2014
DOI: 10.1007/978-3-319-12280-9_18
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
7
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
5
2
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…Calculating a 256-bit hash takes about 10 milliseconds. We estimate a total extra time of 390 milliseconds for including the revocation value as an attribute, generating the revocation token and adding the equality proof [33]. This is very practical.…”
Section: Methodsmentioning
confidence: 95%
“…Calculating a 256-bit hash takes about 10 milliseconds. We estimate a total extra time of 390 milliseconds for including the revocation value as an attribute, generating the revocation token and adding the equality proof [33]. This is very practical.…”
Section: Methodsmentioning
confidence: 95%
“…Related Work on using Anonymous Credentials: Anonymous Credential systems (aka Privacy ABCs) are a valuable mechanism for ensuring privacy in identity management and have been discussed in context of eID systems, e.g, their integration in the German eID architecture [33]. While early implementations of anonymous credential systems, e.g., idemix [48] on a Java Card [49], however, were too expensive from the user's (client's) perspective, state-of-the-art implementations [50,51,52] already achieve reasonable efficiency. While anonymous credentials are a valuable means for ensuring privacy in identity management, performance is typically still much slower than when using proxy re-encryption.…”
Section: Related Work Discussionmentioning
confidence: 99%
“…However, the privacyenhancing technologies for managing user identity and/or personal attributes, are not yet available on platforms with limited resources. There are very promising results from the smart card area [10], [23], [24], but generally, full-fledged user-centric authentication schemes are not yet ready for the implementation on existing constrained devices, in particular devices with restricted cryptographic support and strong requirements on low verification times. This paper provides solutions for applications witch such specific requirements.…”
Section: A State Of the Artmentioning
confidence: 99%