Anonymous Certification for an e-Assessment Framework

  • Christophe Kiennert
  • Nesrine Kaaniche
  • Maryline Laurent
  • Pierre-Olivier Rocher
  • Joaquin Garcia-Alfaro
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 10674)


We present an anonymous certification scheme that provides data minimization to allow the learners of an e-assessment platform to reveal only required information to certificate authority providers. Attribute-based signature schemes are considered as a promising cryptographic primitive for building privacy-preserving attribute credentials, also known as anonymous credentials. These mechanisms allow the derivation of certified attributes by the issuing authority relying on non-interactive protocols and enable end-users to authenticate with verifiers in a pseudonymous manner, e.g., by providing only the minimum amount of information to service providers.


Attribute-based signatures Attribute-based credentials Privacy Bilinear pairings Anonymous certification e-Assessment applications 



This work is supported by the H2020-ICT-2015/H2020-ICT-2015 TeSLA project An Adaptive Trust-based e-assessment System for Learning, Number 688520. The authors graciously acknowledge as well the support received from the Chair Values and Policies of Personal Information of the Institut Mines-Télécom.


  1. 1.
    Aïmeur, E., Hage, H.: Preserving learners’ privacy. In: Nkambou, R., Bourdeau, J., Mizoguchi, R. (eds.) Advances in Intelligent Tutoring Systems. SCI, vol. 308, pp. 465–483. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-14363-2_23 CrossRefGoogle Scholar
  2. 2.
    Aïmeur, E., Hage, E., Onana, F.S.M.: Anonymous credentials for privacy-preserving e-learning. In: 2008 International MCETECH Conference on E-Technologies, pp. 70–80. IEEE (2008)Google Scholar
  3. 3.
    Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Delegatable anonymous credentials. Cryptology ePrint Archive, Report 2008/428 (2008)Google Scholar
  4. 4.
    Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)Google Scholar
  5. 5.
    Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pederson, M.O.: Scientific comparison of ABC protocols: Part i - formal treatment of privacy-enhancing credential systems (2014)Google Scholar
  6. 6.
    Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001). doi: 10.1007/3-540-44987-6_7 CrossRefGoogle Scholar
  7. 7.
    Camenisch, J., Mödersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198–214. Springer, Heidelberg (2010). doi: 10.1007/978-3-642-15898-8_13 CrossRefGoogle Scholar
  8. 8.
    Canard, S., Lescuyer, S.: Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013. ACM, New York (2013)Google Scholar
  9. 9.
    Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985)CrossRefGoogle Scholar
  10. 10.
    Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257–265. Springer, Heidelberg (1991). doi: 10.1007/3-540-46416-6_22 CrossRefGoogle Scholar
  11. 11.
    European Council: Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. In General Data Protection Regulation (2016)Google Scholar
  12. 12.
    Hankerson, D., Menezes, A., Vanstone, A.: Guide to Elliptic Curve Cryptography. Springer Science & Business Media, New York (2006)MATHGoogle Scholar
  13. 13.
    Herranz, J., Laguillaumie, F., Libert, B., Ràfols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51–67. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-27954-6_4 CrossRefGoogle Scholar
  14. 14.
    Kaaniche, N., Laurent, M.: Attribute-based signatures for supporting anonymous certification. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 279–300. Springer, Cham (2016). doi: 10.1007/978-3-319-45744-4_14 CrossRefGoogle Scholar
  15. 15.
    Kaaniche, N., Laurent, M., Rocher, P.-O., Kiennert, C., Garcia-Alfaro, J.: \(\cal{PCS}\), a privacy-preserving certification scheme. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds.) ESORICS/DPM/CBT-2017. LNCS, vol. 10436, pp. 239–256. Springer, Cham (2017). doi: 10.1007/978-3-319-67816-0_14 CrossRefGoogle Scholar
  16. 16.
    Kiennert, C., Rocher, P.O., Ivanova, M., Rozeva, A., Durcheva, M., Garcia-Alfaro, J.: Security challenges in e-assessment and technical solutions. In: 8th International Workshop on Interactive Environments and Emerging Technologies for eLearning, 21st International Conference on Information Visualization, London, UK (2017)Google Scholar
  17. 17.
    Leach, P.J., Salz, R., Mealling, M.H.: A Universally Unique IDentifier (UUID) URN Namespace. RFC 4122, July 2005Google Scholar
  18. 18.
    Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: ASIACCS 2010 (2010)Google Scholar
  19. 19.
    Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-19074-2_24 CrossRefGoogle Scholar
  20. 20.
    Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417–426. Springer, Heidelberg (1986). doi: 10.1007/3-540-39799-X_31 CrossRefGoogle Scholar
  21. 21.
    Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35–52. Springer, Heidelberg (2011). doi: 10.1007/978-3-642-19379-8_3 CrossRefGoogle Scholar
  22. 22.
    Rescorla, E., Dierks, T.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, August 2008Google Scholar
  23. 23.
    Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009). doi: 10.1007/978-3-642-02384-2_13 CrossRefGoogle Scholar
  24. 24.
    Shigeo, M.: MCL - Generic and fast pairing-based cryptography library, version: release20170402.
  25. 25.
    Stanford University: PBC - The Pairing-Based Cryptography Library, version: 0.5.14.
  26. 26.
    Vergnaud, D.: Comment on “attribute-based signatures for supporting anonymous certification” by N. Kaaniche and M. Laurent (ESORICS 2016). IACR Cryptology ePrint Archive (2016)Google Scholar
  27. 27.
    Vergnaud, D.: Comment on attribute-based signatures for supporting anonymous certification by N. Kaaniche and M. Laurent (ESORICS 2016). Comput. J. 1–8, June 2017Google Scholar
  28. 28.
    Verheul, E.R.: Self-blindable credential certificates from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 533–551. Springer, Heidelberg (2001). doi: 10.1007/3-540-45682-1_31 CrossRefGoogle Scholar
  29. 29.
    Zhang, Y., Feng, D.: Efficient attribute proofs in anonymous credential using attribute-based cryptography. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 408–415. Springer, Heidelberg (2012). doi: 10.1007/978-3-642-34129-8_39 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing AG 2017

Authors and Affiliations

  • Christophe Kiennert
    • 1
  • Nesrine Kaaniche
    • 1
  • Maryline Laurent
    • 1
  • Pierre-Olivier Rocher
    • 1
  • Joaquin Garcia-Alfaro
    • 1
  1. 1.SAMOVAR, Télécom SudParis, CNRS, Université Paris-SaclayParisFrance

Personalised recommendations