Abstract
In this chapter we compare Privacy-ABC schemes based on the security, functionality and efficiency they offer. The aim of this is to help researchers and application developers choose an schemes and parameters most suitable for their application.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
André Årnes, Mike Just, Svein J Knapskog, Steve Lloyd, and Henk Meijer. Selecting Revocation Solutions for PKI, 2000.
Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies - Final Version. Deliverable D2.2, The ABC4Trust EU Project, 2014. Available at https://abc4trust.eu/download/Deliverable_D2.2.pdf, Last accessed on 2014-11-08.
Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya. P-signatures and Noninteractive Anonymous Credentials. In Theory of Cryptography, volume 4948, pages 356–374. Springer, 2008.
Foteini Baldimtsi and Anna Lysyanskaya. Anonymous credentials light. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 1087–1098. ACM, 2013.
Stefan A Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.
Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In IDMAN, volume 396, pages 34–52. Springer, 2013.
Jan Camenisch and Anna Lysyanskaya. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In Advances in Cryptology, pages 61–76. Springer, 2002.
Jan Camenisch and Anna Lysyanskaya. A Signature Scheme with Efficient Protocols. In Proceedings of the 3rd International Conference on Security in Communication Networks, pages 268–289. Springer, 2003.
Jesus Luna Garcia, Robert Langenberg, and Neeraj Suri. Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees. In CCSW, pages 103–112. ACM, 2012.
Jesus Luna, Hamza Ghani, Tsvetoslava Vateva, and Neeraj Suri. Quantitative Assessment of Cloud Security Level Agreements: A Case Study. In SECRYPT, pages 64–73. SciTePress, 2012.
Jorn Lapon, Markulf Kohlweiss, Bart De Decker, and Vincent Naessens. Performance Analysis of Accumulator-Based Revocation Mechanisms. In SEC, volume 330, pages 289–301. Springer, 2010.
Jorn Lapon, Markulf Kohlweiss, Bart De Decker, and Vincent Naessens. Analysis of Revocation Strategies for Anonymous Idemix Credentials. In Communications and Multimedia Security, volume 7025, pages 3–17. Springer, 2011.
Jiangtao Li, Ninghui Li, and Rui Xue. Universal accumulators with efficient nonmembership proofs. 2007.
Wojciech Mostowski and Pim Vullers. Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. In SecureComm, volume 96, pages 243–260. Springer, 2011.
Pierre Parrend and Stéphane Frénot. Security benchmarks of OSGi platforms: toward Hardened OSGi. Softw., Pract. Exper., 39(5):471–499, 2009.
Christian Paquin and Greg Zaverucha. U-prove Cryptographic Specification v1.1 (Revision 2). Technical report, Microsoft Corporation, 2013.
Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161–174, 1991.
Nigel Smart. ECRYPT II yearly report on algorithms and keysizes (2011-2012). www.ecrypt.eu.org/documents/D.SPA.20.pdf, 2012.
Pim Vullers and Gergely Alpár. Efficient Selective Disclosure on Smart Cards Using Idemix. In IDMAN, volume 396, pages 53–67. Springer, 2013.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Pedersen, M.Ø., Mikkelsen, G.L., Veseli, F., Sabouri, A., Vateva-Gurova, T. (2015). Comparison of Mechanisms. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds) Attribute-based Credentials for Trust. Springer, Cham. https://doi.org/10.1007/978-3-319-14439-9_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-14439-9_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14438-2
Online ISBN: 978-3-319-14439-9
eBook Packages: Business and EconomicsBusiness and Management (R0)