Publication detail

Attribute-based credentials with cryptographic collusion prevention

HAJNÝ, J. DZURENDA, P. MALINA, L.

Original Title

Attribute-based credentials with cryptographic collusion prevention

Czech Title

Attribute-based credentials with cryptographic collusion prevention

English Title

Attribute-based credentials with cryptographic collusion prevention

Type

journal article

Language

en

Original Abstract

In this paper, we present the full cryptographic specification of an ABC scheme, which makes the collusion attacks impossible even on insecure hardware like mobile phones. Furthermore, the scheme provides features, which are difficult to achieve using existing schemes, namely the practical revocation of users, the de-anonymization of malicious users, and the unlinkability of verification sessions.

Czech abstract

Ve článku je publikována plná specifikace kryptografického systému ABC (Attribute-Based Credentials) s ochranou proti útokům na nezabezpečeném hardwaru, jakým jsou např. mobilní telefony. Dále schéma obsahuje vlastnosti doposud neposkytované, především efektivní revokaci a de-anonymizaci útočníků a nespojitelnost ověřovacích relací.

English abstract

In this paper, we present the full cryptographic specification of an ABC scheme, which makes the collusion attacks impossible even on insecure hardware like mobile phones. Furthermore, the scheme provides features, which are difficult to achieve using existing schemes, namely the practical revocation of users, the de-anonymization of malicious users, and the unlinkability of verification sessions.

Keywords

privacy;attribute-based credentials;access-control;smart cards;smart phones;anonymity

RIV year

2015

Released

07.07.2015

Publisher

Wiley

Pages from

3836

Pages to

3846

Pages count

11

BibTex


@article{BUT115425,
  author="Jan {Hajný} and Petr {Dzurenda} and Lukáš {Malina}",
  title="Attribute-based credentials with cryptographic collusion prevention",
  annote="In this paper, we present the full cryptographic specification of an ABC scheme, which makes the collusion attacks impossible even on insecure hardware like mobile phones. Furthermore, the scheme provides features, which are difficult to achieve using existing schemes, namely the practical revocation of users, the de-anonymization of malicious users, and the unlinkability of verification sessions.",
  address="Wiley",
  chapter="115425",
  doi="10.1002/sec.1304",
  howpublished="online",
  institution="Wiley",
  number="18",
  volume="8",
  year="2015",
  month="july",
  pages="3836--3846",
  publisher="Wiley",
  type="journal article"
}