[HTML][HTML] Selective disclosure in digital credentials: A review

ŠB Ramić, E Cogo, I Prazina, E Cogo, M Turkanović… - ICT Express, 2024 - Elsevier
Digital credentials represent digital versions of physical credentials. They are the
cornerstone of digital identity on the Internet. In order to enhance privacy, different authors …

Proofs for inner pairing products and applications

B Bünz, M Maller, P Mishra, N Tyagi… - Advances in Cryptology …, 2021 - Springer
We present a generalized inner product argument and demonstrate its applications to
pairing-based languages. We apply our generalized argument to prove that an inner pairing …

With a little help from my friends: Constructing practical anonymous credentials

L Hanzlik, D Slamanig - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Anonymous credentials (ACs) are a powerful cryptographic tool for the secure use of digital
services, when simultaneously aiming for strong privacy guarantees of users combined with …

ZAMA: A ZKP-based anonymous mutual authentication scheme for the IoV

N **, W Li, L **g, J Ma - IEEE Internet of Things Journal, 2022 - ieeexplore.ieee.org
Internet of Vehicles (IoV) is a typical application of mobile Internet of Things (IoT), which
aims to improve road conditions and enhance the driving experience. However, the issue of …

Improved constructions of anonymous credentials from structure-preserving signatures on equivalence classes

A Connolly, P Lafourcade, O Perez Kempner - … Conference on Public-Key …, 2022 - Springer
Anonymous attribute-based credentials (ABCs) are a powerful tool allowing users to
authenticate while maintaining privacy. When instantiated from structure-preserving …

Aggregate signatures with versatile randomization and issuer-hiding multi-authority anonymous credentials

O Mir, B Bauer, S Griffy, A Lysyanskaya… - Proceedings of the 2023 …, 2023 - dl.acm.org
Anonymous credentials (AC) offer privacy in user-centric identity management. They enable
users to authenticate anonymously, revealing only necessary attributes. With the rise of …

Sok: data sovereignty

J Ernstberger, J Lauinger, F Elsheimy… - 2023 IEEE 8th …, 2023 - ieeexplore.ieee.org
Society appears to be on the verge of recognizing the need for control over sensitive data in
modern web applications. Recently, many systems claim to give control to individuals …

Composable and modular anonymous credentials: Definitions and practical constructions

J Camenisch, M Dubovitskaya, K Haralambiev… - Advances in Cryptology …, 2015 - Springer
It takes time for theoretical advances to get used in practical schemes. Anonymous
credential schemes are no exception. For instance, existing schemes suited for real-world …

Efficient redactable signature and application to anonymous credentials

O Sanders - IACR international conference on public-key …, 2020 - Springer
Let us assume that Alice has received a constant-size signature on a set of messages {m_i\}
_ i= 1^ n from some organization. Depending on the situation, Alice might need to disclose …

[PDF][PDF] ZEBRA: Anonymous Credentials with Practical On-chain Verification and Applications to KYC in DeFi.

D Rathee, GV Policharla, T **e, R Cottone… - IACR Cryptol. ePrint …, 2022 - iacr.steepath.eu
ZEBRA is an Anonymous Credential (AC) scheme, supporting auditability and revocation,
that provides practical on-chain verification for the first time. It realizes efficient access …