{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T15:40:19Z","timestamp":1743090019433,"version":"3.40.3"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319702896"},{"type":"electronic","value":"9783319702902"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-70290-2_5","type":"book-chapter","created":{"date-parts":[[2017,11,3]],"date-time":"2017-11-03T14:58:05Z","timestamp":1509721085000},"page":"70-85","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Anonymous Certification for an e-Assessment Framework"],"prefix":"10.1007","author":[{"given":"Christophe","family":"Kiennert","sequence":"first","affiliation":[]},{"given":"Nesrine","family":"Kaaniche","sequence":"additional","affiliation":[]},{"given":"Maryline","family":"Laurent","sequence":"additional","affiliation":[]},{"given":"Pierre-Olivier","family":"Rocher","sequence":"additional","affiliation":[]},{"given":"Joaquin","family":"Garcia-Alfaro","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,11,4]]},"reference":[{"key":"5_CR1","series-title":"SCI","doi-asserted-by":"publisher","first-page":"465","DOI":"10.1007\/978-3-642-14363-2_23","volume-title":"Advances in Intelligent Tutoring Systems","author":"E A\u00efmeur","year":"2010","unstructured":"A\u00efmeur, E., Hage, H.: Preserving learners\u2019 privacy. In: Nkambou, R., Bourdeau, J., Mizoguchi, R. (eds.) Advances in Intelligent Tutoring Systems. SCI, vol. 308, pp. 465\u2013483. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-14363-2_23"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"A\u00efmeur, E., Hage, E., Onana, F.S.M.: Anonymous credentials for privacy-preserving e-learning. In: 2008 International MCETECH Conference on E-Technologies, pp. 70\u201380. IEEE (2008)","DOI":"10.1109\/MCETECH.2008.26"},{"key":"5_CR3","unstructured":"Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Delegatable anonymous credentials. Cryptology ePrint Archive, Report 2008\/428 (2008)"},{"key":"5_CR4","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5931.001.0001","volume-title":"Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy","author":"SA Brands","year":"2000","unstructured":"Brands, S.A.: Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge (2000)"},{"key":"5_CR5","unstructured":"Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pederson, M.O.: Scientific comparison of ABC protocols: Part i - formal treatment of privacy-enhancing credential systems (2014)"},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/3-540-44987-6_7","volume-title":"Advances in Cryptology \u2014 EUROCRYPT 2001","author":"J Camenisch","year":"2001","unstructured":"Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: Pfitzmann, B. (ed.) EUROCRYPT 2001. LNCS, vol. 2045, pp. 93\u2013118. Springer, Heidelberg (2001). doi:10.1007\/3-540-44987-6_7"},{"key":"5_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-15898-8_13","volume-title":"Formal Methods for Industrial Critical Systems","author":"J Camenisch","year":"2010","unstructured":"Camenisch, J., M\u00f6dersheim, S., Sommer, D.: A formal model of identity mixer. In: Kowalewski, S., Roveri, M. (eds.) FMICS 2010. LNCS, vol. 6371, pp. 198\u2013214. Springer, Heidelberg (2010). doi:10.1007\/978-3-642-15898-8_13"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Canard, S., Lescuyer, S.: Protecting privacy by sanitizing personal data: a new approach to anonymous credentials. In: Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013. ACM, New York (2013)","DOI":"10.1145\/2484313.2484363"},{"issue":"10","key":"5_CR9","doi-asserted-by":"publisher","first-page":"1030","DOI":"10.1145\/4372.4373","volume":"28","author":"D Chaum","year":"1985","unstructured":"Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030\u20131044 (1985)","journal-title":"Commun. ACM"},{"key":"5_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-46416-6_22","volume-title":"Advances in Cryptology \u2014 EUROCRYPT \u201991","author":"D Chaum","year":"1991","unstructured":"Chaum, D., van Heyst, E.: Group signatures. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 257\u2013265. Springer, Heidelberg (1991). doi:10.1007\/3-540-46416-6_22"},{"key":"5_CR11","unstructured":"European Council: Proposal for a regulation of the European parliament and of the council on the protection of individuals with regard to the processing of personal data and on the free movement of such data. In General Data Protection Regulation (2016)"},{"key":"5_CR12","volume-title":"Guide to Elliptic Curve Cryptography","author":"D Hankerson","year":"2006","unstructured":"Hankerson, D., Menezes, A., Vanstone, A.: Guide to Elliptic Curve Cryptography. Springer Science & Business Media, New York (2006)"},{"key":"5_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1007\/978-3-642-27954-6_4","volume-title":"Topics in Cryptology \u2013 CT-RSA 2012","author":"J Herranz","year":"2012","unstructured":"Herranz, J., Laguillaumie, F., Libert, B., R\u00e0fols, C.: Short attribute-based signatures for threshold predicates. In: Dunkelman, O. (ed.) CT-RSA 2012. LNCS, vol. 7178, pp. 51\u201367. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-27954-6_4"},{"key":"5_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1007\/978-3-319-45744-4_14","volume-title":"Computer Security \u2013 ESORICS 2016","author":"N Kaaniche","year":"2016","unstructured":"Kaaniche, N., Laurent, M.: Attribute-based signatures for supporting anonymous certification. In: Askoxylakis, I., Ioannidis, S., Katsikas, S., Meadows, C. (eds.) ESORICS 2016. LNCS, vol. 9878, pp. 279\u2013300. Springer, Cham (2016). doi:10.1007\/978-3-319-45744-4_14"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/978-3-319-67816-0_14","volume-title":"Data Privacy Management, Cryptocurrencies and Blockchain Technology","author":"N Kaaniche","year":"2017","unstructured":"Kaaniche, N., Laurent, M., Rocher, P.-O., Kiennert, C., Garcia-Alfaro, J.: $$\\cal{PCS}$$, a privacy-preserving certification scheme. In: Garcia-Alfaro, J., Navarro-Arribas, G., Hartenstein, H., Herrera-Joancomart\u00ed, J. (eds.) ESORICS\/DPM\/CBT-2017. LNCS, vol. 10436, pp. 239\u2013256. Springer, Cham (2017). doi:10.1007\/978-3-319-67816-0_14"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Kiennert, C., Rocher, P.O., Ivanova, M., Rozeva, A., Durcheva, M., Garcia-Alfaro, J.: Security challenges in e-assessment and technical solutions. In: 8th International Workshop on Interactive Environments and Emerging Technologies for eLearning, 21st International Conference on Information Visualization, London, UK (2017)","DOI":"10.1109\/iV.2017.70"},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Leach, P.J., Salz, R., Mealling, M.H.: A Universally Unique IDentifier (UUID) URN Namespace. RFC 4122, July 2005","DOI":"10.17487\/rfc4122"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Li, J., Au, M.H., Susilo, W., Xie, D., Ren, K.: Attribute-based signature and its applications. In: ASIACCS 2010 (2010)","DOI":"10.1145\/1755688.1755697"},{"key":"5_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"376","DOI":"10.1007\/978-3-642-19074-2_24","volume-title":"Topics in Cryptology \u2013 CT-RSA 2011","author":"HK Maji","year":"2011","unstructured":"Maji, H.K., Prabhakaran, M., Rosulek, M.: Attribute-based signatures. In: Kiayias, A. (ed.) CT-RSA 2011. LNCS, vol. 6558, pp. 376\u2013392. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-19074-2_24"},{"key":"5_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"417","DOI":"10.1007\/3-540-39799-X_31","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201985 Proceedings","author":"VS Miller","year":"1986","unstructured":"Miller, V.S.: Use of elliptic curves in cryptography. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 417\u2013426. Springer, Heidelberg (1986). doi:10.1007\/3-540-39799-X_31"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/978-3-642-19379-8_3","volume-title":"Public Key Cryptography \u2013 PKC 2011","author":"T Okamoto","year":"2011","unstructured":"Okamoto, T., Takashima, K.: Efficient attribute-based signatures for non-monotone predicates in the standard model. In: Catalano, D., Fazio, N., Gennaro, R., Nicolosi, A. (eds.) PKC 2011. LNCS, vol. 6571, pp. 35\u201352. Springer, Heidelberg (2011). doi:10.1007\/978-3-642-19379-8_3"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Rescorla, E., Dierks, T.: The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246, August 2008","DOI":"10.17487\/rfc5246"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1007\/978-3-642-02384-2_13","volume-title":"Progress in Cryptology \u2013 AFRICACRYPT 2009","author":"SF Shahandashti","year":"2009","unstructured":"Shahandashti, S.F., Safavi-Naini, R.: Threshold attribute-based signatures and their application to anonymous credential systems. In: Preneel, B. (ed.) AFRICACRYPT 2009. LNCS, vol. 5580, pp. 198\u2013216. Springer, Heidelberg (2009). doi:10.1007\/978-3-642-02384-2_13"},{"key":"5_CR24","unstructured":"Shigeo, M.: MCL - Generic and fast pairing-based cryptography library, version: release20170402. https:\/\/github.com\/herumi\/mcl"},{"key":"5_CR25","unstructured":"Stanford University: PBC - The Pairing-Based Cryptography Library, version: 0.5.14. https:\/\/crypto.stanford.edu\/pbc\/"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Vergnaud, D.: Comment on \u201cattribute-based signatures for supporting anonymous certification\u201d by N. Kaaniche and M. Laurent (ESORICS 2016). IACR Cryptology ePrint Archive (2016)","DOI":"10.1093\/comjnl\/bxx058"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Vergnaud, D.: Comment on attribute-based signatures for supporting anonymous certification by N. Kaaniche and M. Laurent (ESORICS 2016). Comput. J. 1\u20138, June 2017","DOI":"10.1093\/comjnl\/bxx058"},{"key":"5_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"533","DOI":"10.1007\/3-540-45682-1_31","volume-title":"Advances in Cryptology \u2014 ASIACRYPT 2001","author":"ER Verheul","year":"2001","unstructured":"Verheul, E.R.: Self-blindable credential certificates from the Weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 533\u2013551. Springer, Heidelberg (2001). doi:10.1007\/3-540-45682-1_31"},{"key":"5_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"408","DOI":"10.1007\/978-3-642-34129-8_39","volume-title":"Information and Communications Security","author":"Y Zhang","year":"2012","unstructured":"Zhang, Y., Feng, D.: Efficient attribute proofs in anonymous credential using attribute-based cryptography. In: Chim, T.W., Yuen, T.H. (eds.) ICICS 2012. LNCS, vol. 7618, pp. 408\u2013415. Springer, Heidelberg (2012). doi:10.1007\/978-3-642-34129-8_39"}],"container-title":["Lecture Notes in Computer Science","Secure IT Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-70290-2_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,12]],"date-time":"2024-03-12T18:14:33Z","timestamp":1710267273000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-70290-2_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319702896","9783319702902"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-70290-2_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"4 November 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"NordSec","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Nordic Conference on Secure IT Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tartu","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Estonia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 November 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"nordsec2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/nordsec2017.cs.ut.ee\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}