With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

A privacy-enhancing framework for internet of things services

L Malina, G Srivastava, P Dzurenda, J Hajny… - Network and System …, 2019 - Springer
The world has seen an influx of connected devices through both smart devices and smart
cities, paving the path forward for the Internet of Things (IoT). These emerging intelligent …

How to bind anonymous credentials to humans

J Hesse, N Singh, A Sorniotti - 32nd USENIX Security Symposium …, 2023 - usenix.org
Digital and paper-based authentication are the two predominant mechanisms that have
been deployed in the real world to authenticate end-users. When verification of a digital …

Capturing autonomy in its multiple facets: A Digital Twin approach

R Heininger, C Stary - Proceedings of the 2021 ACM Workshop on …, 2021 - dl.acm.org
Autonomy has been touted to be a major asset of Cyber-Physical Systems (CPS) and its
components. By intertwining non-physical and physical processes they seamlessly integrate …

Proofs of discrete logarithm equality across groups

M Chase, M Orrù, T Perrin, G Zaverucha - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Abstract We provide a $\Sigma $-protocol for proving that two values committed in different
groups are equal. We study our protocol in Lyubashevsky's framework" Fiat-Shamir with …

MoniPoly—An Expressive q-SDH-Based Anonymous Attribute-Based Credential System

SY Tan, T Groß - International Conference on the Theory and …, 2020 - Springer
Modern attribute-based anonymous credential (ABC) systems benefit from special
encodings that yield expressive and highly efficient show proofs on logical statements. The …

Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing

P Li, J Lai, Y Wu - Frontiers of Computer Science, 2023 - Springer
We introduce a new notion called accountable attribute-based authentication with fine-
grained access control (AccABA), which achieves (i) fine-grained access control that …

[PDF][PDF] AAKA: An Anti-Tracking Cellular Authentication Scheme Leveraging Anonymous Credentials

H Yu, C Du, Y Xiao, A Keromytis, C Wang… - Network and …, 2023 - angelosk.github.io
Mobile tracking has long been a privacy problem, where the geographic data and
timestamps gathered by mobile network operators (MNOs) are used to track the locations …

An efficient fine-grained data access control system with a bounded service number

X Liu, H Wang, B Zhang, B Zhang - Information Sciences, 2022 - Elsevier
In a data access control system oriented toward the cloud storage environment, a data
owner defines attribute-based access control policies for data files to realize fine-grained …