Anonymous credentials light

@inproceedings{Baldimtsi2012AnonymousCL,
  title={Anonymous credentials light},
  author={Foteini Baldimtsi and Anna Lysyanskaya},
  booktitle={ACM Conference on Computer and Communications Security},
  year={2012}
}
We define and propose an efficient and provably secure construction of blind signatures with attributes. Prior notions of blind signatures did not yield themselves to the construction of anonymous credential systems, not even if we drop the unlinkability requirement of anonymous credentials. Our new notion in contrast is a convenient building block for anonymous credential systems. The construction we propose is efficient: it requires just a few exponentiations in a prime-order group in which… CONTINUE READING

Similar Papers

Citations

Publications citing this paper.
SHOWING 1-10 OF 53 CITATIONS

Privacy-preserving Payments for Transportation Systems

VIEW 18 EXCERPTS
CITES METHODS & BACKGROUND
HIGHLY INFLUENCED

iRide: A Privacy-Preserving Architecture for Self-Driving Cabs Service

  • 2018 IEEE Vehicular Networking Conference (VNC)
  • 2018
VIEW 7 EXCERPTS
CITES BACKGROUND
HIGHLY INFLUENCED

ORide: A Privacy-Preserving yet Accountable Ride-Hailing Service

  • USENIX Security Symposium
  • 2017
VIEW 4 EXCERPTS
HIGHLY INFLUENCED

A Lightweight Privacy-Preserving OAuth2-Based Protocol for Smart City Mobile Apps

  • 2016 IEEE Globecom Workshops (GC Wkshps)
  • 2016
VIEW 5 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Benchmarking Privacy-ABC Technologies - An Evaluation of Storage and Communication Efficiency

  • 2015 IEEE World Congress on Services
  • 2015
VIEW 8 EXCERPTS
CITES RESULTS & BACKGROUND
HIGHLY INFLUENCED

Practical Round-Optimal Blind Signatures in the Standard Model

VIEW 9 EXCERPTS
CITES BACKGROUND, METHODS & RESULTS
HIGHLY INFLUENCED

Algebraic MACs and Keyed-Verification Anonymous Credentials

  • ACM Conference on Computer and Communications Security
  • 2014
VIEW 11 EXCERPTS
CITES METHODS
HIGHLY INFLUENCED

Privacy-respecting rewards for participatory sensing applications

  • 2018 IEEE Wireless Communications and Networking Conference (WCNC)
  • 2018
VIEW 4 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

PrivateRide: A Privacy-Enhanced Ride-Hailing Service

VIEW 3 EXCERPTS
CITES BACKGROUND & METHODS
HIGHLY INFLUENCED

FILTER CITATIONS BY YEAR

2013
2019

CITATION STATISTICS

  • 14 Highly Influenced Citations

References

Publications referenced by this paper.
SHOWING 1-9 OF 9 REFERENCES

On The Security of One-Witness Blind Signature Schemes

  • IACR Cryptology ePrint Archive
  • 2012
VIEW 15 EXCERPTS
HIGHLY INFLUENTIAL

Security of three-move blind signature schemes reconsidered

M. Ohkubo, M. Abe
  • SCIS’03, Symposium on Cryptography and Information Security,
  • 2003
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL

Blind Signatures for Untraceable Payments

  • CRYPTO
  • 1982
VIEW 4 EXCERPTS
HIGHLY INFLUENTIAL