. . "RIV/00216305:26220/14:PU110241!RIV15-MSM-26220___" . "[8C3AB26A87DB]" . "287"^^ . "T\u011Bthal, Ond\u0159ej" . "Hajn\u00FD, Jan" . "Springer-Verlag" . "2"^^ . . . "Access Control,Anonymity,Smart-Cards,Privacy,Attributes,Security,Cryptography"@en . . "Privacy-Friendly Access Control Based on Personal Attributes"@en . "3"^^ . . . . . . "Neuveden" . . "Proceedings of IWSEC 14" . "P(GP14-25298P), P(TA02011260), S" . "Malina, Luk\u00E1\u0161" . "26220" . . . . . "In attribute-based access control systems, the attribute ownership instead of identity is verified before an access to private services or areas is granted. This approach allows more privacy-friendly verification of users since only individual attributes (such as age, citizenship or ticket ownership) are disclosed to service providers, not the complete identity. Unfortunately, there are very few cryptographic systems allowing practical attribute-based access control system implementations. The lack of cryptographic schemes is caused by the fact that the good balance between privacy and accountability is very difficult to achieve. In this paper, the first implementation of the HM12 attribute-based scheme and a practical choice of its security parameters are presented. The cryptographic scheme is implemented on off-the-shelf hardware, namely on MultOS programmable smart-cards and, experimentally, on Android devices. Finally, the results from our pilot deployment of the access-control system and the obta" . . "2014-08-27+02:00"^^ . "RIV/00216305:26220/14:PU110241" . . . "978-3-319-09842-5" . . "Hirosaki" . "In attribute-based access control systems, the attribute ownership instead of identity is verified before an access to private services or areas is granted. This approach allows more privacy-friendly verification of users since only individual attributes (such as age, citizenship or ticket ownership) are disclosed to service providers, not the complete identity. Unfortunately, there are very few cryptographic systems allowing practical attribute-based access control system implementations. The lack of cryptographic schemes is caused by the fact that the good balance between privacy and accountability is very difficult to achieve. In this paper, the first implementation of the HM12 attribute-based scheme and a practical choice of its security parameters are presented. The cryptographic scheme is implemented on off-the-shelf hardware, namely on MultOS programmable smart-cards and, experimentally, on Android devices. Finally, the results from our pilot deployment of the access-control system and the obta"@en . "39638" . "Privacy-Friendly Access Control Based on Personal Attributes"@en . . "Privacy-Friendly Access Control Based on Personal Attributes" . "Privacy-Friendly Access Control Based on Personal Attributes" . . . .