As we are transforming into a digital society, it is vital that we protect our data in all of our transactions. This requires that transactions are securely authenticated, and that we protect privacy by not revealing more about ourselves than necessary. Anonymous credentials promise to address both of these seemingly opposing requirements at the same time. Anonymous credentials are essentially a privacy-enhancing public-key infrastructure which require standardization to be widely used. Anonymous credential systems are far more complex than ordinary signature schemes since they provide more functionality in order to address all of the requirements of a public-key infrastructure with privacy protection. Unfortunately, the descriptions of these features are spread over many research papers and it is often not clear how they could all be securely integrated into a single system. This paper describes the Identity Mixer anonymous credential system that integrates cryptographic techniques from many sources to build an anonymous credential system with a rich feature set. The aim of this paper is to stimulate standardization efforts towards a privacy-enhancing public-key infrastructure.
*The first version of this Research Report was entitled "Cryptographic Protocols of the Identity Mixer Library"
**Correspondence should be addressed to Jan Camenisch, firstname.lastname@example.org
Revised version 2.3.0 of RZ Report: April 29, 2010
By: Security Team**, Computer Science Department, IBM Research - Zurich, 8803 Rüschlikon, Switzerland
Published in: RZ3730 in 2009
LIMITED DISTRIBUTION NOTICE:
This Research Report is available. This report has been submitted for publication outside of IBM and will probably be copyrighted if accepted for publication. It has been issued as a Research Report for early dissemination of its contents. In view of the transfer of copyright to the outside publisher, its distribution outside of IBM prior to publication should be limited to peer communications and specific requests. After outside publication, requests should be filled only by reprints or legally obtained copies of the article (e.g., payment of royalties). I have read and understand this notice and am a member of the scientific community outside or inside of IBM seeking a single copy only.
Questions about this service can be mailed to email@example.com .