2018
DOI: 10.1007/978-3-030-02641-7_9
|View full text |Cite
|
Sign up to set email alerts
|

Towards Attribute-Based Credentials in the Cloud

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
2
1

Relationship

3
4

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 22 publications
0
7
0
Order By: Relevance
“…The sixth group is comprised of six studies [22,23,24,25,26,27] published in the scope of the EU-funded research project CREDENTIAL -Secure Cloud Identity Wallet European. Because of the lack of privacy-preserving storage and advanced identity sharing services in the domain of Identity as a Service, a novel user-centric cloud-based data storage and sharing platform that enhances user privacy was proposed.…”
Section: Resultsmentioning
confidence: 99%
“…The sixth group is comprised of six studies [22,23,24,25,26,27] published in the scope of the EU-funded research project CREDENTIAL -Secure Cloud Identity Wallet European. Because of the lack of privacy-preserving storage and advanced identity sharing services in the domain of Identity as a Service, a novel user-centric cloud-based data storage and sharing platform that enhances user privacy was proposed.…”
Section: Resultsmentioning
confidence: 99%
“…In previous work [25], the need for selective disclosure was identified in a semi-trusted cloud environment and informally proposed to combine PRE and RSS, but did not yet provide a formal definition or concrete constructions. The cloudification of ABCs [28] represents the closest related research to our work and to filling this gap. Their concept enables a semi-trusted cloud service to derive representations from encrypted credentials without learning the underlying plaintext.…”
Section: Related Workmentioning
confidence: 96%
“…Furthermore, such systems give the user fine-granular control under which conditions different pseudonyms should be linkable and when they should be fully independent from each other, such that average travel times or speeds could still be made available to the infrastructure provider. We refer the interested reader to [CKL+15] for details on the cryptographic modeling, and to [KLSS17] for a cloud-based instantiation of such credential systems in order to minimize the computational power needed within the vehicle's on-board unit.…”
Section: A Polling Vs Publish/subscribementioning
confidence: 99%