Achtung:

Sie haben Javascript deaktiviert!
Sie haben versucht eine Funktion zu nutzen, die nur mit Javascript möglich ist. Um sämtliche Funktionalitäten unserer Internetseite zu nutzen, aktivieren Sie bitte Javascript in Ihrem Browser.

Info-Icon This content is not available in English
[Translate to English:] AG Codes und Kryptographie Show image information

[Translate to English:] AG Codes und Kryptographie

Project Group Re(AC)^t: Reputation and Anonymous Credentials for Access Control (t=2)

Topic

Usually, authentication (e.g., via user name and password) serves the purpose of establishing the exact identity of someone requesting access to something (e.g., access to credit card details). However, in many scenarios access should be granted to a group of people and it does not matter which member of the group requests access. For example, this may be the case for physical doors or for online subscription-based content. In these scenarios, it becomes interesting to look at more complex authentication schemes, where a user is even able to authenticate herself anonymously, i.e. as part of a larger group without revealing her own identity. 

Anonymous Credential Systems offer such functionality: some party issues credentials to users. The credentials may be used as a means of authentication. To authenticate, a user runs a cryptographic interactive (“zero-knowledge”) protocol where the only information revealed about her is possession of a credential (i.e. membership in the group of people with similar credentials).

In essence, this allows users to access restricted services without revealing personal information. This serves as protection against tracing a user's activity among multiple services and creating extensive profiles that violate our expectation of privacy.

In the project group, the main goal is to theoretically examine and practically implement an anonymous credential system (and a similar treatment for anonymous reputation systems compatible with the implemented credential system).

What we offer:

  • A meaningful project: We plan to publish the resulting software. Furthermore, it will be used for the SFB 901 testbed implementation of on-the-fly markets.
  • Challenging theoretical tasks in the field of cryptography: design and security proof of a complex scheme built upon digital signatures, zero-knowledge proof of knowledge protocols, secret sharing schemes, and other powerful primitives.
  • Challenging implementation tasks: design of nontrivial protocols and interfaces, implementation of security-critical systems, creating software support for powerful cryptographic primitives (e.g., implementing a compiler for declaratively defined cryptographic protocols), ...

As such, the project comprises interesting aspects for both the theoretically inclined and the students who enjoy working on implementation. Note that we expect every student to understand and work on the basic theoretical aspects of the implemented schemes. However, we explicitly encourage each participant to set a focus on theory, implementation, or a combination of those, depending on their inclination.

Results of the project group

Contact us if you have any questions

Prof. Dr. Johannes Blömer

Codes and Cryptography

Johannes Blömer
Phone:
+49 5251 60-6651
Fax:
+49 5251 60-6618
Office:
O4.258
Web:

Office hours:

Do, 11:00-12:00

Jan Bobolz

Codes and Cryptography

Jan Bobolz
Phone:
+49 5251 60-6654
Office:
O4.167
Web:

Dr. Fabian Eidens

Codes and Cryptography

Fabian Eidens
Phone:
+49 5251 60-6650
Fax:
+49 5251 60-6618
Office:
O4.164
Web:

The University for the Information Society