{"id":"https://openalex.org/W3214556590","doi":"https://doi.org/10.1145/3460120.3484582","title":"With a Little Help from My Friends","display_name":"With a Little Help from My Friends","publication_year":2021,"publication_date":"2021-11-12","ids":{"openalex":"https://openalex.org/W3214556590","doi":"https://doi.org/10.1145/3460120.3484582","mag":"3214556590"},"language":"en","primary_location":{"id":"doi:10.1145/3460120.3484582","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484582","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5020544957","display_name":"Lucjan Hanzlik","orcid":"https://orcid.org/0009-0006-1941-693X"},"institutions":[{"id":"https://openalex.org/I4210128801","display_name":"Helmholtz Center for Information Security","ror":"https://ror.org/02njgxr09","country_code":"DE","type":"facility","lineage":["https://openalex.org/I1305996414","https://openalex.org/I4210128801"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Lucjan Hanzlik","raw_affiliation_strings":["CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany"],"affiliations":[{"raw_affiliation_string":"CISPA Helmholtz Center for Information Security, Saarbr\u00fccken, Germany","institution_ids":["https://openalex.org/I4210128801"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5044774496","display_name":"Daniel Slamanig","orcid":"https://orcid.org/0000-0002-4181-2561"},"institutions":[{"id":"https://openalex.org/I132118926","display_name":"Austrian Institute of Technology","ror":"https://ror.org/04knbh022","country_code":"AT","type":"facility","lineage":["https://openalex.org/I132118926"]}],"countries":["AT"],"is_corresponding":false,"raw_author_name":"Daniel Slamanig","raw_affiliation_strings":["AIT Austrian Institute of Technology, Vienna, Austria"],"affiliations":[{"raw_affiliation_string":"AIT Austrian Institute of Technology, Vienna, Austria","institution_ids":["https://openalex.org/I132118926"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5020544957"],"corresponding_institution_ids":["https://openalex.org/I4210128801"],"apc_list":null,"apc_paid":null,"fwci":4.0596,"has_fulltext":false,"cited_by_count":50,"citation_normalized_percentile":{"value":0.94856448,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":100},"biblio":{"volume":null,"issue":null,"first_page":"2004","last_page":"2023"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/credential","display_name":"Credential","score":0.9549833536148071},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7348037958145142},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6878437995910645},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5994232892990112},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.5855971574783325},{"id":"https://openalex.org/keywords/smart-card","display_name":"Smart card","score":0.55886310338974},{"id":"https://openalex.org/keywords/authentication","display_name":"Authentication (law)","score":0.5341944098472595},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.4449053108692169},{"id":"https://openalex.org/keywords/possession","display_name":"Possession (linguistics)","score":0.4413755238056183},{"id":"https://openalex.org/keywords/digital-identity","display_name":"Digital identity","score":0.4363243579864502},{"id":"https://openalex.org/keywords/access-control","display_name":"Access control","score":0.15114179253578186}],"concepts":[{"id":"https://openalex.org/C2777810591","wikidata":"https://www.wikidata.org/wiki/Q16861606","display_name":"Credential","level":2,"score":0.9549833536148071},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7348037958145142},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6878437995910645},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5994232892990112},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.5855971574783325},{"id":"https://openalex.org/C110406131","wikidata":"https://www.wikidata.org/wiki/Q41349","display_name":"Smart card","level":2,"score":0.55886310338974},{"id":"https://openalex.org/C148417208","wikidata":"https://www.wikidata.org/wiki/Q4825882","display_name":"Authentication (law)","level":2,"score":0.5341944098472595},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.4449053108692169},{"id":"https://openalex.org/C2780193096","wikidata":"https://www.wikidata.org/wiki/Q3543662","display_name":"Possession (linguistics)","level":2,"score":0.4413755238056183},{"id":"https://openalex.org/C2779813694","wikidata":"https://www.wikidata.org/wiki/Q528053","display_name":"Digital identity","level":3,"score":0.4363243579864502},{"id":"https://openalex.org/C527821871","wikidata":"https://www.wikidata.org/wiki/Q228502","display_name":"Access control","level":2,"score":0.15114179253578186},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3460120.3484582","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3460120.3484582","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":33,"referenced_works":["https://openalex.org/W796855099","https://openalex.org/W1011606778","https://openalex.org/W1610688607","https://openalex.org/W1877240378","https://openalex.org/W1888254701","https://openalex.org/W1993920884","https://openalex.org/W2002405332","https://openalex.org/W2052267638","https://openalex.org/W2094557617","https://openalex.org/W2097595927","https://openalex.org/W2112876561","https://openalex.org/W2131559681","https://openalex.org/W2144370861","https://openalex.org/W2296446397","https://openalex.org/W2400148870","https://openalex.org/W2460091916","https://openalex.org/W2504485978","https://openalex.org/W2520959274","https://openalex.org/W2606810880","https://openalex.org/W2770534787","https://openalex.org/W2789397092","https://openalex.org/W2792310864","https://openalex.org/W2800652629","https://openalex.org/W2933382925","https://openalex.org/W2964250737","https://openalex.org/W2989613683","https://openalex.org/W3023180901","https://openalex.org/W3033697620","https://openalex.org/W3045598771","https://openalex.org/W3109364115","https://openalex.org/W4243552011","https://openalex.org/W6663467400","https://openalex.org/W6724144381"],"related_works":["https://openalex.org/W2966552921","https://openalex.org/W2113854174","https://openalex.org/W2188206666","https://openalex.org/W2149092448","https://openalex.org/W2189438793","https://openalex.org/W2127459648","https://openalex.org/W2397530682","https://openalex.org/W1518661087","https://openalex.org/W2562586545","https://openalex.org/W2026482750"],"abstract_inverted_index":{"Anonymous":[0],"credentials":[1,88],"(ACs)":[2],"are":[3,108],"a":[4,44,57],"powerful":[5],"cryptographic":[6],"tool":[7],"for":[8,18,29],"the":[9,85,95],"secure":[10],"use":[11],"of":[12,22,31,40,60,67,87,94,111,113],"digital":[13],"services,":[14],"when":[15],"simultaneously":[16],"aiming":[17],"strong":[19,26],"privacy":[20],"guarantees":[21,28],"users":[23,35],"combined":[24],"with":[25,74,91],"authentication":[27],"providers":[30],"services.":[32],"They":[33],"allow":[34],"to":[36],"selectively":[37],"prove":[38],"possession":[39],"attributes":[41],"encoded":[42],"in":[43,104],"credential":[45],"without":[46],"revealing":[47],"any":[48],"other":[49],"meaningful":[50],"information":[51],"about":[52],"themselves.":[53],"While":[54],"there":[55],"is":[56],"significant":[58],"body":[59],"research":[61],"on":[62],"AC":[63,114,118],"systems,":[64],"modern":[65],"use-cases":[66],"ACs":[68],"such":[69,100],"as":[70,101],"mobile":[71],"applications":[72],"come":[73],"various":[75],"requirements":[76],"not":[77],"sufficiently":[78],"considered":[79,123],"so":[80,129],"far.":[81,130],"These":[82],"include":[83],"preventing":[84],"sharing":[86],"and":[89],"coping":[90],"resource":[92],"constraints":[93],"platforms":[96],"(e.g.,":[97],"smart":[98],"cards":[99,103],"SIM":[102],"smartphones).":[105],"Such":[106],"aspects":[107],"typically":[109],"out":[110],"scope":[112],"constructions,":[115],"and,":[116],"thus":[117],"systems":[119],"that":[120],"can":[121],"be":[122],"entirely":[124],"practical":[125],"have":[126],"been":[127],"elusive":[128]},"counts_by_year":[{"year":2026,"cited_by_count":4},{"year":2025,"cited_by_count":17},{"year":2024,"cited_by_count":11},{"year":2023,"cited_by_count":13},{"year":2022,"cited_by_count":5}],"updated_date":"2026-04-16T08:26:57.006410","created_date":"2025-10-10T00:00:00"}
