The problem of identity theft, that is, the act of impersonating others’ identities by presenting stolen identifiers or proofs of identities, has been receiving increasing attention because of its high financial and social costs. In this paper we address such problem by proposing an approach to manage user identity attributes by assuring their privacy-preserving usage. The approach is based on the concept of privacy preserving multi-factor authentication achieved by a new cryptographic primitive which uses aggregate signatures on commitments that are then used for aggregate zero-knowledge proof of knowledge (ZKPK) protocols. We present the implementation of such approach on Nokia NFC cellular phones and report performance evaluation results
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
International audienceWith a boom in online services generally accessed through a login/password cou...
Users increasingly use their mobile devices to communicate, to conduct business transaction and acce...
Users increasingly use their mobile devices to communicate, to conduct business transaction and acce...
Abstract — Users increasingly use their mobile devices to communicate, to conduct business transacti...
To support emerging online activities within the digital information infrastructure, such as commerc...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Authentication is a prerequisite for proper access control to many e-services. Often, it is carried ...
Part 5: Identity and Identity ManagementInternational audienceIdentity management is defined as the ...
The increasing use of digital credentials undermines the owner's privacy. Anonymous credentials offe...
Providing methods to anonymously validate user identity is essential in many applications of electro...
Part 2: Mobile Authentication and Access ControlInternational audienceThe pervasive use of mobile ph...
Today, digital identity management for individuals is either inconvenient and error-prone or creates...
Smart mobile phones are widely popularized and advanced mobile communication services are provided i...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
International audienceWith a boom in online services generally accessed through a login/password cou...
Users increasingly use their mobile devices to communicate, to conduct business transaction and acce...
Users increasingly use their mobile devices to communicate, to conduct business transaction and acce...
Abstract — Users increasingly use their mobile devices to communicate, to conduct business transacti...
To support emerging online activities within the digital information infrastructure, such as commerc...
Abstract Identity management is defined as the set of processes related to identity and access infor...
Authentication is a prerequisite for proper access control to many e-services. Often, it is carried ...
Part 5: Identity and Identity ManagementInternational audienceIdentity management is defined as the ...
The increasing use of digital credentials undermines the owner's privacy. Anonymous credentials offe...
Providing methods to anonymously validate user identity is essential in many applications of electro...
Part 2: Mobile Authentication and Access ControlInternational audienceThe pervasive use of mobile ph...
Today, digital identity management for individuals is either inconvenient and error-prone or creates...
Smart mobile phones are widely popularized and advanced mobile communication services are provided i...
In a mobile environment, a number of users act as a network nodes and communicate with one another t...
The widespread usage of smartphones gives rise to new security and privacy concerns. Smartphones are...
International audienceWith a boom in online services generally accessed through a login/password cou...