Paper 2024/1552
Revisiting Keyed-Verification Anonymous Credentials
Abstract
Keyed-verification anonymous credentials (KVACs) have demonstrated their practicality through large-scale deployments in privacy-critical systems like Signal and Tor. Despite their widespread adoption, the theoretical framework underlying KVACs lacks the flexibility needed to support diverse applications, which in general require different security properties. For instance, rate-limiting credentials only need a weaker unforgeability notion (one-more unforgeability), yet the framework cannot easily accommodate this relaxation. Similarly, identity-based applications require stronger properties than unforgeability -—specifically, extractability for security proofs when adversaries can observe other users' credentials.
In this work, we address these limitations, introducing new notions of extractability and one-more unforgeability. We improve two foundational works in the space:
- The scheme by Chase et al. (CCS 2014), commonly referred to as CMZ or PS MAC can be made statistically anonymous, and issuance cost reduced from
Note: Preprint. Update presentation and layout. Fix of a minor bug affecting unforgeability of uCMZ with a message = 0.
Metadata
- Available format(s)
-
PDF
- Category
- Cryptographic protocols
- Publication info
- Preprint.
- Keywords
- Algebraic MACsKeyed-Verification Anonymous CredentialsAnonymous Tokens
- Contact author(s)
- m @ orru net
- History
- 2025-02-24: revised
- 2024-10-03: received
- See all versions
- Short URL
- https://ia.cr/2024/1552
- License
-
CC0
BibTeX
@misc{cryptoeprint:2024/1552, author = {Michele Orrù}, title = {Revisiting Keyed-Verification Anonymous Credentials}, howpublished = {Cryptology {ePrint} Archive, Paper 2024/1552}, year = {2024}, url = {https://eprint.iacr.org/2024/1552} }