MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

Christian Hanser, Martin Deutschmann

Publikation: Buch/Bericht/KonferenzbandSonstiger BerichtForschung

Abstract

At a high-level perspective, MATTHEW intends to enable new applications and services on
mobile platforms using multiple roots of trust. In that respect, the privacy of users is considered
as being a critical asset and therefore MATTHEW considers this problem from the design phase
on. Dealing with multiple roots of trust enables the possibility of transfers of credentials from
one secure element to another. Of course, the meaning of the term credential may differ
depending on the considered application. Therefore operating multiple roots of trust lays
the ground for a notion of mobility for credentials, which may be stored and used within
different secure elements as users interact with their devices in their daily life. This document
explores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,
how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (Use
Case 3) that aims at providing anonymity for tickets in public transport. The results are
compelling, as presented protocols allow for highly efficient ticket presentations. Moreover,
it gives a thorough discussion of these approaches, of their efficiency, of the realization of
transferability in both the single-use and the long-term ticketing use cases and of ways to
implement them efficiently.
Originalspracheenglisch
Verlag.
Seitenumfang49
PublikationsstatusVeröffentlicht - 2016

Schlagwörter

    Dies zitieren

    MATTHEW D2.2 Report on Privacy Algorithms and their Implementation. / Hanser, Christian; Deutschmann, Martin.

    ., 2016. 49 S.

    Publikation: Buch/Bericht/KonferenzbandSonstiger BerichtForschung

    Hanser, Christian ; Deutschmann, Martin. / MATTHEW D2.2 Report on Privacy Algorithms and their Implementation. ., 2016. 49 S.
    @book{4d9551d5bd304d87977e9cc3599da030,
    title = "MATTHEW D2.2 Report on Privacy Algorithms and their Implementation",
    abstract = "At a high-level perspective, MATTHEW intends to enable new applications and services onmobile platforms using multiple roots of trust. In that respect, the privacy of users is consideredas being a critical asset and therefore MATTHEW considers this problem from the design phaseon. Dealing with multiple roots of trust enables the possibility of transfers of credentials fromone secure element to another. Of course, the meaning of the term credential may differdepending on the considered application. Therefore operating multiple roots of trust laysthe ground for a notion of mobility for credentials, which may be stored and used withindifferent secure elements as users interact with their devices in their daily life. This documentexplores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (UseCase 3) that aims at providing anonymity for tickets in public transport. The results arecompelling, as presented protocols allow for highly efficient ticket presentations. Moreover,it gives a thorough discussion of these approaches, of their efficiency, of the realization oftransferability in both the single-use and the long-term ticketing use cases and of ways toimplement them efficiently.",
    keywords = "Multiple roots of trust, secure elements, credentials, privacy, ABCs",
    author = "Christian Hanser and Martin Deutschmann",
    year = "2016",
    language = "English",
    publisher = ".",

    }

    TY - BOOK

    T1 - MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

    AU - Hanser, Christian

    AU - Deutschmann, Martin

    PY - 2016

    Y1 - 2016

    N2 - At a high-level perspective, MATTHEW intends to enable new applications and services onmobile platforms using multiple roots of trust. In that respect, the privacy of users is consideredas being a critical asset and therefore MATTHEW considers this problem from the design phaseon. Dealing with multiple roots of trust enables the possibility of transfers of credentials fromone secure element to another. Of course, the meaning of the term credential may differdepending on the considered application. Therefore operating multiple roots of trust laysthe ground for a notion of mobility for credentials, which may be stored and used withindifferent secure elements as users interact with their devices in their daily life. This documentexplores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (UseCase 3) that aims at providing anonymity for tickets in public transport. The results arecompelling, as presented protocols allow for highly efficient ticket presentations. Moreover,it gives a thorough discussion of these approaches, of their efficiency, of the realization oftransferability in both the single-use and the long-term ticketing use cases and of ways toimplement them efficiently.

    AB - At a high-level perspective, MATTHEW intends to enable new applications and services onmobile platforms using multiple roots of trust. In that respect, the privacy of users is consideredas being a critical asset and therefore MATTHEW considers this problem from the design phaseon. Dealing with multiple roots of trust enables the possibility of transfers of credentials fromone secure element to another. Of course, the meaning of the term credential may differdepending on the considered application. Therefore operating multiple roots of trust laysthe ground for a notion of mobility for credentials, which may be stored and used withindifferent secure elements as users interact with their devices in their daily life. This documentexplores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (UseCase 3) that aims at providing anonymity for tickets in public transport. The results arecompelling, as presented protocols allow for highly efficient ticket presentations. Moreover,it gives a thorough discussion of these approaches, of their efficiency, of the realization oftransferability in both the single-use and the long-term ticketing use cases and of ways toimplement them efficiently.

    KW - Multiple roots of trust

    KW - secure elements

    KW - credentials

    KW - privacy

    KW - ABCs

    M3 - Other report

    BT - MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

    PB - .

    ER -