Mikkelsen, G.L. and Damgård, K. and Guldager, H. and Jensen, J.L. and Luna, J.G. and Nielsen, J.D. and Paillier, P. and Pellegrino, G. and Stausholm, M.B. and Suri, Neeraj and Zhang, H. (2015) Technical implementation and feasibility. In: Attribute-Based Credentials for Trust : Identity in the Information Society. Springer International Publishing, pp. 255-318. ISBN 9783319144399
Full text not available from this repository.Abstract
This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. © Springer International Publishing Switzerland 2015.