My Library

University LibraryCatalogue

For faster,
simpler
access.
Use Lean
Library.
Get it now
Don't show me again
     
Limit search to items available for borrowing or consultation
Result Page: Previous Next
Can't find that book? Try BONUS+
 
Look for full text

Search Discovery

Search CARM Centre Catalogue

Search Trove

Add record to RefWorks

Cover Art
E-RESOURCE

Title Attribute-based credentials for trust : identity in the information society / Kai Rannenberg, Jan Camenisch, Ahmad Sabouri, editors.

Published Cham, Switzerland : Springer, [2014]
©2015

Copies

Location Call No. Status
 UniM INTERNET resource    AVAILABLE
Physical description 1 online resource (xv, 391 pages) : illustrations
Series Springer English/International eBooks 2015 - Full Set
Bibliography Includes bibliographical references.
Contents Foreword; Preface; Contents; 1 Introduction; 1.1 Identity Management and its Privacy Issues; 1.2 Privacy-ABCs for Privacy Enhanced Identity Management; 1.3 The ABC4Trust Project Goals; 1.4 Overview of the Pilots; 1.4.1 Online Course Evaluation; 1.4.2 School Community Interaction Platform; References; 2 An Architecture for Privacy-ABCs; 2.1 Concepts and Features of Privacy-ABCs; 2.1.1 User Attributes; 2.1.2 Existing Solutions; 2.1.3 Basic Concepts of Privacy-ABCs; 2.1.3.1 Credentials; 2.1.3.2 Presentation; 2.1.3.3 Key Binding; 2.1.3.4 Pseudonyms; 2.1.3.5 Inspection; 2.1.3.6 Credential Issuance
2.1.3.7 Revocation2.1.4 Security and Privacy Features; 2.1.4.1 Basic Presentation; 2.1.4.2 Key Binding; 2.1.4.3 Advanced Issuance; 2.1.4.4 Pseudonyms; 2.1.4.5 Inspection; 2.1.4.6 Revocation; 2.2 Architecture Highlights; 2.3 Architectural Design; 2.3.1 Overview of the Components; 2.3.1.1 Application Layer; 2.3.1.2 ABCE Layer; 2.3.1.3 Crypto Layer; 2.3.1.4 Storage & Communication Components; 2.4 Deployment of the Architecture; 2.4.1 Setup and Storage; 2.4.2 Presentation of a Token; 2.4.3 Issuance of a Credential; 2.4.3.1 Simple Issuance; 2.4.3.2 Advanced Issuance; 2.4.4 Inspection
2.4.5 Revocation2.5 Language Framework; 2.5.1 Example Scenario; 2.5.2 Credential Specification; 2.5.3 Issuer, Revocation, and System Parameters; 2.5.4 Presentation Policy with Basic Features; 2.5.5 Presentation and Issuance Token; 2.5.6 Presentation Policy with Extended Features; 2.5.7 Interaction with the User Interface; 2.6 Applicability to Existing Identity Infrastructures; 2.6.1 WS-*; 2.6.2 SAML; 2.6.3 OpenID; 2.6.4 OAuth; 2.6.4.1 Authorization grant; 2.6.4.2 Access token; 2.6.5 X.509 PKI; 2.6.6 Integration Summary; 2.7 Trust Relationships in the Ecosystem of Privacy-ABCs
2.7.1 The Meaning of Trust2.7.2 Related Work; 2.7.3 Trust Relationships; 2.7.3.1 Assumptions; 2.7.3.2 Trust by all the parties; 2.7.3.3 Users' Perspective; 2.7.3.4 Verifiers' Perspective; 2.7.3.5 Issuers' Perspective; 2.7.3.6 Inspectors' Perspective; 2.7.3.7 Revocation Authorities' Perspective; 2.8 Policy-based View of the Architecture; References; 3 Cryptographic Protocols Underlying Privacy-ABCs; 3.1 Overview of Cryptographic Architecture; 3.1.1 Key Generation Orchestration; 3.1.2 Presentation Orchestration; 3.1.3 Verification Orchestration; 3.1.4 Issuance Orchestration
3.1.5 Building Blocks3.1.5.1 Proof Interfaces and ZkModules; 3.1.6 Proof Engine; 3.2 Cryptographic Primitives; 3.2.1 Algebraic Background; 3.2.1.1 Groups; 3.2.1.2 Hardness Assumptions; 3.2.2 Zero-Knowledge Proofs of Knowledge; 3.2.2.1 Four Square Range Proof; 3.2.3 Commitment Schemes; 3.2.3.1 Pedersen/Damg˚ard-Fujisaki Commitments; 3.2.4 Blind Signature Schemes; 3.2.4.1 CL-Signatures; 3.2.4.2 Brands Signatures; 3.2.5 Verifiable Encryption; 3.2.5.1 The Camenisch-Shoup Encryption Scheme; 3.2.6 Scope-Exclusive Pseudonyms; 3.2.6.1 Efficient Scope Exclusive Pseudonyms; 3.2.7 Revocation
Summary The need for information privacy and security continues to grow and gets increasingly recognized. In this regard, Privacy-preserving Attribute-based Credentials (Privacy-ABCs) are elegant techniques to provide secure yet privacy-respecting access control. This book addresses the federation and interchangeability of Privacy-ABC technologies. It defines a common, unified architecture for Privacy-ABC systems that allows their respective features to be compared and combined Further, this book presents open reference implementations of selected Privacy-ABC systems and explains how to deploy them i.
Other author Rannenberg, Kai, editor.
Camenisch, Jan, editor.
Sabouri, Ahmad, editor.
SpringerLink issuing body.
Subject Data protection.
Data encryption (Computer science)
Data protection -- Law and legislation -- European Union countries.
Electronic books.
Electronic books.
ISBN 9783319144399
3319144391
9783319144382