Conclusion and Future Work
We compared two general approaches aiming to ensure non-transferability for anonymous credentials: biometric enforced non-transferability and non-transferability based on embedded valuable secrets. Not surprisingly, the weakest points are the biometric sensors and finding meaningful (valuable) secrets for the user. Both approaches are not able to ensure perfect non-transferability, but may be sufficient depending on the values to protect.
KeywordsVenture Capital Application Programming Interface Elliptic Curve Cryptography Covert Channel False Rejection Rate
Unable to display preview. Download preview PDF.