Anonymous credential schemes with encrypted attributes

J. Guajardo, B. Mennink, B. Schoenmakers

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

In anonymous credential schemes, users obtain credentials on certain attributes from an issuer, and later show these credentials to a relying party anonymously and without fully disclosing the attributes. In this paper, we introduce the notion of (anonymous) credential schemes with encrypted attributes, in which issuers certify credentials on encrypted attributes to users. These schemes allow for the possibility that none of the involved parties, including the user, learns the values of the attributes. In fact, we will treat several variations differing in which parties see which attributes in the clear. We present efficient constructions of these new credential schemes, starting from a credential scheme by Brands, and we show that the security of Brands’ original scheme is retained. Finally, we sketch several interesting applications of these novel credential schemes.
Original languageEnglish
Title of host publicationCryptology and Network Security (9th International Conference, CANS 2010, Kuala Lumpur, Malaysia, December 12-14, 2010. Proceedings)
EditorsS.-H. Heng, R.N. Wright, B.-M. Goi
Place of PublicationBerlin
PublisherSpringer
Pages314-333
ISBN (Print)978-3-642-17618-0
DOIs
Publication statusPublished - 2010

Publication series

NameLecture Notes in Computer Science
Volume6467
ISSN (Print)0302-9743

Fingerprint

Dive into the research topics of 'Anonymous credential schemes with encrypted attributes'. Together they form a unique fingerprint.

Cite this