G. Alpár and J. Hoepman, A Secure Channel for Attribute-based Credentials, Proceedings of the 2013 ACM Workshop on Digital Identity Management, DIM '13, pp.13-18, 2013.

G. Alpár and B. Jacobs, Credential design in attribute-based identity management, Bridging distances in technology and regulation, 3rd TILTing Perspectives Conference, pp.189-204, 2013.

P. Bichsel, J. Camenisch, T. Groß, and V. Shoup, Anonymous Credentials on a Standard Java Card, Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09, pp.600-610, 2009.

, Bichsel and others. An Architecture for Privacy-ABCs, Attribute-based Credentials for Trust, pp.11-78, 2015.

R. Bjones, I. Krontiris, P. Paillier, and K. Rannenberg, Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication, Privacy Technologies and Policy, pp.111-124, 2012.

J. Camenisch, A. Lehmann, and G. Neven, Electronic identities need private credentials, IEEE Security & Privacy, vol.10, issue.1, pp.80-83, 2012.

J. Camenisch and A. Lysyanskaya, An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, Advances in Cryptology-EUROCRYPT, 2001.

J. Camenisch and A. Lysyanskaya, A signature scheme with efficient protocols, International Conference on Security in Communication Networks, pp.268-289, 2002.

. Fido-alliance, FIDO UAF Protocol Specification v1, vol.1, 2017.

. Globalplatform, Card Specification v2, vol.3, 2015.

J. Hajny and L. Malina, Unlinkable Attribute-Based Credentials with Practical Revocation on Smart-Cards, Smart Card Research and Advanced Applications, pp.62-76, 2012.

M. Hölzl, R. Mayrhofer, and M. Roland, Requirements for an Open Ecosystem for Embedded Tamper Resistant Hardware on Mobile Devices, Proceedings of International Conference on Advances in Mobile Computing & Multimedia, MoMM '13, pp.249-252, 2013.

M. Hölzl, M. Roland, and R. Mayrhofer, Real-World Identification: Towards a Privacy-Aware Mobile eID for Physical and Offline Verification, Proceedings of the 14th International Conference on Advances in Mobile Computing and Multimedia, MoMM '16, pp.280-283, 2016.

. Ibm-research, Specification of the Identity Mixer Cryptographic Library, 2010.

J. L. Jensen, Smartphone feasibility analysis. Deliverable D4, vol.4, 2014.

A. Lehmann, Survey and Analysis of Existing eID and Credential Systems, FutureID Deliverable D32.1, 2013.

G. Madlmayr, J. Langer, C. Kantner, and J. Scharinger, NFC Devices: Security and Privacy, Third International Conference on Availability, Reliability and Security (ARES'08), pp.642-647, 2008.

T. Nyman, J. Ekberg, and N. Asokan, Citizen electronic identities using TPM 2.0, Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, pp.37-48, 2014.

F. Otterbein, T. Ohlendorf, and M. Margraf, Extended Abstract for Presentation at the 11th Int, IFIP Summer School on Privacy and Identity Management, 2016.

C. Paquin, U-prove technology overview v1, vol.1, 2013.

K. Rannenberg, J. Camenisch, and A. Sabouri, Attribute-based Credentials for Trust-Identity in the Information Society, 2015.

V. Shoup, A proposal for an ISO standard for public key encryption (version 2.1). IACR E-Print Archive 112, 2001.

P. Vullers and G. Alpár, Efficient Selective Disclosure on Smart Cards Using Idemix, Policies and Research in Identity Management (IDMAN), pp.53-67, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01470503