Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usage of third-party verified credentials bring us convenience in authentication. The Verifiable Credential (VC) data model is a new standard proposed by the W3C association to ease the expression and verification of third-party verified credentials on the Internet. The issuance and presentation of verifiable credentials are tamper-evident and privacy-preserving by design. However, the current verifiable credential data model lacks an explicit revocation design that guarantees the secure operations of the system. The lack of a revocation mechanism significantly limits the application of verifiable credentials. This thesis studies the revocation ...
Master Computing Science and Master Mathematics Thesis: http://scripties.fwn.eldoc.ub.rug.nl/scripti...
Master's thesis in Computer scienceCredential verification possess a unique challenge involving mult...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpose...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usa...
Authentication mechanisms play an important role in everyday digital interactions and allow users to...
Authentication mechanisms play an important role in everyday digital interactions and allow users to...
Part 3: Extended AbstractsInternational audienceCurrently, there are many solutions for authenticati...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
The use of digital credentials is nowadays common-practice. However, the awareness of the privacy ri...
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking suc...
We study the notion of anonymous credentials with Publicly Auditable Privacy Revocation (PAPR). PAPR...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Credential verification possess a unique challenge involving multi-disciplinary domains throughout t...
Master Computing Science and Master Mathematics Thesis: http://scripties.fwn.eldoc.ub.rug.nl/scripti...
Master's thesis in Computer scienceCredential verification possess a unique challenge involving mult...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpose...
Third-party verified credentials (e.g. passports, diplomas) are essential in our daily life. The usa...
Authentication mechanisms play an important role in everyday digital interactions and allow users to...
Authentication mechanisms play an important role in everyday digital interactions and allow users to...
Part 3: Extended AbstractsInternational audienceCurrently, there are many solutions for authenticati...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
Part 7: Applied CryptographyInternational audienceAttribute-based credentials allow a user to prove ...
The use of digital credentials is nowadays common-practice. However, the awareness of the privacy ri...
Attribute-based credentials allow a user to prove properties about herself anonymously. Revoking suc...
We study the notion of anonymous credentials with Publicly Auditable Privacy Revocation (PAPR). PAPR...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Abstract. Attribute-based credentials allow a user to prove properties about her-self anonymously. R...
Credential verification possess a unique challenge involving multi-disciplinary domains throughout t...
Master Computing Science and Master Mathematics Thesis: http://scripties.fwn.eldoc.ub.rug.nl/scripti...
Master's thesis in Computer scienceCredential verification possess a unique challenge involving mult...
Digital certificates signed by trusted certification authorities (CAs) are used for multiple purpose...