Attribute-based Credentials for Trust: Identity in the by Kai Rannenberg, Jan Camenisch, Ahmad Sabouri

By Kai Rannenberg, Jan Camenisch, Ahmad Sabouri

The want for info privateness and defense keeps to develop and will get more and more well-known. during this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are dependent strategies to supply safe but privacy-respecting entry keep watch over. This publication addresses the federation and interchangeability of Privacy-ABC applied sciences. It defines a standard, unified structure for Privacy-ABC platforms that enables their respective gains to be in comparison and mixed additional, this ebook provides open reference implementations of chosen Privacy-ABC platforms and explains tips on how to set up them in genuine construction pilots, permitting provably approved individuals of limited groups to supply nameless suggestions on their neighborhood or its individuals. thus far, credentials akin to digitally signed items of non-public details or different details used to authenticate or establish a person haven't been designed to admire the clients’ privateness. They unavoidably exhibit the id of the holder even if the appliance handy frequently wishes less info, e.g. merely the affirmation that the holder is or is eligible for social advantages. by contrast, Privacy-ABCs permit their holders to bare merely their minimum info required by means of the purposes, with out giving freely their complete identification info. Privacy-ABCs hence facilitate the implementation of a reliable and even as privacy-respecting electronic society.

The ABC4Trust undertaking as a multidisciplinary and eu undertaking, offers a technological reaction to questions associated with facts protection.

Viviane Reding
(Former Vice-president of the ecu fee, Member of ecu Parliament)

Show description

Read Online or Download Attribute-based Credentials for Trust: Identity in the Information Society PDF

Similar nonfiction_12 books

The Cambodian Version of the Ramayana

Released within the 12 months 2004, The Cambodian model of the Ramayana is a necessary contribution to the sector of Asian reports.

Additional info for Attribute-based Credentials for Trust: Identity in the Information Society

Example text

This method verifies whether the statements made in the presentation token satisfy the corresponding presentation policy alternatives. The token verification is done in two steps. First, it is determined whether the statements made in the presentation token description logically satisfy the required statements in the corresponding presentation policy. Second, the validity of the cryptographic evidence for the given token description is verified. If both checks succeed, the ABCE outputs a boolean indicating the correct verification and, if requested, stores the presentation token in a dedicated token store, which allows the verifier to subsequently recognize established pseudonyms.

34 P. Bichsel et al. However, before any entity can create its parameters, the global system parameters have to be generated. This is done by invoking the method generateSystemParameters with the desired security level as the input. , size of secrets, size of moduli, size of group orders, prime probability), the range of values the attributes can take, and the cryptographic parameters for the pseudonyms. To ensure interoperability, every user, issuer, inspector, and revocation authority in the system must use the same system parameters for generating their cryptographic keys and parameters.

Scope-exclusive pseudonyms are unique per scope and per user secret. Meaning, for a given scope string and a given user secret, there is only one scope-exclusive pseudonym for which a valid presentation token can be generated. Scope exclusive pseudonyms are unlinkable in the sense that, without knowing the user secret, 2 An Architecture for Privacy-ABCs 27 one cannot tell whether two scope-exclusive pseudonyms for different scope strings were derived from the same or from different user secrets.

Download PDF sample

Rated 4.83 of 5 – based on 30 votes