Probably Secure Efficient Anonymous Credential Scheme
This article describes how after the concept of anonymous credential systems was introduced in 1985, a number of similar systems have been proposed. However, these systems use zero-knowledge protocols to authenticate users, resulting in inefficient authentication during the stage of proving credential possession. To overcome this drawback, this article presents a signature scheme that uses partially blind signatures and chameleon hash functions such that both the prover and verifier achieve efficient authentication. In addition to providing a computational cost comparison table showing that the proposed signature scheme achieves a more efficient credential possession proving compared to other schemes, concrete security proofs are provided under a random oracle model to demonstrate that the proposed scheme satisfies the properties of anonymous credentials.
Year of publication: |
2018
|
---|---|
Authors: | Wu, Chien-Nan ; Fan, Chun-I ; Huang, Jheng-Jia ; Tseng, Yi-Fan ; Kikuchi, Hiroaki |
Published in: |
International Journal of Software Innovation (IJSI). - IGI Global, ISSN 2166-7179, ZDB-ID 2754488-6. - Vol. 6.2018, 3 (01.07.), p. 18-35
|
Publisher: |
IGI Global |
Subject: | Anonymous Credentials | Authentication | Chameleon Hash Functions | Cryptography | Information Security | Partially Blind Signatures | Random Oracle Models | Unforgeability | Unlinkability |
Saved in:
Online Resource
Saved in favorites
Similar items by subject
-
Information Security : Opportunities and Limitations
Liedtke, Thomas, (2024)
-
Authentication Through Elliptic Curve Cryptography (ECC) Technique in WMN
Saini, Hemraj, (2018)
-
SEC-CMAC A New Message Authentication Code Based on the Symmetrical Evolutionist Ciphering Algorithm
Echandouri, Bouchra, (2018)
- More ...