TY - GEN
T1 - Anonymous credential schemes with encrypted attributes
AU - Guajardo, J.
AU - Mennink, B.
AU - Schoenmakers, B.
PY - 2010
Y1 - 2010
N2 - In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attributes, in which issuers certify credentials on encrypted attributes to users. These schemes allow for the possibility that none of the involved parties, including the user, learns the values of the attributes. In fact, we will treat several variations differing in which parties see which attributes in the clear. We present efficient constructions of these new credential schemes, starting from a credential scheme by Brands, and we show that the security of Brands’ original scheme is retained. Finally, we sketch several interesting applications of these novel credential schemes.
AB - In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attributes, in which issuers certify credentials on encrypted attributes to users. These schemes allow for the possibility that none of the involved parties, including the user, learns the values of the attributes. In fact, we will treat several variations differing in which parties see which attributes in the clear. We present efficient constructions of these new credential schemes, starting from a credential scheme by Brands, and we show that the security of Brands’ original scheme is retained. Finally, we sketch several interesting applications of these novel credential schemes.
U2 - 10.1007/978-3-642-17619-7_22
DO - 10.1007/978-3-642-17619-7_22
M3 - Conference contribution
SN - 978-3-642-17618-0
T3 - Lecture Notes in Computer Science
SP - 314
EP - 333
BT - Cryptology and Network Security (9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings)
A2 - Heng, S.-H.
A2 - Wright, R.N.
A2 - Goi, B.-M.
PB - Springer
CY - Berlin
ER -