2011
DOI: 10.1007/s10207-011-0150-5
|View full text |Cite
|
Sign up to set email alerts
|

A warning on how to implement anonymous credential protocols into the information card framework

Abstract: Unlinkability is a privacy feature supported by those multi-party security protocols allowing anonymous users' credential exchanges among different organizations. Proper signature schemes, based on discrete logarithms, must be used in order to guarantee the above requirements as well as selective disclosure of information. In this paper, we highlight that whenever a concrete architecture based on the above protocols is implemented, some aspects concerning how to manage the association between bases of discrete… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2018
2018

Publication Types

Select...
2
2
1

Relationship

1
4

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…It is a matter of fact that covert channel can be used to break unlinkability of protocols guaranteeing anonymity (see for example [4]). In the cover channel we can figure out in this case, TTP acts as attacker by using a different pair of asymmetric keys for every voter it wants to trace.…”
Section: Security Analysismentioning
confidence: 99%
“…It is a matter of fact that covert channel can be used to break unlinkability of protocols guaranteeing anonymity (see for example [4]). In the cover channel we can figure out in this case, TTP acts as attacker by using a different pair of asymmetric keys for every voter it wants to trace.…”
Section: Security Analysismentioning
confidence: 99%
“…Information security risk assessment (Bai et al, 2012;Feng and Li, 2011;Ren et al, 2006;Shamala et al, 2013;Zhao et al, 2009), quantifying the view of risk management, analysis the threats various networks and the risk information systems are realized with the use of a suite of various approaches and tools (Armando and Compagna, 2008;Ates et al, 2012;Bolle et al, 2011;Dent, 2008). With the development of computer technology and the internet, new attacks exploiting existing security vulnerabilities are realized.…”
Section: Introductionmentioning
confidence: 99%