An efficient signature scheme for anonymous credentials

0Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

After Chaum introduced the concept of anonymous credential systems, a number of similar systems have been proposed; however, these systems use zero-knowledge protocols to authenticate users resulting in inefficient authentication in the possession of credential proving stage. In order to overcome this drawback of anonymous credential systems, we use partially blind signatures and chameleon hash functions to propose a signature scheme such that both the prover and the verifier achieve efficient authentication. In addition to giving a computational cost comparison table to show that the proposed signature scheme achieves more efficient possession proving than others, we provide concrete security proofs under the random oracle model to demonstrate that the proposed scheme satisfies the properties of anonymous credentials.

Cite

CITATION STYLE

APA

Wu, C. N., Fan, C. I., Huang, J. J., Tseng, Y. F., & Kikuchi, H. (2018). An efficient signature scheme for anonymous credentials. Studies in Computational Intelligence, 727, 51–65. https://doi.org/10.1007/978-3-319-64051-8_4

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free