{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T16:31:25Z","timestamp":1777566685338,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T00:00:00Z","timestamp":1636675200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"German Federal Ministry of Education and Research","award":["16KIS0762"],"award-info":[{"award-number":["16KIS0762"]}]},{"name":"ECSEL Joint Undertaking","award":["826610"],"award-info":[{"award-number":["826610"]}]},{"name":"Austrian Science Fund","award":["P31621-N38"],"award-info":[{"award-number":["P31621-N38"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11,12]]},"DOI":"10.1145\/3460120.3484582","type":"proceedings-article","created":{"date-parts":[[2021,11,13]],"date-time":"2021-11-13T12:05:27Z","timestamp":1636805127000},"page":"2004-2023","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["With a Little Help from My Friends"],"prefix":"10.1145","author":[{"given":"Lucjan","family":"Hanzlik","sequence":"first","affiliation":[{"name":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"}]},{"given":"Daniel","family":"Slamanig","sequence":"additional","affiliation":[{"name":"AIT Austrian Institute of Technology, Vienna, Austria"}]}],"member":"320","published-online":{"date-parts":[[2021,11,13]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys. In ASIACRYPT","volume":"434","author":"Backes Michael","year":"2018","unstructured":"Michael Backes, Lucjan Hanzlik, Kamil Kluczniak, and Jonas Schneider. 2018. Signatures with Flexible Public Key: Introducing Equivalence Classes for Public Keys. In ASIACRYPT 2018, Part II (LNCS, Vol. 11273). 405--434."},{"key":"e_1_3_2_1_2_1","volume-title":"Membership Privacy for Fully Dynamic Group Signatures. In ACM CCS 2019 . 2181--2198","author":"Backes Michael","year":"2019","unstructured":"Michael Backes, Lucjan Hanzlik, and Jonas Schneider-Bensch. 2019. Membership Privacy for Fully Dynamic Group Signatures. In ACM CCS 2019 . 2181--2198."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516687"},{"key":"e_1_3_2_1_4_1","volume-title":"Pairing-Friendly Elliptic Curves of Prime Order. In SAC 2005 (LNCS","volume":"331","author":"Paulo S. L.","unstructured":"Paulo S. L. M. Barreto and Michael Naehrig. 2006. Pairing-Friendly Elliptic Curves of Prime Order. In SAC 2005 (LNCS , Vol. 3897). 319--331."},{"key":"e_1_3_2_1_5_1","volume-title":"Pereira","author":"Barreto Paulo S. L. M.","year":"2015","unstructured":"Paulo S. L. M. Barreto and Geovandro C. C. F. Pereira. 2015. Barreto-Naehrig (BN) pairing-friendly elliptic curves. https:\/\/github.com\/javabeanz\/bnpairings ."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12510-2_15"},{"key":"e_1_3_2_1_7_1","volume-title":"Randomizable Proofs and Delegatable Anonymous Credentials. In CRYPTO 2009 (LNCS","volume":"125","author":"Belenkiy Mira","year":"2009","unstructured":"Mira Belenkiy, Jan Camenisch, Melissa Chase, Markulf Kohlweiss, Anna Lysyanskaya, and Hovav Shacham. 2009. Randomizable Proofs and Delegatable Anonymous Credentials. In CRYPTO 2009 (LNCS, Vol. 5677). 108--125."},{"key":"e_1_3_2_1_8_1","first-page":"62","article-title":"Random Oracles are Practical","volume":"93","author":"Bellare Mihir","year":"1993","unstructured":"Mihir Bellare and Phillip Rogaway. 1993. Random Oracles are Practical: A Paradigm for Designing Efficient Protocols. In ACM CCS 93 . 62--73.","journal-title":"A Paradigm for Designing Efficient Protocols. In ACM CCS"},{"key":"e_1_3_2_1_9_1","volume-title":"High-Speed High-Security Signatures. In CHES 2011 (LNCS","volume":"142","author":"Bernstein Daniel J.","year":"2011","unstructured":"Daniel J. Bernstein, Niels Duif, Tanja Lange, Peter Schwabe, and Bo-Yin Yang. 2011. High-Speed High-Security Signatures. In CHES 2011 (LNCS , Vol. 6917). 124--142."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653734"},{"key":"e_1_3_2_1_11_1","volume-title":"APF","author":"Bjones Ronny","year":"2012","unstructured":"Ronny Bjones, Ioannis Krontiris, Pascal Paillier, and Kai Rannenberg. 2012. Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication. In APF 2012. Springer."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Marina Blanton. 2008. Online subscriptions with anonymous access. In ASIACCS 08. 217--227.","DOI":"10.1145\/1368310.1368342"},{"key":"e_1_3_2_1_13_1","volume-title":"ACNS 18 (LNCS","author":"Bl\u00f6mer Johannes","unstructured":"Johannes Bl\u00f6mer and Jan Bobolz. 2018. Delegatable Attribute-Based Anonymous Credentials from Dynamically Malleable Signatures. In ACNS 18 (LNCS, Vol. 10892). 221--239."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354223"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Jan Bobolz Fabian Eidens Stephan Krenn Daniel Slamanig and Christoph Striecks. 2020. Privacy-Preserving Incentive Systems with Highly Efficient Point-Collection. In ASIACCS 20 . 319--333.","DOI":"10.1145\/3320269.3384769"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_30"},{"key":"e_1_3_2_1_17_1","unstructured":"Dan Boneh and Victor Shoup. 2020. A Graduate Course in Applied Cryptography (version 0.5) . cryptobook.us ."},{"key":"e_1_3_2_1_18_1","first-page":"145","article-title":"A technical overview of digital credentials. Available online","volume":"20","author":"Brands Stefan","year":"2002","unstructured":"Stefan Brands. 2002. A technical overview of digital credentials. Available online, Feb , Vol. 20 (2002), 145--8.","journal-title":"Feb"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2011.63"},{"key":"e_1_3_2_1_20_1","volume-title":"Direct Anonymous Attestation. In ACM CCS","author":"Brickell Ernest F.","year":"2004","unstructured":"Ernest F. Brickell, Jan Camenisch, and Liqun Chen. 2004. Direct Anonymous Attestation. In ACM CCS 2004. 132--145."},{"key":"e_1_3_2_1_21_1","volume-title":"(SEC 2006)","author":"Jan Camenisch. 2006. Protecting (Anonymous) Credentials with the Trusted Computing Group","unstructured":"Jan Camenisch. 2006. Protecting (Anonymous) Credentials with the Trusted Computing Group's TPM V1.2. In (SEC 2006) . Springer."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2017.22"},{"key":"e_1_3_2_1_23_1","volume-title":"Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. In SEC 2019 , , Gurpreet Dhillon, Fredrik Karlsson, Karin Hedstr\u00f6m, and Andr\u00e9 Z\u00faquete (Eds.). Springer.","author":"Camenisch Jan","year":"2019","unstructured":"Jan Camenisch, Manu Drijvers, Petr Dzurenda, and Jan Hajny. 2019. Fast Keyed-Verification Anonymous Credentials on Standard Smart Cards. In SEC 2019 , , Gurpreet Dhillon, Fredrik Karlsson, Karin Hedstr\u00f6m, and Andr\u00e9 Z\u00faquete (Eds.). Springer."},{"key":"e_1_3_2_1_24_1","unstructured":"Jan Camenisch Manu Drijvers Alec Edgington Anja Lehmann and Rainer Urian. 2018. FIDO ECDAA Algorithm . https:\/\/fidoalliance.org\/specs\/fido-v2.0-id-20180227\/fido-ecdaa-algorithm-v2.0-id-20180227.html ."},{"key":"e_1_3_2_1_25_1","volume-title":"Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. In TRUST 2016 . Springer.","author":"Camenisch Jan","year":"2016","unstructured":"Jan Camenisch, Manu Drijvers, and Anja Lehmann. 2016a. Anonymous Attestation Using the Strong Diffie Hellman Assumption Revisited. In TRUST 2016 . Springer."},{"key":"e_1_3_2_1_26_1","volume-title":"Universally Composable Direct Anonymous Attestation. In PKC","volume":"264","author":"Camenisch Jan","year":"2016","unstructured":"Jan Camenisch, Manu Drijvers, and Anja Lehmann. 2016b. Universally Composable Direct Anonymous Attestation. In PKC 2016, Part II (LNCS, Vol. 9615). 234--264."},{"key":"e_1_3_2_1_27_1","volume-title":"Composable and Modular Anonymous Credentials: Definitions and Practical Constructions. In ASIACRYPT","volume":"288","author":"Camenisch Jan","year":"2015","unstructured":"Jan Camenisch, Maria Dubovitskaya, Kristiyan Haralambiev, and Markulf Kohlweiss. 2015. Composable and Modular Anonymous Credentials: Definitions and Practical Constructions. In ASIACRYPT 2015, Part II (LNCS, Vol. 9453). 262--288."},{"key":"e_1_3_2_1_28_1","volume-title":"An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In EUROCRYPT 2001 (LNCS","volume":"118","author":"Camenisch Jan","year":"2001","unstructured":"Jan Camenisch and Anna Lysyanskaya. 2001. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In EUROCRYPT 2001 (LNCS , Vol. 2045). 93--118."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28628-8_4"},{"key":"e_1_3_2_1_30_1","volume-title":"Design and Implementation of The Idemix Anonymous Credential System. In ACM CCS 2002 . 21--30","author":"Camenisch Jan","year":"2002","unstructured":"Jan Camenisch and Els Van Herreweghen. 2002. Design and Implementation of The Idemix Anonymous Credential System. In ACM CCS 2002 . 21--30."},{"key":"e_1_3_2_1_31_1","volume-title":"Algebraic MACs and Keyed-Verification Anonymous Credentials. In ACM CCS 2014 . 1205--1216","author":"Chase Melissa","year":"2014","unstructured":"Melissa Chase, Sarah Meiklejohn, and Greg Zaverucha. 2014. Algebraic MACs and Keyed-Verification Anonymous Credentials. In ACM CCS 2014 . 1205--1216."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Melissa Chase Trevor Perrin and Greg Zaverucha. 2020. The Signal Private Group System and Anonymous Credentials Supporting Efficient Verifiable Encryption. In ACM CCS 20. 1445--1459.","DOI":"10.1145\/3372297.3417887"},{"key":"e_1_3_2_1_33_1","volume-title":"Blind Signatures for Untraceable Payments. In CRYPTO'82","author":"Chaum David","year":"1982","unstructured":"David Chaum. 1982. Blind Signatures for Untraceable Payments. In CRYPTO'82. 199--203."},{"key":"e_1_3_2_1_34_1","volume-title":"Group Signatures. In EUROCRYPT'91 (LNCS","volume":"265","author":"Chaum David","year":"1991","unstructured":"David Chaum and Eug\u00e8ne van Heyst. 1991. Group Signatures. In EUROCRYPT'91 (LNCS , Vol. 547). 257--265."},{"key":"e_1_3_2_1_35_1","volume-title":"DAA-A: Direct Anonymous Attestation with Attributes. In TRUST 2015 .","author":"Chen Liqun","year":"2015","unstructured":"Liqun Chen and Rainer Urian. 2015. DAA-A: Direct Anonymous Attestation with Attributes. In TRUST 2015 ."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00468-1_28"},{"key":"e_1_3_2_1_37_1","volume-title":"Non-interactive Keyed-Verification Anonymous Credentials. In PKC","volume":"96","author":"Couteau Geoffroy","year":"2019","unstructured":"Geoffroy Couteau and Michael Reichle. 2019. Non-interactive Keyed-Verification Anonymous Credentials. In PKC 2019, Part I (LNCS, Vol. 11442). 66--96."},{"key":"e_1_3_2_1_38_1","volume-title":"CT-RSA 2019 (LNCS","volume":"555","author":"Elizabeth","unstructured":"Elizabeth C. Crites and Anna Lysyanskaya. 2019. Delegatable Anonymous Credentials from Mercurial Signatures. In CT-RSA 2019 (LNCS, Vol. 11405). 535--555."},{"key":"e_1_3_2_1_39_1","volume-title":"Crites and Anna Lysyanskaya","author":"Elizabeth","year":"2020","unstructured":"Elizabeth C. Crites and Anna Lysyanskaya. 2020. Mercurial Signatures for Variable-Length Messages. Cryptology ePrint Archive, Report 2020\/979. https:\/\/eprint.iacr.org\/2020\/979 ."},{"key":"e_1_3_2_1_40_1","volume-title":"Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, and Yuval Yarom.","author":"Dall Fergus","year":"2018","unstructured":"Fergus Dall, Gabrielle De Micheli, Thomas Eisenbarth, Daniel Genkin, Nadia Heninger, Ahmad Moghimi, and Yuval Yarom. 2018. CacheQuote: Efficiently Recovering Long-term Secrets of SGX EPID via Cache Attacks. IACR TCHES , Vol. 2018, 2 (2018), 171--191. https:\/\/tches.iacr.org\/index.php\/TCHES\/article\/view\/879 ."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0026"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1515\/popets-2018-0013"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-76581-5_6"},{"key":"e_1_3_2_1_44_1","volume-title":"Practical Round-Optimal Blind Signatures in the Standard Model. In CRYPTO","volume":"253","author":"Fuchsbauer Georg","year":"2015","unstructured":"Georg Fuchsbauer, Christian Hanser, and Daniel Slamanig. 2015. Practical Round-Optimal Blind Signatures in the Standard Model. In CRYPTO 2015, Part II (LNCS, Vol. 9216). 233--253."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9281-4"},{"key":"e_1_3_2_1_46_1","volume-title":"Decentralized Anonymous Credentials. In NDSS 2014 .","author":"Garman Christina","year":"2014","unstructured":"Christina Garman, Matthew Green, and Ian Miers. 2014. Decentralized Anonymous Credentials. In NDSS 2014 ."},{"key":"e_1_3_2_1_47_1","volume-title":"Efficient Non-interactive Proof Systems for Bilinear Groups. In EUROCRYPT 2008 (LNCS","volume":"432","author":"Groth Jens","year":"2008","unstructured":"Jens Groth and Amit Sahai. 2008. Efficient Non-interactive Proof Systems for Bilinear Groups. In EUROCRYPT 2008 (LNCS, Vol. 4965). 415--432."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45611-8_26"},{"key":"e_1_3_2_1_49_1","unstructured":"Chlo\u00e9 H\u00e9bant and David Pointcheval. 2020. Traceable Constant-Size Multi-Authority Credentials. Cryptology ePrint Archive Report 2020\/657. https:\/\/eprint.iacr.org\/2020\/657 ."},{"key":"e_1_3_2_1_50_1","volume-title":"Privacy for Public Transportation. In PET 2006 (LNCS","volume":"19","author":"Heydt-Benjamin Thomas S.","year":"2006","unstructured":"Thomas S. Heydt-Benjamin , Hee-Jin Chae, Benessa Defend, and Kevin Fu. 2006. Privacy for Public Transportation. In PET 2006 (LNCS , Vol. 4258). 1--19."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03356-8_18"},{"key":"e_1_3_2_1_52_1","volume-title":"Efficiency Improvements for Signature Schemes with Tight Security Reductions. In ACM CCS 2003 . 155--164","author":"Katz Jonathan","year":"2003","unstructured":"Jonathan Katz and Nan Wang. 2003. Efficiency Improvements for Signature Schemes with Tight Security Reductions. In ACM CCS 2003 . 155--164."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-34618-8_3"},{"key":"e_1_3_2_1_54_1","volume-title":"Privacy in Digital Identity Systems: Models, Assessment, and User Adoption","author":"Khatchatourov Armen","unstructured":"Armen Khatchatourov, Maryline Laurent, and Claire Levallois-Barth. 2015. Privacy in Digital Identity Systems: Models, Assessment, and User Adoption. In Electronic Government, Efthimios Tambouris, Marijn Janssen, Hans Jochen Scholl, Maria A. Wimmer, Konstantinos Tarabanis, Mila Gasc\u00f3, Bram Klievink, Ida Lindgren, and Peter Parycek (Eds.). Springer International Publishing, Cham, 273--290."},{"key":"e_1_3_2_1_55_1","volume-title":"CANS 17 (LNCS","author":"Krenn Stephan","unstructured":"Stephan Krenn, Thomas Lor\u00fcnser, Anja Salzer, and Christoph Striecks. 2017. Towards Attribute-Based Credentials in the Cloud. In CANS 17 (LNCS , Vol. 11261). 179--202."},{"key":"e_1_3_2_1_56_1","volume-title":"Anonymous Tokens with Private Metadata Bit. In CRYPTO","volume":"336","author":"Kreuter Ben","year":"2020","unstructured":"Ben Kreuter, Tancr\u00e8de Lepoint, Michele Orr\u00f9, and Mariana Raykova. 2020. Anonymous Tokens with Private Metadata Bit. In CRYPTO 2020, Part I (LNCS, Vol. 12170). 308--336."},{"key":"e_1_3_2_1_57_1","volume-title":"Anon-Pass: Practical Anonymous Subscriptions. In 2013 IEEE Symposium on Security and Privacy . 319--333","author":"Lee Michael Z.","year":"2013","unstructured":"Michael Z. Lee, Alan M. Dunn, Brent Waters, Emmett Witchel, and Jonathan Katz. 2013. Anon-Pass: Practical Anonymous Subscriptions. In 2013 IEEE Symposium on Security and Privacy . 319--333."},{"key":"e_1_3_2_1_58_1","volume-title":"\u201cSignatures with Efficient Protocols","author":"Libert Beno\u00eet","unstructured":"Beno\u00eet Libert, Fabrice Mouhartem, Thomas Peters, and Moti Yung. 2016. Practical \u201cSignatures with Efficient Protocols\u201d from Simple Assumptions. In ASIACCS 16 . 511--522."},{"key":"e_1_3_2_1_59_1","volume-title":"ACISP 20 (LNCS","author":"Lu Jinyu","unstructured":"Jinyu Lu, Yunwen Liu, Tomer Ashur, Bing Sun, and Chao Li. 2020. Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers. In ACISP 20 (LNCS, Vol. 12248). 105--124."},{"key":"e_1_3_2_1_60_1","unstructured":"MAOSCO Limited. 2020. MULTOS Standard Technology. https:\/\/www.multos.com\/."},{"key":"e_1_3_2_1_61_1","volume-title":"Privacy-Preserving Public Transport Ticketing System","author":"Milutinovic Milica","unstructured":"Milica Milutinovic, Koen Decroix, Vincent Naessens, and Bart De Decker. 2015. Privacy-Preserving Public Transport Ticketing System. In Data and Applications Security and Privacy XXIX. Springer."},{"key":"e_1_3_2_1_62_1","volume-title":"29th USENIX Security Symposium, USENIX Security 2020","author":"Moghimi Daniel","year":"2020","unstructured":"Daniel Moghimi, Berk Sunar, Thomas Eisenbarth, and Nadia Heninger. 2020. TPM-FAIL: TPM meets Timing and Lattice Attacks. In 29th USENIX Security Symposium, USENIX Security 2020, August 12--14, 2020 , , Srdjan Capkun and Franziska Roesner (Eds.). USENIX Association, 2057--2073. https:\/\/www.usenix.org\/conference\/usenixsecurity20\/presentation\/moghimi-tpm"},{"key":"e_1_3_2_1_63_1","volume-title":"Security and Privacy in Communication Networks ,","author":"Mostowski Wojciech","unstructured":"Wojciech Mostowski and Pim Vullers. 2012. Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards. In Security and Privacy in Communication Networks , , Muttukrishnan Rajarajan, Fred Piper, Haining Wang, and George Kesidis (Eds.). Springer."},{"key":"e_1_3_2_1_64_1","unstructured":"Oracle. 2020. Java Card Technology. https:\/\/www.oracle.com\/java\/technologies\/java-card-tech.html ."},{"key":"e_1_3_2_1_65_1","unstructured":"Christian Paquin and Greg Zaverucha. 2013. U-Prove Cryptographic Specification V1.1 (Revision 3). https:\/\/www.microsoft.com\/en-us\/research\/publication\/u-prove-cryptographic-specification-v1--1-revision-3\/"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29485-8_7"},{"key":"e_1_3_2_1_67_1","volume-title":"25th USENIX Security Symposium, USENIX Security 16","author":"Raj Himanshu","year":"2016","unstructured":"Himanshu Raj, Stefan Saroiu, Alec Wolman, Ronald Aigner, Jeremiah Cox, Paul England, Chris Fenner, Kinshuman Kinshumann, Jork L\u00f6 ser, Dennis Mattoon, Magnus Nystr\u00f6 m, David Robinson, Rob Spiger, Stefan Thom, and David Wooten. 2016. fTPM: A Software-Only Implementation of a TPM Chip. In 25th USENIX Security Symposium, USENIX Security 16, Austin, TX, USA, August 10--12, 2016 , , Thorsten Holz and Stefan Savage (Eds.). USENIX Association, 841--856. https:\/\/www.usenix.org\/conference\/usenixsecurity16\/technical-sessions\/presentation\/raj"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"crossref","unstructured":"Kai Rannenberg Jan Camenisch and Ahmad Sabouri (Eds.). 2015. Attribute-based Credentials for Trust: Identity in the Information Society .Springer.","DOI":"10.1007\/978-3-319-14439-9"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45388-6_22"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSEC.2020.2993896"},{"key":"e_1_3_2_1_71_1","volume-title":"Identity-Based Cryptosystems and Signature Schemes. In CRYPTO'84 (LNCS","volume":"53","author":"Shamir Adi","year":"1984","unstructured":"Adi Shamir. 1984. Identity-Based Cryptosystems and Signature Schemes. In CRYPTO'84 (LNCS, Vol. 196). 47--53."},{"key":"e_1_3_2_1_72_1","volume-title":"Lower Bounds for Discrete Logarithms and Related Problems. In EUROCRYPT'97 (LNCS","volume":"266","author":"Shoup Victor","year":"1997","unstructured":"Victor Shoup. 1997. Lower Bounds for Discrete Logarithms and Related Problems. In EUROCRYPT'97 (LNCS, Vol. 1233). 256--266."},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2019.23272"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45682-1_31"},{"key":"e_1_3_2_1_75_1","volume-title":"Efficient Identity-Based Encryption Without Random Oracles. In EUROCRYPT 2005 (LNCS","volume":"127","author":"Waters Brent R.","year":"2005","unstructured":"Brent R. Waters. 2005. Efficient Identity-Based Encryption Without Random Oracles. In EUROCRYPT 2005 (LNCS, Vol. 3494). 114--127."}],"event":{"name":"CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security","location":"Virtual Event Republic of Korea","acronym":"CCS '21","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"]},"container-title":["Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484582","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3460120.3484582","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T20:45:01Z","timestamp":1763498701000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3460120.3484582"}},"subtitle":["Constructing Practical Anonymous Credentials"],"short-title":[],"issued":{"date-parts":[[2021,11,12]]},"references-count":75,"alternative-id":["10.1145\/3460120.3484582","10.1145\/3460120"],"URL":"https:\/\/doi.org\/10.1145\/3460120.3484582","relation":{},"subject":[],"published":{"date-parts":[[2021,11,12]]},"assertion":[{"value":"2021-11-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}