Publication detail

Attribute-based credentials with cryptographic collusion prevention

HAJNÝ, J. DZURENDA, P. MALINA, L.

Original Title

Attribute-based credentials with cryptographic collusion prevention

English Title

Attribute-based credentials with cryptographic collusion prevention

Type

journal article in Web of Science

Language

en

Original Abstract

In this paper, we present the full cryptographic specification of an ABC scheme, which makes the collusion attacks impossible even on insecure hardware like mobile phones. Furthermore, the scheme provides features, which are difficult to achieve using existing schemes, namely the practical revocation of users, the de-anonymization of malicious users, and the unlinkability of verification sessions.

English abstract

In this paper, we present the full cryptographic specification of an ABC scheme, which makes the collusion attacks impossible even on insecure hardware like mobile phones. Furthermore, the scheme provides features, which are difficult to achieve using existing schemes, namely the practical revocation of users, the de-anonymization of malicious users, and the unlinkability of verification sessions.

Keywords

privacy;attribute-based credentials;access-control;smart cards;smart phones;anonymity

RIV year

2015

Released

07.07.2015

Publisher

Wiley

ISBN

1939-0114

Periodical

Security and Communication Networks

Year of study

8

Number

18

State

GB

Pages from

3836

Pages to

3846

Pages count

11

Documents

BibTex


@article{BUT115425,
  author="Jan {Hajný} and Petr {Dzurenda} and Lukáš {Malina}",
  title="Attribute-based credentials with cryptographic collusion prevention",
  annote="In this paper, we present the full cryptographic specification of an ABC scheme, which makes the collusion attacks impossible even on insecure hardware like mobile phones. Furthermore, the scheme provides features, which are difficult to achieve using existing schemes, namely the practical revocation of users, the de-anonymization of malicious users, and the unlinkability of verification sessions.",
  address="Wiley",
  chapter="115425",
  doi="10.1002/sec.1304",
  howpublished="online",
  institution="Wiley",
  number="18",
  volume="8",
  year="2015",
  month="july",
  pages="3836--3846",
  publisher="Wiley",
  type="journal article in Web of Science"
}