-
Chapter and Conference Paper
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredients to privacy-friendly authentication systems. They allow users to obtain credentials on attributes and prove possession of these creden...
-
Chapter
Comparison of Mechanisms
In this chapter we compare Privacy-ABC schemes based on the security, functionality and efficiency they offer. The aim of this is to help researchers and application developers choose an schemes and parameters...
-
Chapter and Conference Paper
ABC4Trust Workshop on Core Features of Privacy-ABCs, Practical Use, and Legal Issues
The project “ABC4Trust – Attribute-based Credentials for Trust” presented its two pilot trials in a workshop and engaged participants in discussions on the two existing as well as potential future application ...
-
Chapter
Technical Implementation and Feasibility
This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using th...
-
Chapter and Conference Paper
On the Security of Distributed Multiprime RSA
Threshold RSA encryption and signing is a very useful tool to increase the security of the secret keys used. Key generation is, however, either done in a non-threshold way, or computationally inefficient proto...
-
Chapter and Conference Paper
Efficient RSA Key Generation and Threshold Paillier in the Two-Party Setting
The problem of generating an RSA composite in a distributed manner without leaking its factorization is particularly challenging and useful in many cryptographic protocols. Our first contribution is the first ...
-
Chapter and Conference Paper
Efficient Threshold Zero-Knowledge with Applications to User-Centric Protocols
In this paper, we investigate on threshold proofs, a framework for distributing the prover’s side of interactive proofs of knowledge over multiple parties. Interactive proofs of knowledge (PoK) are widely used pr...
-
Chapter and Conference Paper
Efficient, Robust and Constant-Round Distributed RSA Key Generation
We present the first protocol for distributed RSA key generation which is constant round, secure against malicious adversaries and has a negligibly small bound on the error probability, even using only one ite...