Share on Facebook Tweet on Twitter Share on LinkedIn Share by email
Anonymous Credentials

Anonymous credential systems allow users to authenticate themselves in a privacy-preserving manner. In a credential system, a user Alice can obtain credentials from an organization, and then at some later point, she can prove to the organization (or any other party) that she has been given appropriate credentials. In an anonymous credential system, she can do this without revealing anything else about her identity. In fact, we can even guarantee that if she uses her credential a second time, no one will be able to tell that the two interactions involved the same user.  Not only is it impossible to identify Alice; there will be no way anyone can trace Alice's transactions.

Our research has focused primarily on using new developments in proof systems (such as the pairing based constructions of Groth, Ostrovsky and Sahai) to design credential schemes which rely on weaker assumptions, allow users to perform a wider range of transactions anonymously, or prevent users from abusing their privileges.

External Visitors