Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 218,391,356 papers from all fields of science
Search
Sign In
Create Free Account
Digital credential
Digital credentials are the digital equivalent of paper-based credentials. Just as a paper-based credential could be a passport, a Driver's license…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
29 relations
Algorithm
Blind credential
Blind signature
Computer access control
Expand
Broader (3)
Cryptography
E-commerce
Financial cryptography
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Non-Interactive Zero-Knowledge Proofs for Composite Statements
Shashank Agrawal
,
C. Ganesh
,
Payman Mohassel
IACR Cryptology ePrint Archive
2018
Corpus ID: 51602941
The two most common ways to design non-interactive zero-knowledge (NIZK) proofs are based on Sigma protocols and QAP-based SNARKs…
Expand
2013
2013
An Improved Privacy-Preserving Navigation Protocol in {VANET}s
Wonjun Cho
,
Youngho Park
,
Chul Sur
,
K. Rhee
J. Wirel. Mob. Networks Ubiquitous Comput…
2013
Corpus ID: 18038174
Recent advance of vehicular technology offers opportunities for developing new navigation systems to overcome the problems of…
Expand
2013
2013
POPCORN: privacy-preserving charging for emobility
C. Höfer
,
J. Petit
,
R. Schmidt
,
F. Kargl
CyCAR '13
2013
Corpus ID: 14440503
Upcoming years will see a massive deployment of electric vehicles and, combined with this, of charging infrastructure. This will…
Expand
Highly Cited
2012
Highly Cited
2012
Efficient Attributes for Anonymous Credentials
J. Camenisch
,
Thomas Gross
TSEC
2012
Corpus ID: 910650
We extend the Camenisch-Lysyanskaya anonymous credential system such that selective disclosure of attributes becomes highly…
Expand
2011
2011
PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
M. Au
,
Patrick P. Tsang
,
Apu Kapadia
TSEC
2011
Corpus ID: 15116362
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses…
Expand
Highly Cited
2011
Highly Cited
2011
Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards
Wojciech Mostowski
,
Pim Vullers
Security and Privacy in Communication Networks
2011
Corpus ID: 2075474
In this paper we discuss an efficient implementation of anonymous credentials on smart cards. In general, privacy-preserving…
Expand
2011
2011
Oblivious Transfer with Hidden Access Control Policies
J. Camenisch
,
M. Dubovitskaya
,
G. Neven
,
Gregory M. Zaverucha
International Conference on Theory and Practice…
2011
Corpus ID: 15578323
Consider a database where each record has different access control policies. These policies could be attributes, roles, or rights…
Expand
2010
2010
Making a Nymbler Nymble Using VERBS
Ryan Henry
,
Kevin J. Henry
,
I. Goldberg
International Symposium on Privacy Enhancing…
2010
Corpus ID: 793852
We propose a new system modeled after Nymble. Like Nymble, our scheme provides a privacy-preserving analog of IP address blocking…
Expand
Highly Cited
2008
Highly Cited
2008
PEREA: towards practical TTP-free revocation in anonymous authentication
Patrick P. Tsang
,
M. Au
,
Apu Kapadia
,
Sean W. Smith
Conference on Computer and Communications…
2008
Corpus ID: 3183174
Several anonymous authentication schemes allow servers to revoke a misbehaving user's ability to make future accesses…
Expand
Review
2002
Review
2002
A Technical Overview of Digital Credentials
S. Brands
2002
Corpus ID: 18284690
Applications that involve the electronic transfer of credentials, value tokens, profiles, and other sensitive information are…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE