{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T20:34:59Z","timestamp":1773174899465,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642540684","type":"print"},{"value":"9783642540691","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54069-1_7","type":"book-chapter","created":{"date-parts":[[2014,1,15]],"date-time":"2014-01-15T03:09:15Z","timestamp":1389755355000},"page":"111-124","source":"Crossref","is-referenced-by-count":10,"title":["Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication"],"prefix":"10.1007","author":[{"given":"Ronny","family":"Bjones","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Krontiris","sequence":"additional","affiliation":[]},{"given":"Pascal","family":"Paillier","sequence":"additional","affiliation":[]},{"given":"Kai","family":"Rannenberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"7_CR1","unstructured":"Ahlswede, S., Gaab, J.: eIDs in Europe, Deutsche Bank Research. Tech. Rep. (September 2010)"},{"key":"7_CR2","unstructured":"A Strategy for ICT R&D and Innovation in Europe: Raising the Game. Commission Communication, COM 116 (2009)"},{"key":"7_CR3","doi-asserted-by":"crossref","unstructured":"Naumann, I., Hogben, G.: Privacy Features of European eID Card Specifications, ENISA, Position Paper (January 2009)","DOI":"10.1016\/S1353-4858(08)70097-7"},{"key":"7_CR4","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1109\/MSP.2011.148","volume":"10","author":"A. Poller","year":"2012","unstructured":"Poller, A., Waldmann, U., Vowe, S., Turpe, S.: Electronic identity cards for user authentication \u2013 promise and practice. IEEE Security & Privacy\u00a010, 46\u201354 (2012)","journal-title":"IEEE Security & Privacy"},{"key":"7_CR5","unstructured":"Architecture electronic Identity Card and electronic Resident Permit, German Federal Office for Information Security. Technical Report TR-03127, Version 1.13 (2011)"},{"key":"7_CR6","unstructured":"Naumann, I.: Privacy and Security Risks when Authenticating on the Internet with European eID Cards, ENISA, Risk Assessment Report (November 2009)"},{"key":"7_CR7","unstructured":"Bjones, R.: Architecture serving complex Identity Infrastructures, Trust in Digital Life. Tech. Rep. (November 2011)"},{"key":"7_CR8","unstructured":"Krontiris, I., Leitold, H., Posch, R., Rannenberg, K.: eID Interoperability. In: Fumy, W., Paeschke, M. (eds.) Handbook of eID Security. Publicis Publishing (2011)"},{"key":"7_CR9","unstructured":"Impact Assessment accompanying the proposal for a regulation of the European Parliament and of the council on electronic identification and trust services for electronic transactions in the internal market. In: European Commission, SWD, 136 (2012)"},{"key":"7_CR10","unstructured":"Cameron, K., Posch, R., Rannenberg, K.: Proposal for a common identity framework: A User-Centric Identity Metasystem. In: Rannenberg, K., Royer, D., Deuker, A. (eds.) The Future of Identity in the Information Society \u2013 Opportunities and Challenges. Springer (2009)"},{"key":"7_CR11","unstructured":"Cameron, K., Jones, M.B.: Design Rationale behind the Identity Metasystem Architecture. Microsoft. Tech. Rep. (February 2006)"},{"key":"7_CR12","doi-asserted-by":"crossref","unstructured":"Camenisch, J., Van Herreweghen, E.: Design and implementation of the idemix anonymous credential system. In: Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS 2002), pp. 21\u201330 (2002)","DOI":"10.1145\/586110.586114"},{"key":"7_CR13","doi-asserted-by":"crossref","unstructured":"Brands, S.: Rethinking Public Key Infrastructures and Digital Certificates; Building in Privacy. MIT Press (2000)","DOI":"10.7551\/mitpress\/5931.001.0001"},{"key":"7_CR14","unstructured":"ABC4Trust: Attribute-Based Credentials for Trust, https:\/\/abc4trust.eu"},{"key":"7_CR15","unstructured":"D2.1 Architecture for Attribute-based Credential Technologies - Version 1, ABC4Trust, Deliverable D2.1 (2011)"},{"key":"7_CR16","unstructured":"Bjones, R.: eParticipation Scenario Reference Guide. Microsoft. Tech. Rep. (October 2010)"},{"key":"7_CR17","unstructured":"Proposal for a regulation of the European Parliament and of the council on electronic identification and trust services for electronic transactions in the internal market. In: European Commission, COM, 238\/2 (2012)"},{"key":"7_CR18","unstructured":"Bichsel, P.: Theft and Misuse Protection for Anonymous Credentials, ETH Z\u00fcrich, Switzerland, Master\u2019s thesis (2007)"},{"key":"7_CR19","unstructured":"Balasch, J.: Smart card implementation of anonymous credentials, K. U. Leuven, Belgium, Master\u2019s thesis (2008)"},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Bichsel, P., Camenisch, J., Gro\u00df, T., Shoup, V.: Anonymous credentials on a standard java card. In: Proceedings of the 16th ACM Conference on Computer and Communications Security (CCS 2009), pp. 600\u2013610 (2009)","DOI":"10.1145\/1653662.1653734"},{"key":"7_CR21","doi-asserted-by":"crossref","unstructured":"Tews, H., Jacobs, B.: Performance issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. In: Markowitch, O., Bilas, A., Hoepman, J.-H., Mitchell, C.J., Quisquater, J.-J. (eds.) WISTP 2009. LNCS, vol.\u00a05746, pp. 95\u2013111. Springer, Heidelberg (2009)","DOI":"10.1007\/978-3-642-03944-7_8"},{"key":"7_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/978-3-642-12510-2_15","volume-title":"Smart Card Research and Advanced Application","author":"L. Batina","year":"2010","unstructured":"Batina, L., Hoepman, J.-H., Jacobs, B., Mostowski, W., Vullers, P.: Developing efficient blinded attribute certificates on smart cards via pairings. In: Gollmann, D., Lanet, J.-L., Iguchi-Cartigny, J. (eds.) CARDIS 2010. LNCS, vol.\u00a06035, pp. 209\u2013222. Springer, Heidelberg (2010)"},{"key":"7_CR23","unstructured":"Microsoft, U-Prove Cryptographic Specification V1.1 (February 2011)"},{"key":"7_CR24","unstructured":"Invia, Modular Exponentiation IP, http:\/\/www.invia.fr\/Modular-Exponentiation-21.html"},{"key":"7_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1007\/978-3-642-15031-9_6","volume-title":"Cryptographic Hardware and Embedded Systems, CHES 2010","author":"P. Longa","year":"2010","unstructured":"Longa, P., Gebotys, C.: Efficient techniques for high-speed elliptic curve cryptography. In: Mangard, S., Standaert, F.-X. (eds.) CHES 2010. LNCS, vol.\u00a06225, pp. 80\u201394. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Privacy Technologies and Policy"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54069-1_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,6]],"date-time":"2019-08-06T11:22:30Z","timestamp":1565090550000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54069-1_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642540684","9783642540691"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54069-1_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}