Cyber Security (CYBER); A Verifiable Credentials extension using Attribute-Based Encryption
ETSI TS 103 964 V1.1.1
Organization:
ETSI - European Telecommunications Standards Institute
Year: 2025
ETSI - European Telecommunications Standards Institute
Subject: access control
Collections
:
-
Statistics
Cyber Security (CYBER); A Verifiable Credentials extension using Attribute-Based Encryption
Show full item record
| contributor author | ETSI - European Telecommunications Standards Institute | |
| date accessioned | 2025-09-30T23:00:28Z | |
| date available | 2025-09-30T23:00:28Z | |
| date copyright | 2025.02 | |
| date issued | 2025 | |
| identifier other | ts_103964v010101p.pdf | |
| identifier uri | http://yse.yabesh.ir/std;jsessioutho4703177793325273135A68A10958014A0Fa/handle/yse/347702 | |
| language | English | |
| publisher | ETSI - European Telecommunications Standards Institute | |
| title | Cyber Security (CYBER); A Verifiable Credentials extension using Attribute-Based Encryption | en |
| title | ETSI TS 103 964 V1.1.1 | num |
| type | standard | |
| page | 39 | |
| status | Published | |
| tree | ETSI - European Telecommunications Standards Institute:;2025 | |
| contenttype | fulltext | |
| subject keywords | access control | |
| subject keywords | CONFIDENTIALITY | |
| subject keywords | PORTABILITY | |
| subject keywords | privacy | |
| scope | W3C “Verifiable Credentials†(VCs) is an open standard for digital credentials. A verifiable credential is a tamper-evident credential with authorship that can be cryptographically verified. The W3C standard intentionally does not specify a single verification (“proof†) method, but expects several methods to mature independently and become standardized in time. To guarantee interoperability, W3C maintains a registry of proof mechanisms (including several “experimental†ones) known as Verifiable Credentials Extension Registry. This work item will define a new proof method via a challenge-response authentication protocol based on Ciphertext Policy Attribute-Based Encryption (CP-ABE). In this proof method, CP-ABE keys encode attributes, while the expressiveness of CP-ABE policies enables their selective disclosure and/or proof of predicates over them. Relationship with existing “Zero Knowledge Proof†methods will be highlighted. |

درباره ما