2015
DOI: 10.1007/978-3-662-48800-3_11
|View full text |Cite
|
Sign up to set email alerts
|

Composable and Modular Anonymous Credentials: Definitions and Practical Constructions

Abstract: It takes time for theoretical advances to get used in practical schemes. Anonymous credential schemes are no exception. For instance, existing schemes suited for real-world use lack formal, composable definitions, partly because they do not support straight-line extraction and rely on random oracles for their security arguments. To address this gap, we propose unlinkable redactable signatures (URS), a new building block for privacy-enhancing protocols, which we use to construct the first efficient UC-secure an… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
52
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 74 publications
(53 citation statements)
references
References 58 publications
1
52
0
Order By: Relevance
“…In addition, Chaidos et al use GS proofs along with QANIZK proofs, which cost significantly less group operations. 15 Therefore, Table 4 contains the minimum execution time on our platform and an estimation for a more realistic execution time. The minimum execution time is computed by multiplying the plain amount of pairings with the average execution time of a pairing.…”
Section: Belenios Receipt Free Voting Schemementioning
confidence: 99%
See 2 more Smart Citations
“…In addition, Chaidos et al use GS proofs along with QANIZK proofs, which cost significantly less group operations. 15 Therefore, Table 4 contains the minimum execution time on our platform and an estimation for a more realistic execution time. The minimum execution time is computed by multiplying the plain amount of pairings with the average execution time of a pairing.…”
Section: Belenios Receipt Free Voting Schemementioning
confidence: 99%
“…In particular, we will use or make mention of the following examples: , where a i , a i j ← Z p . The L k -MDDH Assumption is the k-Lin family assumptions which we introduced for k = 1, 2, the second one 15 is the U k -MDDH or Uniform Assumption, and the last one is the Symmetric Cascade Assumption introduced in [25]. Matrix Diffie-Hellman Assumptions are a practical framework for designing protocols, but for practical choices one usually chooses in asymmetric groups the SXDH Assumption (which is the assumption that the DDH Assumption holds in the groups G 1 and G 2 for a bilinear group) and in symmetric bilinear groups one usually chooses the 2-Lin-Assumption.…”
Section: Appendix a Computational Assumptionsmentioning
confidence: 99%
See 1 more Smart Citation
“…Firstly, [45] introduced the notion of accountability, which requires that signers and redactors can be held accountable for their signatures/redactions. Secondly, [45] and [14] independently introduced unlinkability for RSS as an even stronger privacy notion. Unlinkability essentially requires multiple redactions of the same document to be unlinkable.…”
Section: Instantiationsmentioning
confidence: 99%
“…Structure-preserving cryptography is a paradigm where handled objects all live in discrete-log-hard abelian groups over which a bilinear map is efficiently computable. The structure-preserving property allows for a smooth interaction of the considered primitives with Groth-Sahai (GS) proof systems [36], making them very powerful tools for the modular design of privacy-preserving cryptographic protocols [3,8,16,17,19,27,32,37,44,51].…”
Section: Introductionmentioning
confidence: 99%