Achieving non-transferability in credential systems using hidden biometrics
Article first published online: 28 AUG 2009
Copyright © 2009 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 4, Issue 2, pages 195–206, February 2011
How to Cite
Adams, C. (2011), Achieving non-transferability in credential systems using hidden biometrics. Security Comm. Networks, 4: 195–206. doi: 10.1002/sec.136
- Issue published online: 28 AUG 2009
- Article first published online: 28 AUG 2009
- digital credentials;
- anonymous credentials;
- credential transfer;
- commitment schemes
In credential systems, which allow the construction of privacy-preserving access control infrastructures in online environments, credential transfer occurs when Alice gives her private key to another entity who can then freely use Alice's credential as if it was his/her own. Prior approaches to limit credential transfer require tamper-resistant user hardware, or are ineffective against closely knit groups of users who are willing to share personal or valuable information with each other. In this paper we propose a scheme to achieve non-transferability for any malicious, but computationally bounded, legitimate credential owner. Copyright © 2009 John Wiley & Sons, Ltd.