-
Chapter and Conference Paper
Formal Treatment of Privacy-Enhancing Credential Systems
Privacy-enhancing attribute-based credentials (PABCs) are the core ingredients to privacy-friendly authentication systems. They allow users to obtain credentials on attributes and prove possession of these creden...
-
Chapter
Comparison of Mechanisms
In this chapter we compare Privacy-ABC schemes based on the security, functionality and efficiency they offer. The aim of this is to help researchers and application developers choose an schemes and parameters...
-
Article
Batch Verification of Short Signatures
With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particular requirements on the applicable crypt...
-
Chapter and Conference Paper
Practical Short Signature Batch Verification
In many applications, it is desirable to work with signatures that are short, and yet where many messages from different signers be verified very quickly. RSA signatures satisfy the latter condition, but are gene...
-
Chapter and Conference Paper
RFID Security: Tradeoffs between Security and Efficiency
We propose a model and definition for anonymous (group) identification that is well suited for RFID systems. This is based on the definition of Juels and Weis of strong privacy for RFID tags, where we add requ...
-
Chapter and Conference Paper
Batch Verification of Short Signatures
With computer networks spreading into a variety of new environments, the need to authenticate and secure communication grows. Many of these new environments have particular requirements on the applicable crypt...
-
Chapter and Conference Paper
Unclonable Group Identification
We introduce and motivate the concept of unclonable group identification, that provides maximal protection against sharing of identities while still protecting the anonymity of users. We prove that the notion ...