anonymous credential
Recently Published Documents


TOTAL DOCUMENTS

53
(FIVE YEARS 7)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Xudong Deng ◽  
Chengliang Tian ◽  
Fei Chen ◽  
Hequn Xian

Most of the existing identity management is the centralized architecture that has to validate, certify, and manage identity in a centralized approach by trusted authorities. Decentralized identity is causing widespread public concern because it enables to give back control of identity to clients, and the client then has the ability to control when, where, and with whom they share their credentials. A decentralized solution atop on blockchain will bypass the centralized architecture and address the single point of the failure problem. To our knowledge, blockchain is an inherited pseudonym but it cannot achieve anonymity and auditability directly. In this paper, we approach the problem of decentralized identity management starting from the designated-verifier anonymous credential (DVAC in short). DVAC would assist to build a new practical decentralized identity management with anonymity and auditability. Apart from the advantages of the conventional anonymous credential, the main advantage of the proposed DVAC atop blockchain is that the issued cryptographic token will be divided into shares at the issue phase and will be combined at the showing credential phase. Further, the smooth projective hash function ( SPHF in short) is regarded as a designated-verifier zero-knowledge proof system. Thus, we introduce the SPHF to achieve the designated verifiability without compromising the privacy of clients. Finally, the security of the proposed DVAC is proved along with theoretical and experimental evaluations.


2021 ◽  
Vol 75 ◽  
pp. 103505
Author(s):  
Chao Lin ◽  
Debiao He ◽  
Hongjie Zhang ◽  
Lisong Shao ◽  
Xinyi Huang

2018 ◽  
Vol 6 (3) ◽  
pp. 18-35 ◽  
Author(s):  
Chien-Nan Wu ◽  
Chun-I Fan ◽  
Jheng-Jia Huang ◽  
Yi-Fan Tseng ◽  
Hiroaki Kikuchi

This article describes how after the concept of anonymous credential systems was introduced in 1985, a number of similar systems have been proposed. However, these systems use zero-knowledge protocols to authenticate users, resulting in inefficient authentication during the stage of proving credential possession. To overcome this drawback, this article presents a signature scheme that uses partially blind signatures and chameleon hash functions such that both the prover and verifier achieve efficient authentication. In addition to providing a computational cost comparison table showing that the proposed signature scheme achieves a more efficient credential possession proving compared to other schemes, concrete security proofs are provided under a random oracle model to demonstrate that the proposed scheme satisfies the properties of anonymous credentials.


IEEE Access ◽  
2018 ◽  
Vol 6 ◽  
pp. 4767-4778 ◽  
Author(s):  
Jose Luis Canovas Sanchez ◽  
Jorge Bernal Bernabe ◽  
Antonio F. Skarmeta

Sign in / Sign up

Export Citation Format

Share Document