Home > Research > Publications & Outputs > Technical implementation and feasibility

Links

Text available via DOI:

View graph of relations

Technical implementation and feasibility

Research output: Contribution in Book/Report/Proceedings - With ISBN/ISSNChapter

Published
  • G.L. Mikkelsen
  • K. Damgård
  • H. Guldager
  • J.L. Jensen
  • J.G. Luna
  • J.D. Nielsen
  • P. Paillier
  • G. Pellegrino
  • M.B. Stausholm
  • Neeraj Suri
  • H. Zhang
Close
Publication date2015
Host publicationAttribute-Based Credentials for Trust: Identity in the Information Society
PublisherSpringer International Publishing
Pages255-318
Number of pages64
ISBN (print)9783319144399 , 9783319144382
<mark>Original language</mark>English

Abstract

This chapter provides application developers with a presentation of the implemented reference implementation of the ABC4Trust architecture and protocols as well as a presentation on how to get started using the reference implementation. The reference implementation includes the ABC-Engines of the different entities, namely the User, Issuer, Verifier, Inspector, and Revocation Authority, and the smart card implementation for the User. This chapter also presents results of a perturbation analysis of the reference implementation. Even though the ABC4Trust focused on a server-desktop environment, we have done some proof of concept implementations and analysis of the feasibility of using smart phones for the user side of a Privacy-ABC setup; these results are also presented in this chapter. © Springer International Publishing Switzerland 2015.