Abstract
This article provides a short overview of the concepts around privacy-preserving attribute-based authentication. It then briefly discusses the cryptographic realisation of these concepts and describes an architecture implementing them.
Chapter PDF
Similar content being viewed by others
References
ABC4Trust – Attribute-based Credentials for Trust, http://www.abc4trust.eu
Bichsel, P., Camenisch, J.: Mixing Identities with Ease. In: de Leeuw, E., Fischer-Hübner, S., Fritsch, L. (eds.) IDMAN 2010. IFIP AICT, vol. 343, pp. 1–17. Springer, Heidelberg (2010)
Brands, S.: Rethinking Public Key Infrastructure and Digital Certificates – Building in Privacy. PhD thesis, Eindhoven Institute of Technology, Eindhoven, The Netherlands (1999)
Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IFIP AICT, vol. 396, pp. 34–52. Springer, Heidelberg (2013)
Camenisch, J., Kiayias, A., Yung, M.: On the Portability of Generalized Schnorr Proofs. In: Joux, A. (ed.) EUROCRYPT 2009. LNCS, vol. 5479, pp. 425–442. Springer, Heidelberg (2009)
Camenisch, J., Krontiris, I., Lehmann, A., Neven, G., Paquin, C., Rannenberg, K., Zwingelberg, H.: D2.1 Architecture for Attribute-based Credential Technologies – Version 1, http://abc4trust.eu/download/ABC4Trust-D2.1-Architecture-V1.2.pdf
Camenisch, J., Lehmann, A., Neven, G.: Electronic Identities need Private Credentials. IEEE Security & Privacy 10(1), 80–83 (2012)
Camenisch, J.L., Lysyanskaya, A.: An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001)
Camenisch, J.L., Lysyanskaya, A.: A Signature Scheme with Efficient Protocols. In: Cimato, S., Galdi, C., Persiano, G. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003)
Camenisch, J.L., Lysyanskaya, A.: Signature Schemes and Anonymous Credentials from Bilinear Maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004)
Camenisch, J.L., Shoup, V.: Practical Verifiable Encryption and Decryption of Discrete Logarithms. In: Boneh, D. (ed.) CRYPTO 2003. LNCS, vol. 2729, pp. 126–144. Springer, Heidelberg (2003)
Github Repository. Privacy-preserving attribute-based credential engine (p2abcengine), https://github.com/p2abcengine/p2abcengine/ .
IBM Research. Specification of the Identity Mixer Cryptographic Library – Version 2.3.0. IBM Technical Report RZ3730
Leenes, R., Schallaböck, J., Hansen, M.: PRIME White Paper – third and final version (2008), https://www.prime-project.eu/prime_products/whitepaper/
Stamatiou, Y.: Privacy Respecting ICT Innovation in Education: Electronic Course Evaluation in Higher Education and Beyond. In: IFIP Summer School 2013 on Privacy and Identity Management for Emerging Services and Technologies. IFIP AICT. Springer (2014)
Wästlund, E., Fischer-Hübner, S.: The Users’ Mental Models’ Effect on their Comprehension of Anonymous Credentials. In: Privacy and Identity Management for Life. Springer (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Camenisch, J. (2014). Concepts Around Privacy-Preserving Attribute-Based Credentials. In: Hansen, M., Hoepman, JH., Leenes, R., Whitehouse, D. (eds) Privacy and Identity Management for Emerging Services and Technologies. Privacy and Identity 2013. IFIP Advances in Information and Communication Technology, vol 421. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-55137-6_4
Download citation
DOI: https://doi.org/10.1007/978-3-642-55137-6_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-55136-9
Online ISBN: 978-3-642-55137-6
eBook Packages: Computer ScienceComputer Science (R0)