International audienceAnonymous credentials are protocols in which users obtain certificates from organizations and subsequently demonstrate their possession in such a way that transactions carried out by the same user cannot be linked. We present an anonymous credential scheme with non-interactive proofs of credential possession where credentials are associated with a number of attributes. Following recent results of Camenisch and Groß (CCS 2008), the proof simultaneously convinces the verifier that certified attributes satisfy a certain predicate. Our construction relies on a new kind of P-signature, termed block-wise P-signature , that allows a user to obtain a signature on a committed vector of messages and makes it possible to generate...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceMany attribute-based anonymous credential (ABC) schemes have been proposed all...
Abstract. In this paper, we introduce P-signatures. A P-signature scheme consists of a signature sch...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceMany attribute-based anonymous credential (ABC) schemes have been proposed all...
Abstract. In this paper, we introduce P-signatures. A P-signature scheme consists of a signature sch...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...
International audienceAnonymous attribute-based credentials (ABCs) are a powerful tool allowing user...