Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

\(\mathcal {PCS}\), A Privacy-Preserving Certification Scheme

  • Conference paper
  • First Online:
Data Privacy Management, Cryptocurrencies and Blockchain Technology (DPM 2017, CBT 2017)

Abstract

We present \(\mathcal {PCS}\), a privacy-preserving certification mechanism that allows users to conduct anonymous and unlinkable actions. The mechanism is built over an attribute-based signature construction. The proposal is proved secure against forgery and anonymity attacks. A use case on the integration of \(\mathcal {PCS}\) to enhance the privacy of learners of an e-assessment environment, and some details of the ongoing implementation, are briefly presented.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Source code snippets available at http://j.mp/PKIPCSgit.

References

  1. Beimel, A.: Secret sharing and key distribution. Research thesis (1996)

    Google Scholar 

  2. Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pederson, M.O.: Scientific comparison of ABC protocols: part i - formal treatment of privacy-enhancing credential systems (2014)

    Google Scholar 

  3. Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93–118. Springer, Heidelberg (2001). doi:10.1007/3-540-44987-6_7

    Chapter  Google Scholar 

  4. Camenisch, J., Mödersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198–214. Springer, Heidelberg (2010). doi:10.1007/978-3-642-15898-8_13

    Chapter  Google Scholar 

  5. Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985)

    Article  Google Scholar 

  6. Europe, C.: Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. In: General Data Protection Regulation, January 2016 (2016)

    Google Scholar 

  7. Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: A proactive threshold secret sharing scheme handling Gen2 privacy threats. Technical report, Carleton University, March 2009

    Google Scholar 

  8. Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: Proactive threshold cryptosystem for EPC tags. Ad hoc Sensor Wirel. Netw. 12(3–4), 187–208 (2011)

    Google Scholar 

  9. Herranz, J., Laguillaumie, F., Libert, B., Ràfols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51–67. Springer, Heidelberg (2012). doi:10.1007/978-3-642-27954-6_4

    Chapter  Google Scholar 

  10. Kaaniche, N., Laurent, M.: Attribute-based signatures for supporting anonymous certification. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 279–300. Springer, Cham (2016). doi:10.1007/978-3-319-45744-4_14

    Chapter  Google Scholar 

  11. Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of the 8th IEEE Structure in Complexity Theory (1993)

    Google Scholar 

  12. Kiennert, C., Rocher, P.O., Ivanova, M., Rozeva, A., Durcheva, M., Garcia-Alfaro, J.: Security challenges in e-assessment and technical solutions. In 8th International Workshop on Interactive Environments and Emerging Technologies for eLearning, 21st International Conference on Information Visualization, London, UK (2017)

    Google Scholar 

  13. Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: ASIACCS 2010 (2010)

    Google Scholar 

  14. Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376–392. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19074-2_24

    Chapter  Google Scholar 

  15. Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35–52. Springer, Heidelberg (2011). doi:10.1007/978-3-642-19379-8_3

    Chapter  Google Scholar 

  16. Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198–216. Springer, Heidelberg (2009). doi:10.1007/978-3-642-02384-2_13

    Chapter  Google Scholar 

  17. Shigeo, M.: MCL - Generic and fast pairing-based cryptography library. https://github.com/herumi/mcl. Version: release20170402

  18. Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303–332 (1999)

    Article  MathSciNet  Google Scholar 

  19. Stanford University: PBC - The Pairing-Based Cryptography Library. https://crypto.stanford.edu/pbc/. Version: 0.5.14

  20. Vergnaud, D.: Comment on “attribute-based signatures for supporting anonymous certification” by N. Kaaniche and M. Laurent (ESORICS 2016). IACR Cryptology ePrint Archive (2016)

    Google Scholar 

  21. Vergnaud, D.: Comment on attribute-based signatures for supporting anonymous certification by N. Kaaniche and M. Laurent (ESORICS 2016). Comput. J. 1–8 (2017)

    Google Scholar 

  22. Zhang, Y., Feng, D.: Efficient attribute proofs in anonymous credential using attribute-based cryptography. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 408–415. Springer, Heidelberg (2012). doi:10.1007/978-3-642-34129-8_39

    Chapter  Google Scholar 

Download references

Acknowledgements

This work is supported by the H2020-ICT-2015/H2020-ICT-2015 TeSLA project An Adaptive Trust-based e-assessment System for Learning, Number 688520.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nesrine Kaaniche .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Kaaniche, N., Laurent, M., Rocher, PO., Kiennert, C., Garcia-Alfaro, J. (2017). \(\mathcal {PCS}\), A Privacy-Preserving Certification Scheme. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomartí, J. (eds) Data Privacy Management, Cryptocurrencies and Blockchain Technology. DPM CBT 2017 2017. Lecture Notes in Computer Science(), vol 10436. Springer, Cham. https://doi.org/10.1007/978-3-319-67816-0_14

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67816-0_14

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67815-3

  • Online ISBN: 978-3-319-67816-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics