Limits to anonymity when using credentials

Andreas Pashalidis, Chris J. Mitchell, Bruce Christianson, Rebecca Wright, George Danezis, Tuomas Aura, Matt Blaze, Richard Claytol, Frank Stajano, Birgit Pfitzmann

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations


This paper identifies certain privacy threats that apply to anonymous credential systems. The focus is on timing attacks that apply even if the system is cryptographically secure. The paper provides some simple heuristics that aim to mitigate the exposure to the threats and identifies directions for further research.

Original languageEnglish (US)
Title of host publicationSecurity Protocols - 12th International Workshop, Revised Selected Papers
PublisherSpringer Verlag
Number of pages16
ISBN (Print)3540409254, 9783540409250
StatePublished - Jan 1 2006
Externally publishedYes
EventSecurity Protocols - 12th International Workshop, Revised Selected Papers - Cambridge, United Kingdom
Duration: Apr 26 2004Apr 28 2004

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume3957 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349


OtherSecurity Protocols - 12th International Workshop, Revised Selected Papers
CountryUnited Kingdom

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)


  • Anonymous credential systems
  • Privacy
  • Pseudonym systems
  • Timing attacks
  • Unlinkability

Fingerprint Dive into the research topics of 'Limits to anonymity when using credentials'. Together they form a unique fingerprint.

Cite this