Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

N Kaaniche, M Laurent, S Belguith - Journal of Network and Computer …, 2020 - Elsevier
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …

With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …

Federated identity architecture of the European eID system

J Carretero, G Izquierdo-Moreno… - IEEE …, 2018 - ieeexplore.ieee.org
Federated identity management is a method that facilitates management of identity
processes and policies among the collaborating entities without a centralized control …

Efficient selective disclosure on smart cards using idemix

P Vullers, G Alpár - IFIP Working Conference on Policies and Research in …, 2013 - Springer
In this paper we discuss an efficient implementation for selective disclosure of attribute-
based credentials on smart cards. In this context we concentrate on the implementation of …

How to bind anonymous credentials to humans

J Hesse, N Singh, A Sorniotti - 32nd USENIX Security Symposium …, 2023 - usenix.org
Digital and paper-based authentication are the two predominant mechanisms that have
been deployed in the real world to authenticate end-users. When verification of a digital …

Fast keyed-verification anonymous credentials on standard smart cards

J Camenisch, M Drijvers, P Dzurenda… - ICT Systems Security and …, 2019 - Springer
Cryptographic anonymous credential schemes allow users to prove their personal attributes,
such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their …

New directions in IoT privacy using attribute-based authentication

G Alpár, L Batina, L Batten, V Moonsamy… - Proceedings of the …, 2016 - dl.acm.org
The Internet of Things (IoT) is a ubiquitous system that incorporates not only the current
Internet of computers, but also smart objects and sensors. IoT technologies often rely on …

EVIV: An end-to-end verifiable Internet voting system

R Joaquim, P Ferreira, C Ribeiro - computers & security, 2013 - Elsevier
Traditionally, a country's electoral system requires the voter to vote at a specific day and
place, which conflicts with the mobility usually seen in modern live styles. Thus, the …

Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities

JM de Fuentes, L González-Manzano… - Personal and Ubiquitous …, 2017 - Springer
Smart cities involve the provision of advanced services for road traffic users. Vehicular ad
hoc networks (VANETs) are a promising communication technology in this regard …

NEXTLEAP: Decentralizing identity with privacy for secure messaging

H Halpin - Proceedings of the 12th International Conference on …, 2017 - dl.acm.org
Identity systems today link users to all of their actions and serve as centralized points of
control and data collection. NEXTLEAP proposes an alternative decentralized and privacy …