MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

Christian Hanser, Martin Deutschmann

Research output: Book/ReportOther reportResearch

Abstract

At a high-level perspective, MATTHEW intends to enable new applications and services on
mobile platforms using multiple roots of trust. In that respect, the privacy of users is considered
as being a critical asset and therefore MATTHEW considers this problem from the design phase
on. Dealing with multiple roots of trust enables the possibility of transfers of credentials from
one secure element to another. Of course, the meaning of the term credential may differ
depending on the considered application. Therefore operating multiple roots of trust lays
the ground for a notion of mobility for credentials, which may be stored and used within
different secure elements as users interact with their devices in their daily life. This document
explores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,
how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (Use
Case 3) that aims at providing anonymity for tickets in public transport. The results are
compelling, as presented protocols allow for highly efficient ticket presentations. Moreover,
it gives a thorough discussion of these approaches, of their efficiency, of the realization of
transferability in both the single-use and the long-term ticketing use cases and of ways to
implement them efficiently.
Original languageEnglish
Publisher.
Number of pages49
Publication statusPublished - 2016

Keywords

  • Multiple roots of trust
  • secure elements
  • credentials
  • privacy
  • ABCs

Cite this

MATTHEW D2.2 Report on Privacy Algorithms and their Implementation. / Hanser, Christian; Deutschmann, Martin.

., 2016. 49 p.

Research output: Book/ReportOther reportResearch

Hanser, Christian ; Deutschmann, Martin. / MATTHEW D2.2 Report on Privacy Algorithms and their Implementation. ., 2016. 49 p.
@book{4d9551d5bd304d87977e9cc3599da030,
title = "MATTHEW D2.2 Report on Privacy Algorithms and their Implementation",
abstract = "At a high-level perspective, MATTHEW intends to enable new applications and services onmobile platforms using multiple roots of trust. In that respect, the privacy of users is consideredas being a critical asset and therefore MATTHEW considers this problem from the design phaseon. Dealing with multiple roots of trust enables the possibility of transfers of credentials fromone secure element to another. Of course, the meaning of the term credential may differdepending on the considered application. Therefore operating multiple roots of trust laysthe ground for a notion of mobility for credentials, which may be stored and used withindifferent secure elements as users interact with their devices in their daily life. This documentexplores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (UseCase 3) that aims at providing anonymity for tickets in public transport. The results arecompelling, as presented protocols allow for highly efficient ticket presentations. Moreover,it gives a thorough discussion of these approaches, of their efficiency, of the realization oftransferability in both the single-use and the long-term ticketing use cases and of ways toimplement them efficiently.",
keywords = "Multiple roots of trust, secure elements, credentials, privacy, ABCs",
author = "Christian Hanser and Martin Deutschmann",
year = "2016",
language = "English",
publisher = ".",

}

TY - BOOK

T1 - MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

AU - Hanser, Christian

AU - Deutschmann, Martin

PY - 2016

Y1 - 2016

N2 - At a high-level perspective, MATTHEW intends to enable new applications and services onmobile platforms using multiple roots of trust. In that respect, the privacy of users is consideredas being a critical asset and therefore MATTHEW considers this problem from the design phaseon. Dealing with multiple roots of trust enables the possibility of transfers of credentials fromone secure element to another. Of course, the meaning of the term credential may differdepending on the considered application. Therefore operating multiple roots of trust laysthe ground for a notion of mobility for credentials, which may be stored and used withindifferent secure elements as users interact with their devices in their daily life. This documentexplores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (UseCase 3) that aims at providing anonymity for tickets in public transport. The results arecompelling, as presented protocols allow for highly efficient ticket presentations. Moreover,it gives a thorough discussion of these approaches, of their efficiency, of the realization oftransferability in both the single-use and the long-term ticketing use cases and of ways toimplement them efficiently.

AB - At a high-level perspective, MATTHEW intends to enable new applications and services onmobile platforms using multiple roots of trust. In that respect, the privacy of users is consideredas being a critical asset and therefore MATTHEW considers this problem from the design phaseon. Dealing with multiple roots of trust enables the possibility of transfers of credentials fromone secure element to another. Of course, the meaning of the term credential may differdepending on the considered application. Therefore operating multiple roots of trust laysthe ground for a notion of mobility for credentials, which may be stored and used withindifferent secure elements as users interact with their devices in their daily life. This documentexplores privacy algorithms suitable for realizing the project’s goals. It considers, in particular,how attribute-based credentials (ABCs) help us realizing the advanced ticketing use case (UseCase 3) that aims at providing anonymity for tickets in public transport. The results arecompelling, as presented protocols allow for highly efficient ticket presentations. Moreover,it gives a thorough discussion of these approaches, of their efficiency, of the realization oftransferability in both the single-use and the long-term ticketing use cases and of ways toimplement them efficiently.

KW - Multiple roots of trust

KW - secure elements

KW - credentials

KW - privacy

KW - ABCs

M3 - Other report

BT - MATTHEW D2.2 Report on Privacy Algorithms and their Implementation

PB - .

ER -