Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey
Personal data are often collected and processed in a decentralized fashion, within different
contexts. For instance, with the emergence of distributed applications, several providers are …
contexts. For instance, with the emergence of distributed applications, several providers are …
With a little help from my friends: Constructing practical anonymous credentials
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …
services, when simultaneously aiming for strong privacy guarantees of users combined with …
Federated identity architecture of the European eID system
J Carretero, G Izquierdo-Moreno… - IEEE …, 2018 - ieeexplore.ieee.org
Federated identity management is a method that facilitates management of identity
processes and policies among the collaborating entities without a centralized control …
processes and policies among the collaborating entities without a centralized control …
Efficient selective disclosure on smart cards using idemix
In this paper we discuss an efficient implementation for selective disclosure of attribute-
based credentials on smart cards. In this context we concentrate on the implementation of …
based credentials on smart cards. In this context we concentrate on the implementation of …
How to bind anonymous credentials to humans
Digital and paper-based authentication are the two predominant mechanisms that have
been deployed in the real world to authenticate end-users. When verification of a digital …
been deployed in the real world to authenticate end-users. When verification of a digital …
Fast keyed-verification anonymous credentials on standard smart cards
Cryptographic anonymous credential schemes allow users to prove their personal attributes,
such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their …
such as age, nationality, or the validity of a ticket or a pre-paid pass, while preserving their …
New directions in IoT privacy using attribute-based authentication
The Internet of Things (IoT) is a ubiquitous system that incorporates not only the current
Internet of computers, but also smart objects and sensors. IoT technologies often rely on …
Internet of computers, but also smart objects and sensors. IoT technologies often rely on …
EVIV: An end-to-end verifiable Internet voting system
Traditionally, a country's electoral system requires the voter to vote at a specific day and
place, which conflicts with the mobility usually seen in modern live styles. Thus, the …
place, which conflicts with the mobility usually seen in modern live styles. Thus, the …
Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities
Smart cities involve the provision of advanced services for road traffic users. Vehicular ad
hoc networks (VANETs) are a promising communication technology in this regard …
hoc networks (VANETs) are a promising communication technology in this regard …
NEXTLEAP: Decentralizing identity with privacy for secure messaging
H Halpin - Proceedings of the 12th International Conference on …, 2017 - dl.acm.org
Identity systems today link users to all of their actions and serve as centralized points of
control and data collection. NEXTLEAP proposes an alternative decentralized and privacy …
control and data collection. NEXTLEAP proposes an alternative decentralized and privacy …