International audienceThis paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are verified on the reader-side via a bilinear pairing. Java Card smart cards offer only very limited access to the cryptographic coprocessor. It thus requires some ingenuity to get the protocol running with reasonable speed. We realise protocol runs with on-card computation times in the order of 1.5 seconds. It should be possible to further reduce this time with extended access to the cryptographic coprocessor
Abstract. An important shortcoming of client-side cryptography on consumer devices is the poor prote...
Identification protocols based on the Computational Diffie Hellman Problem (CDHP) generally assume t...
AbstractA lot of discussions for smart card based identification and digital signature schemes have ...
International audienceThis paper describes an elementary protocol to prove possession of anonymous c...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
The Direct Anonymous Attestation scheme allows to map proce-dures with an imperative requirement for...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
This paper presents a smart-card applet that is able to verify X.509 certificates and to use the pub...
This paper presents a smart-card applet that is able to verify X.509 certificates and to use the pub...
The bachelor thesis is focused on cryptographic schemes using Attribute-Based Credentials, which try...
Smart cards improve the convenience and security of any transaction. They provide tamper-proof stora...
[[abstract]]With rapid growth of mobile wireless networks, handheld devices are popularly used by pe...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
Please be advised that this information was generated on 2016-05-09 and may be subject t
Abstract. An important shortcoming of client-side cryptography on consumer devices is the poor prote...
Identification protocols based on the Computational Diffie Hellman Problem (CDHP) generally assume t...
AbstractA lot of discussions for smart card based identification and digital signature schemes have ...
International audienceThis paper describes an elementary protocol to prove possession of anonymous c...
This paper describes an elementary protocol to prove possession of anonymous credentials together wi...
The Direct Anonymous Attestation scheme allows to map proce-dures with an imperative requirement for...
An existing approach based on induction and theorem proving is tailored to the verification of secur...
This paper presents a smart-card applet that is able to verify X.509 certificates and to use the pub...
This paper presents a smart-card applet that is able to verify X.509 certificates and to use the pub...
The bachelor thesis is focused on cryptographic schemes using Attribute-Based Credentials, which try...
Smart cards improve the convenience and security of any transaction. They provide tamper-proof stora...
[[abstract]]With rapid growth of mobile wireless networks, handheld devices are popularly used by pe...
International audienceBilinear pairings have been widely used in cryptographic protocols since they ...
[[abstract]]User authentication and key agreement is an important security primitive for creating a ...
Please be advised that this information was generated on 2016-05-09 and may be subject t
Abstract. An important shortcoming of client-side cryptography on consumer devices is the poor prote...
Identification protocols based on the Computational Diffie Hellman Problem (CDHP) generally assume t...
AbstractA lot of discussions for smart card based identification and digital signature schemes have ...