Anonymous Credential Schemes with Encrypted Attributes
نویسندگان
چکیده
In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attributes, in which issuers certify credentials on encrypted attributes to users. These schemes allow for the possibility that none of the involved parties, including the user, learns the values of the attributes. In fact, we will treat several variations differing in which parties see which attributes in the clear. We present efficient constructions of these new credential schemes, starting from a credential scheme by Brands, and we show that the security of Brands’ original scheme is retained. Finally, we sketch several interesting applications of these novel credential schemes.
منابع مشابه
Composable and Modular Anonymous Credentials: Definitions and Practical Constructions
It takes time for theoretical advances to get used in practical schemes. Anonymous credential schemes are no exception. For instance, existing schemes suited for real-world use lack formal, composable definitions, partly because they do not support straight-line extraction and rely on random oracles for their security arguments. To address this gap, we propose unlinkable redactable signatures (...
متن کاملPractical Revocable Anonymous Credentials
Currently, there are many solutions for authentication. Mostly, the authentication protocols based on traditional cryptographic constructions, such as digital signatures, hash functions and symmetric encryption schemes, are used. To provide more privacy protection, credential systems were introduced. Using these systems, users can anonymously prove that they possess some attributes. The attribu...
متن کاملPrivacy-Preserving Predicate Proof of Attributes with CL-Anonymous Credential
The anonymous credential system allows users to convince relying parties the possession of a credential released by an issuer. To adhere to the minimal information disclose principle, the anonymous credential facilitates predicate proofs of attributes without revealing the values. In this paper, we extend the pairing-based CL-anonymous credential system and present a series of attributes proof ...
متن کاملA General Certification Framework with Applications to Privacy-Enhancing Certificate Infrastructures
Interactions in electronic media require mutual trust to be established, preferably through the release of certified information. Disclosing certificates for provisioning the required information often leads to the disclosure of additional information not required for the purpose of the interaction. For instance ordinary certificates unnecessarily reveal their binary representation. We propose ...
متن کاملMAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials
We consider the problem of constructing anonymous credentials for use in asetting where the issuer of credentials is also the verifier, or where the issuer andverifier have a shared key. In this setting we can use message authenticationcodes (MACs) instead of public key signatures as the basis of the credentialsystem.To this end, we construct two algebraic MAC schemes in pri...
متن کامل