Design and Implementation of the Idemix Anonymous Credential System

Anonymous credential systems allow [1-5] anonymous yet authenticated and accountable transactions between users and service providers. As such, they represent a powerful technique for protecting users' privacy when conducting Internet transactions. In this paper, we describe the design and implementation of an anonymous credential system based on the protocols developed by [6]. The system is based on new high-level primitives and interfaces allowing reasoning about the protocols while hiding their diversity and complexity. The prototype was realized in java. We demonstrate its use and some deployment issues with the description of an operational demonstration scenario.

References:
[1] D. Chaum, Commun. ACM 28, p. 1030, October 1985.
[2] D. Chaum and J.-H. Evertse, LNCS, vol. 263, p. 118 (Springer, 1987)
[3] L. Chen, LNCS, vol. 1029, p. 232 (Springer, 1995).
[4] I.B. Damgård, LNCS, vol. 403, 328 (Springer, 1990).
[5] A. Lysyanskaya et al., in LNCS, vol. 1758 (Springer, 1999).
[6] J. Camenisch and A. Lysyanskaya, LNCS, vol. 2045, p. 93 (Springer, 2001).

By: Jan Camenisch and Els van Herreweghen

Published in: Proceedings of the 9th ACM Conference on Computer and Communications Security. , ACM. , 21-30 in 2002

Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.

Questions about this service can be mailed to reports@us.ibm.com .