Skip to main content

Technical Implementation and Feasibility

  • Chapter
  • First Online:
Book cover Attribute-based Credentials for Trust

Abstract

This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Josep Balasch. Smart ard Implementation of Anonymous redentials. PhD thesis, KATHOLIEKE UNIVERSITEIT LEUVEN, 2008.

    Google Scholar 

  2. Thomas Baign`eres, Patrik Bichsel, Robert R Enderlein, Hans Knudsen, Kasper Damgård, Jonas Jensen, Gregory Neven, Janus Nielsen, Pascal Paillier, and Michael Stausholm. Final Reference Implementation. Deliverable D4.2, The ABC4Trust EU Project, 2014. Available at https://abc4trust.eu/download/D4.2 % 20Final%20Reference%20Implementation.pdf, Last accessed on 2014-11-08.

  3. Ernie Brickell, Jan Camenisch, and Liqun Chen. Direct anonymous attestation. In Proceedings of the 11th ACM conference on Computer and communications security, pages 132–145. ACM, 2004.

    Google Scholar 

  4. Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Janus Dam Nielsen, Christian Paquin, Franz-Stefan Preiss, Kai Rannenberg, Ahmad Sabouri, and Michael Stausholm. Architecture for Attribute-based Credential Technologies - Final Version. Deliverable D2.2, The ABC4Trust EU Project, 2014. Available at https://abc4trust.eu/download/Deliverable_ D2.2.pdf, Last accessed on 2014-11-08.

  5. Patrik Bichsel, Jan Camenisch, Thomas Groß, and Victor Shoup. Anonymous credentials on a standard java card. In Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009, pages 600–610, 2009.

    Google Scholar 

  6. Thomas Baign`eres, Ccile Delerabl`ee, and Pascal Paillier. Programming Privacy-ABCs on the ABC4Trust Lite v1.1 Smart Card, 2014.

    Google Scholar 

  7. Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, and Pim Vullers. Developing efficient blinded attribute certificates on smart cards via pairings. In Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Passau, Germany, April 14-16, 2010. Proceedings, pages 209– 222, 2010.

    Google Scholar 

  8. Patrik Bichsel. Theft and misuse protection for anonymous credentials. Master’s thesis, ETH Z¨urich, Switzerland, 2007.

    Google Scholar 

  9. Jan Camenisch, Ioannis Krontiris, Anja Lehmann, Gregory Neven, Christian Paquin, Kai Rannenberg, and Harald Zwingelberg. Architecture for Attribute-based Credential Technologies - Version 1. Deliverable D2.1, The ABC4Trust EU Project, 2011. Available at https://abc4trust.eu/download/ABC4Trust-D2.1-Architecture-V1.2.pdf, Last accessed on 2014-11-08.

  10. Hans Guldage and Janus Dam Nielsen. Initial Reference Implementation. Deliverable D4.1, The ABC4Trust EU Project, 2012.

    Google Scholar 

  11. Jonas Lindstrøm Jensen. Smartphone Feasibility Analysis. Deliverable D4.4, The ABC4Trust EU Project, 2014. Available at https://abc4trust.eu/download/Deliverable_D4.4.pdf, Last accessed on 2014-11-08.

  12. N. Looker, M. Munro, and J. Xu. Simulating Errors in Web Services. International Journal of Simulation Systems, Science & Technology, 5(5):29–37, December 2004.

    Google Scholar 

  13. Jesus Luna, Neeraj Suri, Giancarlo Pellegrino, Heng Zhang, and Michael Bladt Stausholm. Final Perturbation Analysis of the Implementation. Deliverable D4.3, The ABC4Trust EU Project, 2014. Available at https://abc4trust.eu/download/D4%203_PerturbationAnalysis_final.pdf, Last accessed on 2014-11-08.

  14. Nik Looker and Jie Xu. Assessing the Dependability of SOAP RPCBased Web Services by Fault Injection. In Object-Oriented Real-Time Dependable Systems, 2003. WORDS 2003 Fall. The Ninth IEEE International Workshop on, page 163. IEEE, October 2003.

    Google Scholar 

  15. Nik Looker and Jie Xu. Assessing the Dependability of SOAP RPCBased Web Services by Fault Injection. In Object-Oriented Real-Time Dependable Systems, 2003. WORDS 2003 Fall. The Ninth IEEE International Workshop on, pages 163–163, Oct 2003.

    Google Scholar 

  16. Christian Paquin. Privacy and accountability in identity systems: the best of both worlds. TechReport MSR-TR-2013-85, Microsoft Corporation, September 2013.

    Google Scholar 

  17. Christian Paquin and Greg Zaverucha. U-prove Cryptographic Specification v1.1 (Revision 2). Technical report, Microsoft Corporation, 2013.

    Google Scholar 

  18. Hendrik Tews and Bart Jacobs. Performance issues of selective disclosure and blinded issuing protocols on java card. In Information Security Theory and Practice. Smart Devices, Pervasive Systems, and Ubiquitous Networks, Third IFIP WG 11.2 International Workshop, WISTP 2009, Brussels, Belgium, September 1-4, 2009, Proceedings, pages 95–111, 2009.

    Google Scholar 

  19. Jeffrey M Voas and Keith W Miller. Software testability: The new verification. IEEE Software, 12(3):17–28, 1995.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gert Læssøe Mikkelsen .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Mikkelsen, G.L. et al. (2015). Technical Implementation and Feasibility. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds) Attribute-based Credentials for Trust. Springer, Cham. https://doi.org/10.1007/978-3-319-14439-9_9

Download citation

Publish with us

Policies and ethics