: Comment on “attribute-based signatures for supporting anonymous certification” by N. Kaaniche and M. Laurent (ESORICS 2016). IACR Cryptology ePrint Archive (2016)Google Scholar
  21. 21.
    Vergnaud, D.: Comment on attribute-based signatures for supporting anonymous certification by N. Kaaniche and M. Laurent (ESORICS 2016). Comput. J. 1–8 (2017)Google Scholar
  22. 22.
    Zhang, Y., Feng, D.: Efficient attribute proofs in anonymous credential using attribute-based cryptography. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 408–415. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-34129-8_39 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Nesrine Kaaniche
    • 1
  • Maryline Laurent
    • 1
  • Pierre-Olivier Rocher
    • 1
  • Christophe Kiennert
    • 1
  • Joaquin Garcia-Alfaro
    • 1
  1. 1.SAMOVAR, Télécom SudParis, CNRSUniversité Paris-SaclayEvryFrance

Personalised recommendations