• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 377
Next 10 →

Self-blindable credential certificates from the weil pairing

by Eric R. Verheul , 2001
"... Abstract. We describe two simple, efficient and effective credential pseudonymous certificate systems, which also support anonymity without the need for a trusted third party. The second system provides cryptographic protection against the forgery and transfer of credentials. Both systems are based ..."
Abstract - Cited by 56 (1 self) - Add to MetaCart
on a new paradigm, called self-blindable certificates. Such certificates can be constructed using the Weil pairing in supersingular elliptic curves. 1

On linkability and malleability in self-blindable credentials

by Jaap-henk Hoepman, Wouter Lueks, Sietse Ringers
"... Abstract. Self-blindable credential schemes allow users to anonymously prove ownership of credentials. This is achieved by randomizing the cre-dential before each showing in such a way that it still remains valid. As a result, each time a different version of the same credential is presented. A numb ..."
Abstract - Add to MetaCart
Abstract. Self-blindable credential schemes allow users to anonymously prove ownership of credentials. This is achieved by randomizing the cre-dential before each showing in such a way that it still remains valid. As a result, each time a different version of the same credential is presented. A

Self-blindable Credential: Towards LightWeight Anonymous Entity Authentication

by Yanjiang Yang, Xuhua Ding, Haibing Lu, Jian Weng
"... Abstract. We are witnessing the rapid expansion of smart devices in our daily life. The need for individual privacy protection calls for anonymous entity authentication techniques with affordable efficiency upon the resource-constrained smart devices. Towards this objective, in this paper we propose ..."
Abstract - Add to MetaCart
propose self-blindable credential, a lightweight anonymous entity authentication primitive. We provide a formulation of the primitive and present two concrete instantiations. The first scheme implements verifier-local revocation and the second scheme enhances the former with forward security. Our

The self-blindable U-Prove scheme by Hanzlik and Kluczniak is forgeable

by Eric Verheul, Sietse Ringers, Jaap-henk Hoepman , 2015
"... In [HK14] an unlinkable version of the U-Prove attribute-based credential scheme is proposed. Unfortunately, the new scheme is forgeable: if sufficiently many users work together then they can construct new credentials, containing any set of attributes of their choice, without any involvement of the ..."
Abstract - Add to MetaCart
In [HK14] an unlinkable version of the U-Prove attribute-based credential scheme is proposed. Unfortunately, the new scheme is forgeable: if sufficiently many users work together then they can construct new credentials, containing any set of attributes of their choice, without any involvement

Developing efficient blinded attribute certificates on smart cards via pairings

by Lejla Batina, Jaap-henk Hoepman, Bart Jacobs, Wojciech Mostowski, Pim Vullers - In Gollmann, D , 2010
"... Abstract This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates are ..."
Abstract - Cited by 9 (3 self) - Add to MetaCart
Abstract This paper describes an elementary protocol to prove possession of anonymous credentials together with its implementation on smart cards. The protocol uses self-blindable attribute certificates represented as points on an elliptic curve (which are stored on the card). These certificates

International Credentialing for

by Neil T. Martin, Gerald L. Shook
"... (BACB) is an independent non-profit corpora-tion rather than a membership organization. It was founded in May 1998 based on the certi-fication programme that was operated by the ..."
Abstract - Add to MetaCart
(BACB) is an independent non-profit corpora-tion rather than a membership organization. It was founded in May 1998 based on the certi-fication programme that was operated by the

Certification

by Torrez Nena
"... This paper discusses development of the Crosscultural, Language, and Academic Development (CLAD) credential in California's preservice teacher education. CLAD focuses on first and second language development, educational equity, linguistic and cultural diversity, equal access to core curriculum ..."
Abstract - Add to MetaCart
This paper discusses development of the Crosscultural, Language, and Academic Development (CLAD) credential in California's preservice teacher education. CLAD focuses on first and second language development, educational equity, linguistic and cultural diversity, equal access to core

Relying party credentials framework

by Amir Herzberg, Yosi Mass - In The Cryptographer's Tract at RSA Conference , 2001
"... Abstract. We present architecture for framework to allow a relying-party to decide if and how to handle requests coming over the Net, by relying on the credentials of the requesting party. Relying party applications will be provided with uniform interface to the credentials of the requesting party. ..."
Abstract - Cited by 16 (1 self) - Add to MetaCart
. This will allow use of simple, widely available credentials as well as more advanced credentials such as public key certificates, attribute certificates and `Negative ` credentials (which result in reduced trust) such as certificate revocation lists (CRL). The core of the architecture is a Credential Manager who

Offline Personal Credentials

by Gerrit Bleumer , 1998
"... Personal documents and certificates that are not transferable between individuals are common and essential means in every day life, e.g., driver's licenses, insurance certificates, etc. At the same time, personal documents are privacy critical as they tend to fully identify their owners, e.g., ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
.g., photo, address, etc. We are interested in personal offline credentials, i.e., secure, non-transferable and privacy oriented electronic certificates that users can freely carry around in personal devices like pilots, PDAs, etc. If unauthorized usage of a personal credential needs to be prevented

Techniques for Implementing Derived Credentials

by Francisco Corella Phd, Karen Lewison Md , 2012
"... The requirement of a Government-wide means of authenticating federal employ-ees and contractors stated by HSPD-12 is traditionally met by PIV smartcards in civilian agencies and CAC smartcards in the Department of Defense. But there are substantial obstacles to using a smartcard for authentication w ..."
Abstract - Add to MetaCart
when an information system is accessed via a mobile device. NIST is investigating alternative authentica-tion methods that rely on derived credentials not contained in smartcards. In this paper we propose three techniques that can facilitate the implementation, deployment and use of derived credentials
Next 10 →
Results 1 - 10 of 377
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University