{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:26:11Z","timestamp":1743153971604,"version":"3.40.3"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319678153"},{"type":"electronic","value":"9783319678160"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-67816-0_14","type":"book-chapter","created":{"date-parts":[[2017,9,12]],"date-time":"2017-09-12T06:43:16Z","timestamp":1505198596000},"page":"239-256","source":"Crossref","is-referenced-by-count":9,"title":["$$\\mathcal {PCS}$$, A Privacy-Preserving Certification Scheme"],"prefix":"10.1007","author":[{"given":"Nesrine","family":"Kaaniche","sequence":"first","affiliation":[]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[]},{"given":"Pierre-Olivier","family":"Rocher","sequence":"additional","affiliation":[]},{"given":"Christophe","family":"Kiennert","sequence":"additional","affiliation":[]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,9,13]]},"reference":[{"key":"14_CR1","unstructured":"Beimel, A.: Secret sharing and key distribution. Research thesis (1996)"},{"key":"14_CR2","unstructured":"Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pederson, M.O.: Scientific comparison of ABC protocols: part i - formal treatment of privacy-enhancing credential systems (2014)"},{"key":"14_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001). doi: 10.1007\/3-540-44987-6_7"},{"key":"14_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-15898-8_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"J Camenisch","year":"2010","unstructured":"Camenisch, J., M\u00f6dersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198\u2013214. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-15898-8_13"},{"issue":"10","key":"14_CR5","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"14_CR6","unstructured":"Europe, C.: Proposal for a regulation of the european parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. In: General Data Protection Regulation, January 2016 (2016)"},{"key":"14_CR7","unstructured":"Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: A proactive threshold secret sharing scheme handling Gen2 privacy threats. Technical report, Carleton University, March 2009"},{"issue":"3\u20134","key":"14_CR8","first-page":"187","volume":"12","author":"J Garcia-Alfaro","year":"2011","unstructured":"Garcia-Alfaro, J., Barbeau, M., Kranakis, E.: Proactive threshold cryptosystem for EPC tags. Ad hoc Sensor Wirel. Netw. 12(3\u20134), 187\u2013208 (2011)","journal-title":"Ad hoc Sensor Wirel. Netw."},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-27954-6_4","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"J Herranz","year":"2012","unstructured":"Herranz, J., Laguillaumie, F., Libert, B., R\u00e0fols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51\u201367. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-27954-6_4"},{"key":"14_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-319-45744-4_14","volume-title":"Computer Security \u2013 ESORICS 2016","author":"N Kaaniche","year":"2016","unstructured":"Kaaniche, N., Laurent, M.: Attribute-based signatures for supporting anonymous certification. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 279\u2013300. Springer, Cham (2016). doi: 10.1007\/978-3-319-45744-4_14"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Karchmer, M., Wigderson, A.: On span programs. In: Proceedings of the 8th IEEE Structure in Complexity Theory (1993)","DOI":"10.1109\/SCT.1993.336536"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Kiennert, C., Rocher, P.O., Ivanova, M., Rozeva, A., Durcheva, M., Garcia-Alfaro, J.: Security challenges in e-assessment and technical solutions. In 8th International Workshop on Interactive Environments and Emerging Technologies for eLearning, 21st International Conference on Information Visualization, London, UK (2017)","DOI":"10.1109\/iV.2017.70"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: ASIACCS 2010 (2010)","DOI":"10.1145\/1755688.1755697"},{"key":"14_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-642-19074-2_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"HK Maji","year":"2011","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376\u2013392. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19074-2_24"},{"key":"14_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-19379-8_3","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"T Okamoto","year":"2011","unstructured":"Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35\u201352. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-19379-8_3"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-02384-2_13","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"SF Shahandashti","year":"2009","unstructured":"Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198\u2013216. Springer, Heidelberg (2009). doi: 10.1007\/978-3-642-02384-2_13"},{"key":"14_CR17","unstructured":"Shigeo, M.: MCL - Generic and fast pairing-based cryptography library. https:\/\/github.com\/herumi\/mcl . Version: release20170402"},{"issue":"2","key":"14_CR18","doi-asserted-by":"publisher","first-page":"303","DOI":"10.1137\/S0036144598347011","volume":"41","author":"P Shor","year":"1999","unstructured":"Shor, P.: Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM Rev. 41(2), 303\u2013332 (1999)","journal-title":"SIAM Rev."},{"key":"14_CR19","unstructured":"Stanford University: PBC - The Pairing-Based Cryptography Library. https:\/\/crypto.stanford.edu\/pbc\/ . Version: 0.5.14"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Vergnaud, D.: Comment on \u201cattribute-based signatures for supporting anonymous certification\u201d by N. Kaaniche and M. Laurent (ESORICS 2016). IACR Cryptology ePrint Archive (2016)","DOI":"10.1093\/comjnl\/bxx058"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Vergnaud, D.: Comment on attribute-based signatures for supporting anonymous certification by N. Kaaniche and M. Laurent (ESORICS 2016). Comput. J. 1\u20138 (2017)","DOI":"10.1093\/comjnl\/bxx058"},{"key":"14_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-642-34129-8_39","volume-title":"Information and Communications Security","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Feng, D.: Efficient attribute proofs in anonymous credential using attribute-based cryptography. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 408\u2013415. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-34129-8_39"}],"container-title":["Lecture Notes in Computer Science","Data Privacy Management, Cryptocurrencies and Blockchain Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-67816-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,3]],"date-time":"2019-10-03T06:46:00Z","timestamp":1570085160000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-67816-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319678153","9783319678160"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-67816-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}