Skip to main content

Privacy-Aware Identity Management

  • Living reference work entry
  • First Online:
Book cover Encyclopedia of Big Data Technologies

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  • Baldimtsi F, Camenisch J, Hanzlik L, Krenn S, Lehmann A, Neven G (2015) Recovering lost device-bound credentials. In: Malkin T, Kolesnikov V, Lewko AB, Polychronakis M (eds) Applied cryptography and network security – 13th international conference, ACNS 2015, 2–5 June 2015, Revised selected papers. Lecture notes in computer science, vol 9092. Springer, New York, pp 307–327. https://doi.org/10.1007/978-3-319-28166-7_15

  • Bender J, Dagdelen Ö, Fischlin M, Kügler D (2012) Domain-specific pseudonymous signatures for the german identity card. In: Gollmann D, Freiling FC (eds) Proceedings of the 15th international conference on information security, ISC, 19–21 Sept 2012. Lecture notes in computer science, vol 7483. Springer, Passau, pp 104–119. https://doi.org/10.1007/978-3-642-33383-5_7

  • Bringer J, Chabanne H, Lescuyer R, Patey A (2014) Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents. In: Christin N, Safavi-Naini R (eds) 18th international conference on financial cryptography and data security, FC 3–7 Mar 2014, Revised selected papers. Lecture notes in computer science, vol 8437. Springer, Christ Church, Barbados, pp 255–272. https://doi.org/10.1007/978-3-662-45472-5_16

  • BSI (2016) Technical guideline tr-03110 v2.21 – advanced security mechanisms for machine readable travel documents and eIDAS token. Available at: https://www.bsi.bund.de/EN/Publications/TechnicalGuidelines/TR03110/BSITR03110.html

  • Fuchsbauer G (2011) Commuting signatures and verifiable encryption. In: Paterson KG (ed) Advances in cryptology – EUROCRYPT 2011–30th annual international conference on the theory and applications of cryptographic techniques, 15–19 May 2011. Proceedings. Lecture notes in computer science, vol 6632. Springer, Tallinn, pp 224–245. https://doi.org/10.1007/978-3-642-20465-4_14

  • Hanzlik L, Kluczniak K, Kutyłowski M, Dolev S (2016) Local self-organization with strong privacy protection. In: 2016 IEEE Trustcom/BigDataSE/ISPA, 23–26 Aug 2016. IEEE, Tianjin, pp 775–782. https://doi.org/10.1109/TrustCom.2016.0138

  • Klonowski M, Kutylowski M, Lauks A, Zagórski F (2005) Conditional digital signatures. In: Katsikas SK, Lopez J, Pernul G (eds) Trust, privacy and security in digital business: second international conference, TrustBus 2005, 22–26 Aug 2005. Proceedings. Lecture notes in computer science, vol 3592. Springer, Copenhagen, pp 206–215. https://doi.org/10.1007/11537878_21

  • Kutyłowski M, Krzywiecki Ł, Kubiak P, Koza M (2011) Restricted identification scheme and Diffie-Hellman linking problem. In: Chen L, Yung M, Zhu L (eds) Trusted systems – third international conference, INTRUST, 27–29 Nov 2011, Revised selected papers. Lecture notes in computer science, vol 7222. Springer, Beijing, pp 221–238. https://doi.org/10.1007/978-3-642-32298-3_15

  • Kutyłowski M, Hanzlik L, Kluczniak K (2016) Pseudonymous signature on eIDAS token – implementation based privacy threats. In: Liu JK, Steinfeld R (eds) Information security and privacy – 21st Australasian conference, ACISP, 4–6 July 2016. Proceedings, Part II. Lecture notes in computer science, vol 9723. Springer, Melbourne, pp 467–477. https://doi.org/10.1007/978-3-319-40367-0_31

  • Pedersen TP (1991) Non-interactive and information-theoretic secure verifiable secret sharing. In: Feigenbaum J (ed) Advances in cryptology – CRYPTO ’91, 11th annual international cryptology conference, 11–15 Aug 1991. Proceedings. Lecture notes in computer science, vol 576. Springer, Santa Barbara, pp 129–140. https://doi.org/10.1007/3-540-46766-1_9

  • The European Parliament and the Council of the European Union (2016) Regulation (EU) 2016/679 of the European parliament and of the council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, and repealing directive 95/46/ec (General Data Protection Regulation). Official Journal of the European Union 119(1)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mirosław Kutyłowski .

Editor information

Editors and Affiliations

Section Editor information

Rights and permissions

Reprints and permissions

Copyright information

© 2018 Springer International Publishing AG

About this entry

Check for updates. Verify currency and authenticity via CrossMark

Cite this entry

Kutyłowski, M., Błaśkiewicz, P. (2018). Privacy-Aware Identity Management. In: Sakr, S., Zomaya, A. (eds) Encyclopedia of Big Data Technologies. Springer, Cham. https://doi.org/10.1007/978-3-319-63962-8_241-1

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-63962-8_241-1

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-63962-8

  • Online ISBN: 978-3-319-63962-8

  • eBook Packages: Springer Reference MathematicsReference Module Computer Science and Engineering

Publish with us

Policies and ethics