Information Security and Cryptography Research Group

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication

Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Anja Lehmann, Gregory Neven, Christian Paquin, and Franz-Stefan Preiss

Journal of Information Security and Applications, vol. 19, no. 1, pp. 25–44, Feb 2014.

Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, self-blindable credentials, and group signatures vary largely in the features they offer and in how these features are realized. Some features such as revocation or de-anonymization even require the combination of several cryptographic protocols. The variety and complexity of the cryptographic protocols hinder the understanding and hence the adoption of these mechanisms in practical applications. They also make it almost impossible to change the underlying cryptographic algorithms once the application has been designed. In this paper, we aim to overcome these issues and simplify both the design and deployment of privacy-friendly authentication mechanisms. We define and unify the concepts and features of privacy-preserving attribute-based credentials (Privacy-ABCs), provide a language framework in XML schema, and present the API of a Privacy-ABC system that supports all the features we describe. Our language framework and API enable application developers to use Privacy-ABCs with all their features without having to consider the specifics of the underlying cryptographic algorithms—similar to as they do today for digital signatures, where they do not need to worry about the particulars of the RSA and DSA algorithms either.

BibTeX Citation

    author       = {Jan Camenisch and Maria Dubovitskaya and Robert R. Enderlein and Anja Lehmann and Gregory Neven and Christian Paquin and Franz-Stefan Preiss},
    title        = {Concepts and Languages for Privacy-Preserving Attribute-Based Authentication},
    journal      = {Journal of Information Security and Applications},
    pages        = {25--44},
    number       = {1},
    volume       = {19},
    year         = {2014},
    month        = {2},

Files and Links