2016
DOI: 10.1007/978-3-319-31301-6_1
|View full text |Cite
|
Sign up to set email alerts
|

Formal Treatment of Privacy-Enhancing Credential Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
35
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
8
1

Relationship

2
7

Authors

Journals

citations
Cited by 35 publications
(35 citation statements)
references
References 20 publications
0
35
0
Order By: Relevance
“…None of these schemes is (universally) composable. Camenisch et al [27] have recently proposed property-based definitions of anonymous credentials and of the necessary building blocks, given a construction and proved it secure. Their definitions turn out to be rather complex, indicating that for complex systems functionality-based definitions might be easier to handle.…”
Section: Introductionmentioning
confidence: 99%
“…None of these schemes is (universally) composable. Camenisch et al [27] have recently proposed property-based definitions of anonymous credentials and of the necessary building blocks, given a construction and proved it secure. Their definitions turn out to be rather complex, indicating that for complex systems functionality-based definitions might be easier to handle.…”
Section: Introductionmentioning
confidence: 99%
“…As identified in the work of Camenisch et al [15], an important feature to handle the dynamic nature of the set of users of a credential system is the possibility of revoking the credentials of some parties. Although our model does not directly support such a functionality, we can leverage the expressiveness of functional credentials in order to achieve it.…”
Section: Discussionmentioning
confidence: 99%
“…In order to make our construction usable in the definitional framework of Camenisch et al [28], we assume common public parameters (i.e., a common reference string) and encrypt all witnesses of which knowledge is being proved under a public key included in the common reference string. The resulting ciphertexts thus serve as statistically binding commitments to the witnesses.…”
Section: Protocols For Signing a Committed Value And Provingmentioning
confidence: 99%
“…The first efficient constructions were given by Camenisch and Lysyanskaya under the Strong RSA assumption [29,31] or using bilinear groups [32]. Other solutions were subsequently given with additional useful properties such as noninteractivity [10], delegatability [9], a better efficiency in the private key setting [36], or support for efficient attributes [25] (see [28] and references therein). Anonymous credentials with attributes are often obtained by having the issuer obliviously sign a multi-block message (Msg 1 , .…”
Section: Introductionmentioning
confidence: 99%