Search
Search Results
-
SoK: Anonymous Credentials
Anonymous credentials are a powerful tool for making assertions about identity while maintaining privacy and have been the subject of study for many... -
Scored Anonymous Credentials
Securely maintaining “credits” of users judging their behavior in past authenticated sessions is vital to encourage user participation, but doing it... -
Towards Smart Contract-Based Verification of Anonymous Credentials
Smart contracts often need to verify identity-related information of their users. However, such information is typically confidential, and its... -
PAPR: Publicly Auditable Privacy Revocation for Anonymous Credentials
We study the notion of anonymous credentials with Publicly Auditable Privacy Revocation (PAPR). PAPR credentials simultaneously provide conditional... -
A Framework for Practical Anonymous Credentials from Lattices
We present a framework for building practical anonymous credential schemes based on the hardness of lattice problems. The running time of the prover... -
Lattice Signature with Efficient Protocols, Application to Anonymous Credentials
Digital signature is an essential primitive in cryptography, which can be used as the digital analogue of handwritten signatures but also as a... -
EBSS: A secure blockchain-based sharing scheme for real estate financial credentials
With the development of Internet finance, the real estate financial credentials have been extensively utilized in capital and trading markets. The...
-
Selective Delegation of Attributes in Mercurial Signature Credentials
Anonymous credential schemes enable service providers to verify information that a credential holder willingly discloses, without needing any further... -
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
Industrial data trading can considerably enhance the economic and social value of abundant data resources. However, traditional data trading models...
-
Novel blockchain-based framework to publish, verify, and store digital academic credentials of universities
Blockchain is the technology of choice to create cryptocurrency and bitcoins through the maintenance of immutable distributed ledgers in multiple...
-
Improved Constructions of Anonymous Credentials from Structure-Preserving Signatures on Equivalence Classes
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to authenticate while maintaining privacy. When instantiated from... -
Protego: Efficient, Revocable and Auditable Anonymous Credentials with Applications to Hyperledger Fabric
Recent works to improve privacy in permissioned blockchains like Hyperledger Fabric rely on Idemix, the only anonymous credential system that has... -
-
Traceable Constant-Size Multi-authority Credentials
Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove the possession of some attributes, anonymously.... -
Anonymous Counting Tokens
We introduce a new primitive called anonymous counting tokens (ACTs) which allows clients to obtain blind signatures or MACs (aka tokens) on messages... -
Auditable Attribute-Based Credentials Scheme and Its Application in Contact Tracing
During the pandemic, the limited functionality of existing privacy-preserving contact tracing systems highlights the need for new designs. Wang et... -
Unlinkable Delegation of WebAuthn Credentials
The W3C’s WebAuthn standard employs digital signatures to offer phishing protection and unlinkability on the web using authenticators which manage... -
Blockchain in E-Learning Platform to Enhance Trustworthy and Sharing of Micro-credentials
Blockchain is a disruptive technology and interest in its adoption is growing across many market sectors in Industry 4.0. However, the blockchain... -
Content addressable memory (CAM) based robust anonymous authentication and integrity preservation scheme for wireless body area networks (WBAN)
Health plays a foremost role for every individual. To preserve the health, continuous monitoring of health is essential. Wireless Body Area Network...
-
AMAKAS: Anonymous Mutual Authentication and Key Agreement Scheme for securing multi-server environments
The rapid growth of Internet users was the motivation of the emerge appearance of new computing models such as cloud computing, fog computing and...