Technical implementation and feasibility

Mikkelsen, G.L. and Damgård, K. and Guldager, H. and Jensen, J.L. and Luna, J.G. and Nielsen, J.D. and Paillier, P. and Pellegrino, G. and Stausholm, M.B. and Suri, Neeraj and Zhang, H. (2015) Technical implementation and feasibility. In: Attribute-Based Credentials for Trust : Identity in the Information Society. Springer International Publishing, pp. 255-318. ISBN 9783319144399

Full text not available from this repository.

Abstract

This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. © Springer International Publishing Switzerland 2015.

Item Type:
Contribution in Book/Report/Proceedings
Subjects:
?? smart cardsapplication developersdesktop environmentperturbation analysisproof of conceptreference implementationsmart card implementationtechnical implementationnetwork architecture ??
ID Code:
137490
Deposited By:
Deposited On:
14 Oct 2019 13:46
Refereed?:
No
Published?:
Published
Last Modified:
16 Jul 2024 04:43