Entry Camenisch:2012:EAA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Camenisch:2012:EAA,
  author =       "Jan Camenisch and Thomas Gro{\ss}",
  title =        "Efficient Attributes for Anonymous Credentials",
  journal =      j-TISSEC,
  volume =       "15",
  number =       "1",
  pages =        "4:1--4:??",
  month =        mar,
  year =         "2012",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/2133375.2133379",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Sat Mar 24 09:45:43 MDT 2012",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "We extend the Camenisch-Lysyanskaya anonymous
                 credential system such that selective disclosure of
                 attributes becomes highly efficient. The resulting
                 system significantly improves upon existing approaches,
                 which suffer from a linear number of modular
                 exponentiations in the total number of attributes. This
                 limitation makes them unfit for many practical
                 applications, such as electronic identity cards. Our
                 novel approach can incorporate a large number of binary
                 and finite-set attributes without significant
                 performance impact. It compresses all such attributes
                 into a single attribute base and, thus, boosts the
                 efficiency of all proofs of possession. The core idea
                 is to encode discrete binary and finite-set values as
                 prime numbers. We then use the divisibility property
                 for efficient proofs of their presence or absence. In
                 addition, we contribute efficient methods for
                 conjunctions and disjunctions. The system builds on the
                 strong RSA assumption. We demonstrate the aptness of
                 our method in realistic application scenarios, notably
                 electronic identity cards, and show its advantages for
                 small devices, such as smartcards and cell phones.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
}

Related entries