By Joerg Abendroth, Souheil Bcheri, Norbert Götze,Vasiliki Liagkou, Monika Orski, Robert Seidl, Fatbardh Veseli

Download: PDF, Review Status: Not yet externally reviewed


ABC4Trust integrates different privacy-ABC Technologies to provide privacy protection in Internet communications. To evaluate the privacy-ABC Engine API, two pilots are implemented. The greater aim of ABC4Trust is to make privacy-ABC Technology useable for wide use, beyond the two pilots. This deliverable contributes to the greater aim by identifying and describing the common denominators of those pilots. The intended reader, a prospective company planning to utilize privacy-ABC Technology, gets an introduction how the two pilots use privacy-ABC technology, along with pointers to information. It also documents the overall hardware and network requirements for deploying the ABC technologies, using the pilots as examples. Additional remarks hopefully prove beneficial to define the roles and business models of prospective privacy-ABC technology users.

Executive Summary

The ABC4Trust project’s main objective is twofold: (i) the definition of a unified reference architecture for the systems deploying Privacy-enhancing Attribute-Based Credentials (Privacy-ABCs) and (ii) the development of an open reference implementation of a full system deploying Privacy-ABCs that will be integrated into two complete real pilot applications, providing feedback to the reference architecture and implementation results. These will be the first pilots of Privacy-ABC deployments in real application environments for collecting feedback.

This deliverable provides information for prospective users (e.g. application developers) of the Privacy-ABC technology. It references to the other deliverables in this project, to include less technical details, but explains the information to the readers that are in the process of deciding how to deploy Privacy-ABC technology within their scope of business.

Along with a brief introduction of the architecture for the two pilots and references to the relevant other deliverables, common denominator components are identified. The common denominators are reviewed with their relation to the existing state-of-art technologies and wider ecosystems. Prospective users can find remarks on how to successfully implement the role of a certain common denominator component as well as necessary network and hardware requirements.