[go: up one dir, main page]

Camenisch et al., 2002 - Google Patents

Design and implementation of the idemix anonymous credential system

Camenisch et al., 2002

View PDF
Document ID
397789254469590374
Author
Camenisch J
Van Herreweghen E
Publication year
Publication venue
Proceedings of the 9th ACM Conference on Computer and Communications Security

External Links

Snippet

Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In …
Continue reading at www.csl.mtu.edu (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Application independent communication protocol aspects or techniques in packet data networks
    • H04L69/30Definitions, standards or architectural aspects of layered protocol stacks
    • H04L69/32High level architectural aspects of 7-layer open systems interconnection [OSI] type protocol stacks
    • H04L69/322Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions
    • H04L69/329Aspects of intra-layer communication protocols among peer entities or protocol data unit [PDU] definitions in the application layer, i.e. layer seven
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0435Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply symmetric encryption, i.e. same key used for encryption and decryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for supporting authentication of entities communicating through a packet data network
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/82Protecting input, output or interconnection devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards

Similar Documents

Publication Publication Date Title
Camenisch et al. Design and implementation of the idemix anonymous credential system
EP3788523B1 (en) System and method for blockchain-based cross-entity authentication
US10333941B2 (en) Secure identity federation for non-federated systems
Lopez et al. Authentication and authorization infrastructures (AAIs): a comparative survey
Zissis et al. Addressing cloud computing security issues
US8141139B2 (en) Federated single sign-on (F-SSO) request processing using a trust chain having a custom module
Bhargav-Spantzel et al. User centricity: a taxonomy and open issues
US8627085B2 (en) Customizable public key infrastructure and development tool for same
Fotiou et al. OAuth 2.0 authorization using blockchain-based tokens
Lee et al. Traust: a trust negotiation-based authorization service for open systems
Johnston et al. A use-condition centered approach to authenticated global capabilities: Security architectures for large-scale distributed collaboratory environments
Fugkeaw et al. Multi-Application Authentication based on Multi-Agent System.
Tan et al. Securing agent-based e-banking services
Ioannidis et al. Distributed Trust.
Varadharajan Authorization and trust enhanced security for distributed applications
Chang et al. Open Authentication Model Supporting Electronic Commerce in Distributed Computing
Gimenez et al. Securing an interoperability architecture for home and urban networking: implementation of the security aspects in the INREDIS interoperability architecture
Guemara-ElFatmi et al. Relational-based calculus for trust management in networked services
Winnard et al. Managing Digital Certificates Across the Enterprise
Alom et al. VeriSSO: A Privacy-Preserving Legacy-Compatible Single Sign-On Protocol Using Verifiable Credentials
Caronni Dynamic security in communication systems
Palomares et al. D3. 8 Final Version of Decentralized Identity Management
Mostéfaoui Security Solutions for Jini-Based Applications
Koshutanski et al. Towards user-centric identity interoperability for digital ecosystems
JP5466698B2 (en) Systems that process encryption certificates