%0 Conference Proceedings %T Concepts and Languages for Privacy-Preserving Attribute-Based Authentication %+ IBM Research [Zurich] %+ Microsoft Research %A Camenisch, Jan %A Dubovitskaya, Maria %A Lehmann, Anja %A Neven, Gregory %A Paquin, Christian %A Preiss, Franz-Stefan %Z Part 3: Session 2 - Anonymous Credentials %< avec comité de lecture %( IFIP Advances in Information and Communication Technology %B 3rd Policies and Research in Identity Management (IDMAN) %C London, United Kingdom %Y Simone Fischer-Hübner %Y Elisabeth Leeuw %Y Chris Mitchell %I Springer %3 Policies and Research in Identity Management %V AICT-396 %P 34-52 %8 2013-04-08 %D 2013 %R 10.1007/978-3-642-37282-7_4 %K Authentication %K privacy %K data-minimization %K anonymous credentials %K digital credentials %Z Computer Science [cs]Conference papers %X Existing cryptographic realizations of privacy-friendly authentication mechanisms such as anonymous credentials, minimal disclosure tokens, selfblindable credentials, and group signatures vary largely in the features they offer and in how these features are realized. Some features such as revocation or de-anonymization even require the combination of several cryptographic protocols. These differences and the complexity of the cryptographic protocols hinder the deployment of these mechanisms for practical applications and also make it almost impossible to switch the underlying cryptographic algorithms once the application has been designed. In this paper, we aim to overcome this issue and simplify both the design and deployment of privacy-friendly authentication mechanisms. We define and unify the concepts and features of privacy-preserving attribute-based credentials (Privacy-ABCs) and provide a language framework in XML schema. Our language framework enables application developers to use Privacy-ABCs with all their features without having to consider the specifics of the underlying cryptographic algorithms—similar to as they do today for digital signatures, where they do not need to worry about the particulars of the RSA and DSA algorithms either. %G English %Z TC 11 %Z WG 11.6 %2 https://inria.hal.science/hal-01470502/document %2 https://inria.hal.science/hal-01470502/file/978-3-642-37282-7_4_Chapter.pdf %L hal-01470502 %U https://inria.hal.science/hal-01470502 %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-WG %~ IFIP-TC11 %~ IFIP-WG11-6 %~ IFIP-AICT-396 %~ IFIP-IDMAN