Accumulators with applications to anonymity-preserving revocation

F Baldimtsi, J Camenisch… - 2017 IEEE European …, 2017 - ieeexplore.ieee.org
Membership revocation is essential for cryptographic applications, from traditional PKIs to
group signatures and anonymous credentials. Of the various solutions for the revocation …

Practical UC-secure delegatable credentials with attributes and their application to blockchain

J Camenisch, M Drijvers, M Dubovitskaya - Proceedings of the 2017 …, 2017 - dl.acm.org
Certification of keys and attributes is in practice typically realized by a hierarchy of issuers.
Revealing the full chain of issuers for certificate verification, however, can be a privacy issue …

DIV: Resolving the dynamic issues of zero-knowledge set membership proof in the blockchain

Z Xu, L Chen - Proceedings of the 2021 international conference on …, 2021 - dl.acm.org
Zero-knowledge set membership (ZKSM) proof is widely used in blockchain to enable
private membership attestation. However, existing mechanisms do not fully consider …

Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities

NS Safa, F Mitchell, C Maple, MA Azad… - Transactions on …, 2022 - Wiley Online Library
Many Experts believe that the Internet of Things (IoT) is a new revolution in technology that
has brought many benefits for our organizations, businesses, and industries. However …

Credential-based authorization

J Camenisch, D Kovacs, K Samelin… - US Patent …, 2020 - Google Patents
Methods and systems are provided for demonstrating autho rization to access a resource to
a verifier computer control ling access to the resource. The method comprises, at a user …

Efficient and strongly secure dynamic domain-specific pseudonymous signatures for ID documents

J Bringer, H Chabanne, R Lescuyer, A Patey - Financial Cryptography and …, 2014 - Springer
The notion of domain-specific pseudonymous signatures (DSPS) has recently been
introduced for private authentication of ID documents, like passports, that embed a chip with …

[HTML][HTML] Anonymous Access System with Limited Number of Uses in a Trustless Environment

F Garcia-Grau, J Herrera-Joancomartí, A Dorca Josa - Applied Sciences, 2024 - mdpi.com
This article proposes a novel method for managing usage counters within an anonymous
credential system, addressing the limitation of traditional anonymous credentials in tracking …

Strengthening authentication with privacy-preserving location verification of mobile phones

J Camenisch, DA Ortiz-Yepes, FS Preiss - … of the 14th ACM Workshop on …, 2015 - dl.acm.org
Mobile devices are increasingly used in security-sensitive contexts such as physical access
control and authorization of payment transactions. In this paper we contribute a mechanism …

Privacy-Preserving Authentication: Theory vs. Practice

D Slamanig - arxiv preprint arxiv:2501.07209, 2025 - arxiv.org
With the increasing use of online services, the protection of the privacy of users becomes
more and more important. This is particularly critical as authentication and authorization as …

Towards the development of a research agenda for cybercrime and cyberterrorism–identifying the technical challenges and missing solutions

B Jerman-Blažič, T Klobučar - Combatting Cybercrime and Cyberterrorism …, 2016 - Springer
Cybercrime and cyberterrorism research faces a number of challenges, such as the rate of
change in technology, field complexity and interdisciplinarity. This chapter aims at identifying …