Camenisch et al., 2002 - Google Patents
Design and implementation of the idemix anonymous credential systemCamenisch et al., 2002
View PDF- Document ID
- 397789254469590374
- Author
- Camenisch J
- Van Herreweghen E
- Publication year
- Publication venue
- Proceedings of the 9th ACM Conference on Computer and Communications Security
External Links
Snippet
Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In …
- 238000000034 method 0 abstract description 5
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L69/00—Application independent communication protocol aspects or techniques in packet data networks
- H04L69/30—Definitions, standards or architectural aspects of layered protocol stacks
- H04L69/32—High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
- H04L69/322—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
- H04L69/329—Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0435—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/606—Protecting data by securing the transmission between two devices or processes
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/82—Protecting input, output or interconnection devices
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Camenisch et al. | Design and implementation of the idemix anonymous credential system | |
EP3788523B1 (en) | System and method for blockchain-based cross-entity authentication | |
US10333941B2 (en) | Secure identity federation for non-federated systems | |
Lopez et al. | Authentication and authorization infrastructures (AAIs): a comparative survey | |
Zissis et al. | Addressing cloud computing security issues | |
US8141139B2 (en) | Federated single sign-on (F-SSO) request processing using a trust chain having a custom module | |
Bhargav-Spantzel et al. | User centricity: a taxonomy and open issues | |
US8627085B2 (en) | Customizable public key infrastructure and development tool for same | |
Fotiou et al. | OAuth 2.0 authorization using blockchain-based tokens | |
Lee et al. | Traust: a trust negotiation-based authorization service for open systems | |
Johnston et al. | A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments | |
Fugkeaw et al. | Multi-Application Authentication based on Multi-Agent System. | |
Tan et al. | Securing agent-based e-banking services | |
Ioannidis et al. | Distributed Trust. | |
Varadharajan | Authorization and trust enhanced security for distributed applications | |
Chang et al. | Open Authentication Model Supporting Electronic Commerce in Distributed Computing | |
Gimenez et al. | Securing an interoperability architecture for home and urban networking: implementation of the security aspects in the INREDIS interoperability architecture | |
Guemara-ElFatmi et al. | Relational-based calculus for trust management in networked services | |
Winnard et al. | Managing Digital Certificates Across the Enterprise | |
Alom et al. | VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials | |
Caronni | Dynamic security in communication systems | |
Palomares et al. | D3. 8 Final Version of Decentralized Identity Management | |
Mostéfaoui | Security Solutions for Jini-Based Applications | |
Koshutanski et al. | Towards user-centric identity interoperability for digital ecosystems | |
JP5466698B2 (en) | Systems that process encryption certificates |