Anonymous credential systems 8, 9, 12, 24 allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by 6. The system is based on new high-level primitives and interfaces allowing for easy integration into access control systems. The prototype was realized in Java. We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.
%0 Conference Paper
%1 CamHerr_2002
%A Camenisch, Jan
%A Herreweghen, Els Van
%B CCS '02: Proceedings of the 9th ACM conference on Computer and communications security
%C New York, NY, USA
%D 2002
%I ACM
%K anonymity credentials cryptography privacy security
%P 21-30
%R http://doi.acm.org/10.1145/586110.586114
%T Design and Implementation of the idemix Anonymous Credential System
%U http://portal.acm.org/citation.cfm?id=586110.586114
%X Anonymous credential systems 8, 9, 12, 24 allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by 6. The system is based on new high-level primitives and interfaces allowing for easy integration into access control systems. The prototype was realized in Java. We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.
%@ 1-58113-612-9
@inproceedings{CamHerr_2002,
abstract = {Anonymous credential systems [8, 9, 12, 24] allow anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by [6]. The system is based on new high-level primitives and interfaces allowing for easy integration into access control systems. The prototype was realized in Java. We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.},
added-at = {2008-06-18T15:17:11.000+0200},
address = {New York, NY, USA},
author = {Camenisch, Jan and Herreweghen, Els Van},
biburl = {https://www.bibsonomy.org/bibtex/20c6106b9ccad0922cfc75c6db352737b/dawinci},
booktitle = {CCS '02: Proceedings of the 9th ACM conference on Computer and communications security},
doi = {http://doi.acm.org/10.1145/586110.586114},
interhash = {30edcce9a67f0afc736b802e8c042743},
intrahash = {0c6106b9ccad0922cfc75c6db352737b},
isbn = {1-58113-612-9},
keywords = {anonymity credentials cryptography privacy security},
location = {Washington, DC, USA},
pages = {21-30},
publisher = {ACM},
timestamp = {2008-06-18T15:17:11.000+0200},
title = {Design and Implementation of the {idemix} Anonymous Credential System},
url = {http://portal.acm.org/citation.cfm?id=586110.586114},
year = 2002
}