Skip to search formSkip to main contentSkip to account menu

Digital credential

Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a Driver's license… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
The two most common ways to design non-interactive zero-knowledge (NIZK) proofs are based on Sigma protocols and QAP-based SNARKs… 
2013
2013
Recent advance of vehicular technology offers opportunities for developing new navigation systems to overcome the problems of… 
2013
2013
Upcoming years will see a massive deployment of electric vehicles and, combined with this, of charging infrastructure. This will… 
Highly Cited
2012
Highly Cited
2012
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly… 
2011
2011
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses… 
Highly Cited
2011
Highly Cited
2011
In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving… 
2011
2011
Consider a database where each record has different access control policies. These policies could be attributes, roles, or rights… 
2010
2010
We propose a new system modeled after Nymble. Like Nymble, our scheme provides a privacy-preserving analog of IP address blocking… 
Highly Cited
2008
Highly Cited
2008
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses… 
Review
2002
Review
2002
Applications that involve the electronic transfer of credentials, value tokens, profiles, and other sensitive information are…