Hidden Issuer Anonymous Credential
نویسندگان
چکیده
Identity Management Systems (IMS) allow users to prove characteristics about themselves multiple service providers. IMS evolved from impractical, site-by-site authentication, versatile, privacyenhancing Self Sovereign (SSI) Frameworks. SSI frameworks often use Anonymous Credential schemes provide user privacy, and more precisely unlinkability between uses of these credentials. However, imply the disclosure identity Issuer a given credential any provider. This can lead information leaks. We deal with this problem by introducing new scheme that allows hide credential, while being able convince providers they trust in absence trusted setup. secure under Computational Diffie Hellman assumption, Decisional Random Oracle Model. show is efficient enough be used laptops, integrated into or other IMS.
منابع مشابه
Vulnerabilities in Anonymous Credential Systems
We show the following: (i) In existing anonymous credential revocation systems, the revocation authority can link the transactions of any user in a subset T of users in O(log |T |) fake failed sessions. (ii) A concern about the DLREP-I anonymous credentials system described in [Br00] and [Br02].
متن کاملAuthentication Without Identification using Anonymous Credential System
Privacy and security are often intertwined. For example, identity theft is rampant because we have become accustomed to authentication by identification. To obtain some service, we provide enough information about our identity for an unscrupulous person to steal it (for example, we give our credit card number to Amazon.com). One of the consequences is that many people avoid e-commerce entirely ...
متن کاملA Security Model for Anonymous Credential Systems
This paper proposes a formal model of the Bellare-Rogaway type [Bellare and Rogaway, 1994] that enables one to prove the security of an anonymous credential system in a complexity theoretic framework. The model abstracts away from how a specific instance of anonymous credential system achieves its goals; instead it defines what these goals are. The notions of credential unforgeability, non-tran...
متن کاملAnonymous Credential Schemes with Encrypted Attributes
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attributes, in which issuers certify credentials on encrypted attributes to users. These schemes allow f...
متن کاملAn Anonymous Credential System and a Privacy-Aware PKI
In this paper we present a non-transferable anonymous credential system that is based on the concept of a chameleon certificate. A chameleon certificate is a special certificate that enjoys two interesting properties. Firstly, the owner can choose which attributes of the certificate to disclose. Moreover, a chameleon certificate is multi-show in the sense that several uses of the same chameleon...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Proceedings on Privacy Enhancing Technologies
سال: 2022
ISSN: ['2299-0984']
DOI: https://doi.org/10.56553/popets-2022-0123