Anonymous credentials are discussed as a privacy friendlier replacement for public key certificates. While such a transition would help to protect the privacy of digital citizens in the emerging information society, the wide scale deployment of anonymous credentials still poses many challenges. One of the open technical issues is the efficient revocation of anonymous credentials. Currently, accumulator based revocation is considered to be the most efficient and most privacy friendly mechanism for revoking anonymous credentials. This paper analyses the performance of three accumulator based credential revocation schemes. It identifies the bottlenecks of those implementations and presents guidelines to improve the efficiency in concrete appli...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usa...
The use of digital credentials is nowadays common-practice. However, the awareness of the privacy ri...
An accumulator scheme, as introduced by Benaloh and de Mare [BdM94] and further studied by Baric and...
Abstract. Anonymous credentials are discussed as a privacy friendlier replacement for public key cer...
In an increasing information-driven society, preserving privacy is essential. Anonymous credentials ...
Part 3: Extended AbstractsInternational audienceCurrently, there are many solutions for authenticati...
A cryptographic accumulator is a space- and time-efficient data structure with associated algorithms...
Anonymous credential is an important tool to protect the identity of users in the Internet for vario...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
A cryptographic accumulator is a space- and time-efficient data structure with associated algorithms...
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking suc...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usa...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usa...
The use of digital credentials is nowadays common-practice. However, the awareness of the privacy ri...
An accumulator scheme, as introduced by Benaloh and de Mare [BdM94] and further studied by Baric and...
Abstract. Anonymous credentials are discussed as a privacy friendlier replacement for public key cer...
In an increasing information-driven society, preserving privacy is essential. Anonymous credentials ...
Part 3: Extended AbstractsInternational audienceCurrently, there are many solutions for authenticati...
A cryptographic accumulator is a space- and time-efficient data structure with associated algorithms...
Anonymous credential is an important tool to protect the identity of users in the Internet for vario...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
A cryptographic accumulator is a space- and time-efficient data structure with associated algorithms...
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking suc...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usa...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usa...
The use of digital credentials is nowadays common-practice. However, the awareness of the privacy ri...
An accumulator scheme, as introduced by Benaloh and de Mare [BdM94] and further studied by Baric and...