. Eu-commission, on electronic identification and trust services for electronic transactions in the internal market and repealing Directive, Regulation, vol.2393, issue.910, p.73114, 1999.

D. Chaum, Security without identification: transaction systems to make big brother obsolete, Communications of the ACM, vol.28, issue.10, pp.1030-1044, 1985.
DOI : 10.1145/4372.4373

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

Z. Benenson, A. Girard, and I. Krontiris, User acceptance factors for anonymous credentials: An empirical investigation, Proc. of the Workshop on the Economics of Information Security (WEIS), 2015.

P. Bichsel, C. Binding, J. Camenisch, T. Gross, T. Heydt-benjamin et al., Cryptographic Protocols of the Identity Mixer Library, IBM Research GmbH, 2008.

J. Camenisch, M. Dubovitskaya, A. Lehmann, G. Neven, C. Paquin et al., Concepts and Languages for Privacy-Preserving Attribute-Based Authentication, IDMAN, pp.34-52, 2013.
DOI : 10.1016/j.jisa.2014.03.004

URL : https://hal.archives-ouvertes.fr/hal-01470502

P. Bichsel, J. Camenisch, T. Groß, and V. Shoup, Anonymous credentials on a standard java card, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp.600-610, 2009.
DOI : 10.1145/1653662.1653734

M. Sterckx, B. Gierlichs, B. Preneel, and I. Verbauwhede, Efficient implementation of anonymous credentials on Java Card smart cards, 2009 First IEEE International Workshop on Information Forensics and Security (WIFS), pp.106-110, 2009.
DOI : 10.1109/WIFS.2009.5386474

URL : https://www.cosic.esat.kuleuven.be/publications/article-1296.pdf

J. Camenisch and T. Groß, Efficient attributes for anonymous credentials (extended version) IACR Cryptology ePrint Archive, p.496, 2010.
DOI : 10.1145/1455770.1455814

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

J. Camenisch and A. Lysyanskaya, A Signature Scheme with Efficient Protocols, Proceedings of the 3rd International Conference on Security in Communication Networks, pp.268-289, 2003.
DOI : 10.1007/3-540-36413-7_20

F. Baldimtsi and A. Lysyanskaya, Anonymous credentials light, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, pp.1087-1098, 2013.
DOI : 10.1145/2508859.2516687

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

M. Chase and G. Zaverucha, MAC Schemes with Efficient Protocols and Keyed-Verification Anonymous Credentials, 2013.
DOI : 10.1145/2660267.2660328

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

L. Batina, J. Hoepman, B. Jacobs, W. Mostowski, and P. Vullers, Developing Efficient Blinded Attribute Certificates on Smart Cards via Pairings, Smart Card Research and Advanced Application, 9th IFIP WG 8.8/11.2 International Conference Proceedings , volume 6035 of Lecture Notes in Computer Science, pp.209-222, 2010.
DOI : 10.1007/978-3-642-12510-2_15

URL : https://hal.archives-ouvertes.fr/hal-01056105

W. Mostowski and P. Vullers, Efficient U-Prove Implementation for Anonymous Credentials on Smart Cards, Security and Privacy in Communication Networks -7th International ICST Conference of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, pp.243-260, 2011.
DOI : 10.1007/3-540-45682-1_31

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

P. Vullers and G. Alpar, Efficient Selective Disclosure on Smart Cards Using Idemix, IDMAN, pp.53-67, 2013.
DOI : 10.1007/978-3-642-37282-7_5

URL : https://hal.archives-ouvertes.fr/hal-01470503

L. Antonio-de, J. Piedra, P. Hoepman, and . Vullers, Towards a fullfeatured implementation of attribute based credentials on smart cards, Cryptology and Network Security, pp.270-289, 2014.

F. Veseli and J. Serna-olvera, Benchmarking Privacy-ABC Technologies - An Evaluation of Storage and Communication Efficiency, 2015 IEEE World Congress on Services, pp.198-205, 2015.
DOI : 10.1109/SERVICES.2015.37

C. Paquin and G. Zaverucha, U-Prove Cryptographic Specification v1, 2013.

F. Veseli, T. Vateva-gurova, I. Krontiris, K. Rannenberg, and N. Suri, Towards a Framework for Benchmarking Privacy-ABC Technologies, ICT Systems Security and Privacy Protection IFIP Advances in Information and Communication Technology, pp.197-204, 2014.
DOI : 10.1007/978-3-642-55415-5_16

URL : https://hal.archives-ouvertes.fr/hal-01370365

S. A. Brands, Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy, 2000.

J. Camenisch and A. Lysyanskaya, Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials, Advances in Cryptology, CRYPTO 2002, pp.61-76, 2002.
DOI : 10.1007/3-540-45708-9_5

J. Camenisch and V. Shoup, Practical Verifiable Encryption and Decryption of Discrete Logarithms, Advances in Cryptology -CRYPTO 2003, pp.126-144, 2003.
DOI : 10.1007/978-3-540-45146-4_8

G. Persiano and I. Visconti, Financial Cryptography: 8th International Conference Revised Papers, chapter An Efficient and Usable Multi-show Non-transferable Anonymous Credential System, pp.196-211, 2004.
DOI : 10.1007/978-3-540-27809-2_21

E. Commission, Horizon 2020 ? work programme 2014-2015 -g. technology readiness levels (trl). https://ec.europa, 1415.

P. Bichsel, J. Camenisch, M. Dubovitskaya, R. Enderlein, S. Krenn et al., D2.2 Architecture for Attribute-based Credential Technologies -Final Version Available online at https, 2014.

A. Pilots, Abc4trust pilots. https://abc4trust

D. Fred and . Davis, User acceptance of information technology: system characteristics, user perceptions and behavioral impacts, International Journal of ManMachine Studies, vol.38, pp.475-487, 1993.

J. Lindstrom and J. , D4.4 smartphone feasibility analysis, 2014.

M. Blaze, G. Bleumer, and M. Strauss, Divertible protocols and atomic proxy cryptography, Advances in Cryptology -EURO- CRYPT'98, pp.127-144, 1998.
DOI : 10.1007/BFb0054122

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=

N. Smart and E. D. Spa, 20 ECRYPT II yearly report on algorithms and keysizes (2011-2012), European Network of Excellence in Cryptology II, 2012.

C. Flavián and M. Guinalíu, Consumer trust, perceived security and privacy policy, Industrial Management & Data Systems, vol.106, issue.5, pp.601-620, 2006.
DOI : 10.1108/02635570610666403

M. J. Metzger, Privacy, Trust, and Disclosure: Exploring Barriers to Electronic Commerce, Journal of Computer-Mediated Communication, vol.27, issue.3, pp.0-00, 2004.
DOI : 10.1111/j.1083-6101.2004.tb00292.x

F. Veseli, D. M. Schallaboeck, and K. Ioannis, D8.12 Architecture for Standardization V2. ABC4TRUST project deliverable, 2014. Available online at https