Conclusion and Future Work

Chapter

Abstract

We compared two general approaches aiming to ensure non-transferability for anonymous credentials: biometric enforced non-transferability and non-transferability based on embedded valuable secrets. Not surprisingly, the weakest points are the biometric sensors and finding meaningful (valuable) secrets for the user. Both approaches are not able to ensure perfect non-transferability, but may be sufficient depending on the values to protect.

Keywords

Defend Extractor 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Springer Fachmedien Wiesbaden 2014

Authors and Affiliations

  1. 1.FB Informatik, LS 14TU DortmundDortmundGermany

Personalised recommendations