Publications

Year report

The first year report, including an overview of activities and a financial report, can be found below. As the foundation was established at the end of 2016 this report includes not only 2017 but also the last months of 2016.

IRMA academic publications

Below scientific publications are listed about the IRMA ecosystem, in reverse chronological order, mostly written by researchers from the Digital Security Group of Radboud University, Nijmegen. In addition, although they are not from Radboud University’s Digital Security Group, a number of publications Idemix (the cryptographic basis of IRMA) are included at the bottom of this page.

2019

  • José van Dijck and Bart Jacobs. Electronic identity services as sociotechnical and political-economic constructs, New Media and Society (NMS), 2019. doi

  • Ivar Derksen, Backup and Recovery of IRMA Credentials, Master thesis, Radboud University, 2019. pdf.

  • Brinda Hampiholi, Contextual Identity in Practice Attribute-based Authentication and Signing on Smartphones, PhD Thesis, Radboud University, 2019. pdf.

2017

  • Wouter Lueks. Security and Privacy via Cryptography. Having your cake and eating it too, PhD Thesis, Radboud University, 2017. pdf.

  • Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, Bart Jacobs, Wouter Lueks, and Sietse Ringers. IRMA: practical, decentralized and privacy-friendly identity management using smartphones. 10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017), Minneapolis, USA, 2017. Paper and Video.

  • Brinda Hampiholi and Gergely Alpár. Privacy-preserving webshopping with attributes. IEEE Symposium on Privacy-Aware Computing (IEEE PAC 2017), Washington DC, USA, 2017. Paper.

  • Wouter Lueks, Gergely Alpár, Jaap-Henk Hoepman, Pim Vullers: Fast revocation of attribute-based credentials for both users and verifiers. Computers & Security 67, 2017, p.308-323. Official version.

2016

  • Fabian van den Broek, Brinda Hampiholi, Bart Jacobs, Securely derived identity credentials on smart phones via self-enrolment. In: G. Barthe and E. Markatos and P. Samarati (eds.), 12th International Workshop on Security and Trust Management (STM 2016), Springer LNCS 9871, 2016, p.106-121. Paper.

  • Gergely Alpár Lejla Batina, Lynn Batten, Veelasha Moonsamy, Anna Krasnova, Antoine Guellier, Iynkaran Natgunanathan. New Directions in IoT Privacy Using Attribute-Based Authentication - Position Paper. 1st ACM Workshop on Malicious Software and Hardware in Internet of Things (MAL-IoT 2016), Italy, 2016. Official version and local copy.

  • Sietse Ringers, Quantization using Jet Space Geometry and Identity Management using Credential Schemes, PhD Thesis, Groningen University, 2015. pdf.

2015

  • Brinda Hampiholi, Gergely Alpár, Fabian van den Broek, and Bart Jacobs. Towards practical Attribute-Based Signatures. In: R.S. CHakraborty and P. Schwabe and J. Solworth (eds), Proceedings of the Fifth International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2015), Jaipur, India, Springer LNCS 9354, 2015, p.310-328. Paper.

  • Antonio de la Piedra. 2015. Efficient Implementation of AND, OR and NOT Operators for ABCs. In Revised Selected Papers of the 7th International Conference on Trusted Systems - Volume 9565 (INTRUST 2015), Moti Yung, Jianbiao Zhang, and Zhen Yang (Eds.), Springer LNCS 9565, 2015, p.183-199. Paper

  • Gergely Alpár, Attribute-Based Identity Management, PhD Thesis, Radboud University, 2015. pdf.

2014

  • Antonio de la Piedra, Jaap-Henk Hoepman, and Pim Vullers. 2014. Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards. In Proceedings of the 13th International Conference on Cryptology and Network Security - Volume 8813, Dimitris Gritzalis, Aggelos Kiayias, and Ioannis Askoxylakis (Eds.), Springer LNCS 8813, p.270-289. Paper

  • Pim Vullers, Efficient Implementations of Attribute-based Credentials on Smart Cards, PhD Thesis, Radboud University, 2014. pdf.

  • Merel Koning, Paulan Korenhof, Gergely Alpár and Jaap-Henk Hoepman. The ABCs of ABCs: an analysis of attribute-based credentials in the light of data protection, privacy and identity. Version of Internet, Law and Politics 2014 conference, and Version from HotPETS 2014 symposium.

2013

  • Gergely Alpár and Bart Jacobs. Credential Design in Attribute-Based Identity Management. In Ronald Leenes and Eleni Kosta, editors, Bridging distances in technology and regulation, p.189-204, 3rd TILTing Perspectives Conference, Tilburg, NL, April 25-26, 2013. Paper and Presentation.

  • Pim Vullers and Gergely Alpár. Efficient Selective Disclosure on Smart Cards using Idemix. In Chris Mitchell et al., editor, IFIP IDMAN. Springer Science and Business Media, 2013, p.53-61. Paper and Presentation.

  • Gergely Alpár and Jaap-Henk Hoepman. A Secure Channel for Attribute-Based Credentials. Proceedings of the 2013 ACM Workshop on Digital Identity Management (DIM 2013), Berlin, Germany, November 8, 2013, p.13-18. Short paper and associated Presentation.

  • Bart Jacobs. Wat ben je?. In M. Geels and T. van Opijnen, editors, Nederland in Ideeën, Maven Publishing, 2013, p.261-264. Book chapter in Dutch.

2011

  • Wojciech Mostowski and Pim Vullers. Efficient U-Prove implementation for anonymous credentials on smart cards. In George Kesidis and Haining Wang, editors, SecureComm 2011, volume 96 of Springer LNICST, 2011, p.243-260. Paper.

2010

  • Lejla Batina, Jaap-Henk Hoepman, Bart Jacobs, Wojciech Mostowski, and Pim Vullers. Developing efficient blinded attribute certificates on smart cards via pairings. In: D. Gollmann and J.-L. Lanet, editors, Smart Card Research and Advanced Applications, 9th IFIP WG 8.8/11.2 International Conference, CARDIS 2010, Springer LNCS 6035, p.209-222. Paper.

2009

  • Hendrik Tews and Bart Jacobs, Performance issues of Selective Disclosure and Blinded Issuing Protocols on Java Card. In: O. Markowitch et al., Information Security Theory and Practice. Springer LNCS 5746, 2009, p.95-111. Paper.

Idemix

  • Jan Camenisch and Anna Lysyanskaya. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation. In: Advances in Cryptology — EUROCRYPT 2001, B. Pfitzmann, editor, LNCS 2045, Springer Berlin Heidelberg, 2001. ePrint

  • IBM. Specification of the Identity Mixer Cryptographic Library (Revised version 2.3.0). Link.

  • Gergely Alpár. Cryptography fact sheet about Idemix’s basic proof techniques. PDF