Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication

@inproceedings{Bjones2012IntegratingAC,
  title={Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication},
  author={Ronny Bjones and Ioannis Krontiris and Pascal Paillier and Kai Rannenberg},
  booktitle={APF},
  year={2012}
}
Electronic Identity eID cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this paper. We first discuss important privacy and security threats that remain in the German eID system and… 

Real-World Identification for an Extensible and Privacy-Preserving Mobile eID

TLDR
This paper presents a general architecture and efficient protocols for such a privacy-preserving mobile eID that allows identity validation in a similar fashion as regular ID cards and makes carrying around various physical cards unnecessary.

Enhancing privacy of users in eID schemes

TLDR
The use of homomorphic encryption and block chain in eID schemes is further explored in order to prevent the Identity Provider from becoming a privacy hotspot while fullling its role in the scheme.

Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers

TLDR
A conceptual model of the relevant factors based on well-established theories and practical experience with trialing Privacy-ABCs is developed, and the model is evaluated through expert surveys and shows a mean score over the average.

Understanding the Determinants of Privacy-ABC Technologies Adoption by Service Providers

TLDR
A conceptual model of the relevant factors based on well-established theories and the practical experience with trialing Privacy-ABCs is developed, and the model is evaluated through expert surveys.

With a Little Help from My Friends: Constructing Practical Anonymous Credentials

TLDR
A provably secure generic construction of CHACs is presented using a combination of signatures with flexible public keys (SFPK) and the novel notion of aggregatable attribute-based equivalence class signatures (AAEQ) along with a concrete instantiation.

A Method for Creating Private and Anonymous Digital Territories Using Attribute-Based Credential Technologies

TLDR
A generic privacy preserving architecture is proposed for DTs of any kind based on a new Privacy Enhancing Technology, the Privacy-ABCs, within the general domain of Ambience Intelligence.

Establishment and Prospects of Privacy-ABCs

TLDR
This chapter presents an overview of the most relevant standardisation projects for ABC4Trust, discusses concrete contributions to these standards, and gives some insights on how to achieve a higher degree of trustworthiness in the Privacy-ABC technologies through certification.

User Acceptance Factors for Anonymous Credentials: An Empirical Investigation

TLDR
A theoretical development of a user acceptance model for anonymous credentials and its evaluation in a real-world trial, where PU1 is the most important factor of user adoption, outweighing the usability and the usefulness of the deployed PET (PU2).

References

SHOWING 1-10 OF 28 REFERENCES

Theft and Misuse Protection for Anonymous Credentials

TLDR
An overview of several techniques to cope with credential misuse, such as sharing or theft, in anonymous credential systems are presented and how two concrete techniques — K-show credentials and hardware-bound credentials — have been implemented into the idemix system are described.

Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy

TLDR
Subsets of the proposed cryptographic building blocks can be used in combination, allowing a cookbook approach to the design of public key infrastructures.

Attribute-Based Credentials for Trust (ABC4Trust)

The rapid growth of communication infrastructures and enterprise software solutions has caused electronic services to penetrate into our everyday life. So it is not far from reality that many

Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings

This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates

Design and implementation of the idemix anonymous credential system

TLDR
The design and implementation of an anonymous credential system based on the protocols developed by [6] is described, based on new high-level primitives and interfaces allowing for easy integration into access control systems.

Design Rationale behind the Identity Metasystem Architecture

TLDR
The design decisions presented in this paper are intended to result in a widely accepted, broadly applicable, inclusive, comprehensible, privacyenhancing, securityenhancing identity solution for the Internet.

Performance Issues of Selective Disclosure and Blinded Issuing Protocols on Java Card

TLDR
The performance of the RSA variants of Brands protocols for zero-knowledge proof and restrictive blinded issuing is relatively bad and with appropriate support of the cryptographic coprocessor both protocols would run much faster.

Electronic Identity Cards for User Authentication—Promise and Practice

TLDR
Electronic identity (elD) cards promise to supply a nationwide user authentication mechanism, but application issues might hamper its adoption.

Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings

TLDR
Improve Multi-bit Spectral Analysis on Hiding in Temporal Dimension and Secure Delegation of Elliptic-Curve Pairing are enhanced.