In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attributes, in which issuers certify credentials on encrypted attributes to users. These schemes allow for the possibility that none of the involved parties, including the user, learns the values of the attributes. In fact, we will treat several variations differing in which parties see which attributes in the clear. We present efficient constructions of these new credential schemes, starting from a credential scheme by Brands, and we show that the secu...
Abstract—Anonymous credentials provide a powerful tool for making assertions about identity while ma...
A credential system is a system in which users can obtain credentials from organizations and demonst...
Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
Anonymous credentials are cryptographic mechanisms enabling users to authenticate themselves with a ...
It takes time for theoretical advances to get used in practical schemes. Anonymous cre-dential schem...
International audienceMany attribute-based anonymous credential (ABC) schemes have been proposed all...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
Abstract. A credential system is a system in which users can obtain credentials from organizations a...
Abstract—Anonymous credentials provide a powerful tool for making assertions about identity while ma...
A credential system is a system in which users can obtain credentials from organizations and demonst...
Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and ...
Anonymous credentials are cryptographic mechanisms enabling users to authenticate themselves with a ...
It takes time for theoretical advances to get used in practical schemes. Anonymous cre-dential schem...
International audienceMany attribute-based anonymous credential (ABC) schemes have been proposed all...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
International audienceAnonymous credentials are protocols in which users obtain certificates from or...
Abstract. A credential system is a system in which users can obtain credentials from organizations a...
Abstract—Anonymous credentials provide a powerful tool for making assertions about identity while ma...
A credential system is a system in which users can obtain credentials from organizations and demonst...
Many attribute-based anonymous credential (ABC) schemes have been proposed allowing a user to prove ...