Fast revocation of attribute-based credentials for both users and verifiers

W Lueks, G Alpár, JH Hoepman, P Vullers - computers & security, 2017 - Elsevier
Attribute-based credentials allow a user to prove properties about herself anonymously.
Revoking such credentials, which requires singling them out, is hard because it is at odds …

Securing transactions with the eIDAS protocols

F Morgner, P Bastian, M Fischlin - … Security Theory and Practice: 10th IFIP …, 2016 - Springer
The proposed European system for electronic identities, authentication, and trust services
(eIDAS) enables remote authentication of an identity card (and selected data of the card) to …

[BOEK][B] Security and Privacy via Cryptography Having your cake and eating it too

W Lueks - 2017 - repository.ubn.ru.nl
Digital technologies play an ever-increasing role in our daily lives. However, these
technologies are also frequently data driven. Governments and companies alike collect …

Zero round-trip time for the extended access control protocol

J Brendel, M Fischlin - … –ESORICS 2017: 22nd European Symposium on …, 2017 - Springer
Abstract The Extended Access Control (EAC) protocol allows to create a shared
cryptographic key between a client and a server. While originally used in the context of …

Attribute-based access control architectures with the eIDAS protocols

F Morgner, P Bastian, M Fischlin - … , Gaithersburg, MD, USA, December 5–6 …, 2016 - Springer
The extended access control protocol has been used for the German identity card since
November 2010, primarily to establish a cryptographic key between a card and a service …

Restricted identification without group keys

L Hanzlik, K Kluczniak, P Kubiak… - 2012 IEEE 11th …, 2012 - ieeexplore.ieee.org
We present a variant of the protocol stack for anonymous authentication implemented in
German personal identity documents. We strengthen the system by eliminating group keys-a …

Method for a pseudonymous key-agreement between a portable data carrier and a terminal

R Urian - US Patent 10,630,475, 2020 - Google Patents
A pseudonymous Diffie-Hellman protocol is provided by means of a combination of the CA
protocol with the RI protocol. According to the invention the determining of the pseudonym …