Credential-Authenticated Identification (CRYPTO'10)

Speaking at CRYPTO 2010 on Credential-Authenticated Identification and Key Exchange. The idea is that two parties authenticate each other based on fulfillment of property relations on their credentials, instead of a static PKI.

Image Gallery

CAID1 Overview of the protocol class CAID2 Examples of protocol types realized by CAID CAID3 Ideal functionality design CAID4 Strategy for the UC security proofs CAID5 Proof idea with split-functionality and separated authorization sets CAID6 Protocol for equality proofs

SlideShare Talk

(Needs JavaScript and Adobe Flash Player)