Skip to main content

Comparison of Mechanisms

  • Chapter
  • First Online:
Attribute-based Credentials for Trust

Abstract

In this chapter we compare Privacy-ABC schemes based on the security, functionality and efficiency they offer. The aim of this is to help researchers and application developers choose an schemes and parameters most suitable for their application.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. André Årnes, Mike Just, Svein J Knapskog, Steve Lloyd, and Henk Meijer. Selecting Revocation Solutions for PKI, 2000.

    Google Scholar 

  2. Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies - Final Version. Deliverable D2.2, The ABC4Trust EU Project, 2014. Available at https://abc4trust.eu/download/Deliverable_D2.2.pdf, Last accessed on 2014-11-08.

  3. Mira Belenkiy, Melissa Chase, Markulf Kohlweiss, and Anna Lysyanskaya. P-signatures and Noninteractive Anonymous Credentials. In Theory of Cryptography, volume 4948, pages 356–374. Springer, 2008.

    Google Scholar 

  4. Foteini Baldimtsi and Anna Lysyanskaya. Anonymous credentials light. In Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, pages 1087–1098. ACM, 2013.

    Google Scholar 

  5. Stefan A Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000.

    Google Scholar 

  6. Jan Camenisch, Maria Dubovitskaya, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss. Concepts and Languages for Privacy-Preserving Attribute-Based Authentication. In IDMAN, volume 396, pages 34–52. Springer, 2013.

    Google Scholar 

  7. Jan Camenisch and Anna Lysyanskaya. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. In Advances in Cryptology, pages 61–76. Springer, 2002.

    Google Scholar 

  8. Jan Camenisch and Anna Lysyanskaya. A Signature Scheme with Efficient Protocols. In Proceedings of the 3rd International Conference on Security in Communication Networks, pages 268–289. Springer, 2003.

    Google Scholar 

  9. Jesus Luna Garcia, Robert Langenberg, and Neeraj Suri. Benchmarking Cloud Security Level Agreements Using Quantitative Policy Trees. In CCSW, pages 103–112. ACM, 2012.

    Google Scholar 

  10. Jesus Luna, Hamza Ghani, Tsvetoslava Vateva, and Neeraj Suri. Quantitative Assessment of Cloud Security Level Agreements: A Case Study. In SECRYPT, pages 64–73. SciTePress, 2012.

    Google Scholar 

  11. Jorn Lapon, Markulf Kohlweiss, Bart De Decker, and Vincent Naessens. Performance Analysis of Accumulator-Based Revocation Mechanisms. In SEC, volume 330, pages 289–301. Springer, 2010.

    Google Scholar 

  12. Jorn Lapon, Markulf Kohlweiss, Bart De Decker, and Vincent Naessens. Analysis of Revocation Strategies for Anonymous Idemix Credentials. In Communications and Multimedia Security, volume 7025, pages 3–17. Springer, 2011.

    Google Scholar 

  13. Jiangtao Li, Ninghui Li, and Rui Xue. Universal accumulators with efficient nonmembership proofs. 2007.

    Google Scholar 

  14. Wojciech Mostowski and Pim Vullers. Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. In SecureComm, volume 96, pages 243–260. Springer, 2011.

    Google Scholar 

  15. Pierre Parrend and Stéphane Frénot. Security benchmarks of OSGi platforms: toward Hardened OSGi. Softw., Pract. Exper., 39(5):471–499, 2009.

    Google Scholar 

  16. Christian Paquin and Greg Zaverucha. U-prove Cryptographic Specification v1.1 (Revision 2). Technical report, Microsoft Corporation, 2013.

    Google Scholar 

  17. Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of Cryptology, 4:161–174, 1991.

    Google Scholar 

  18. Nigel Smart. ECRYPT II yearly report on algorithms and keysizes (2011-2012). www.ecrypt.eu.org/documents/D.SPA.20.pdf, 2012.

  19. Pim Vullers and Gergely Alpár. Efficient Selective Disclosure on Smart Cards Using Idemix. In IDMAN, volume 396, pages 53–67. Springer, 2013.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michael Østergaard Pedersen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Pedersen, M.Ø., Mikkelsen, G.L., Veseli, F., Sabouri, A., Vateva-Gurova, T. (2015). Comparison of Mechanisms. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds) Attribute-based Credentials for Trust. Springer, Cham. https://doi.org/10.1007/978-3-319-14439-9_4

Download citation

Publish with us

Policies and ethics