SlideShare uma empresa Scribd logo
1 de 15
Baixar para ler offline
Integrating Anonymous Credentials with eIDs
for Privacy-respecting Online Authentication
Ronny Bjones, Ioannis Krontiris, Pascal Paillier, Kai Rannenberg
10 October2012
Annual Privacy Forum - Limassol, Cyprus
Ioannis Krontiris
Goethe University Frankfurt
Overview
• Example of German eID
• Privacy problems
• Privacy-ABCs to the rescue
• Integration to the German eID system
• Privacy-ABCs on Smart Cards
2
eIDs in Europe
• A number of eIDs and qualified electronic signatures (QES)
already exist
– e-Government services
– Healthcare services
– Financial services
– Online shopping
3
The German e-ID system
Notice & Selective Disclosure
4
Security and Privacy Problems
• eID server knows all user transactions
The eID server traces and links all communications and transactions of
each user
• eID server knows all customers of the service provider
The eID server learns all customers trying to access a specific service
• User impersonation
Insiders can copy or alter user’s credentials and impersonate them to
services.
• Availability
Denial of service attacks against the eID server impacts all applications
using the service.
5
Moving Ahead
“As such, privacy-enhanced PKI technologies have significant
potential to enhance existing eID card privacy functions. Although
these technologies have been available for a long time, there has
not been much adoption in mainstream applications and eID card
implementations”
• the available technologies based on Privacy-ABCs use different terminology for
their features and even different cryptographic mechanisms to realize them
• the performance of Privacy-ABCs on smart cards (like eIDs) was poor and did not
allow practical deployment
• Privacy-ABCs are very complex and hard to understand for non-specialists
6
• Scheduled duration: November 2010 – October 2014
• Funding: The ABC4Trust project receives research funding from the
European Union's Seventh Framework Programme under grant agreement
n° 257782 as part of the “ICT Trust and Security Research” theme.
• Web Page: https://abc4trust.eu
7
ABC4Trust Objectives
8
• Abstraction of concepts of privacy-ABCs & unification of features
• A common unified architecture
 That is independent of the specific technologies
 Federation of privacy-ABC Systems based on different technologies
 Interoperability between different privacy-ABC technologies
 Avoid technology lock-in
 Raise trust in privacy-ABC technologies
• Reference implementations of the framework involving Smart Cards
• Deployments in large scale user-trials.
 University of Patras – Greece
 Norrtullskolan school – Sweden
ABC4Trust Interactions and Entities
9
Unlinkability (presentation)
Selective Disclosure
Unlinkability (multi-use)
• Privacy-ABCs are by default untraceable
IdSPs are not able to track and trace at which sites the user is presenting the
information
• Privacy-ABCs can be obtained in advance and stored
No real-time burden of the IdSP – better scalability
• User-binding
No credential pooling possible – Presentation requires proof of knowledge of a
secret key (stored on a secure device like SC)
• Unlimited number of pseudonyms supported
In addition to which, scope-exclusive pseudonyms can be imposed – user can
only register one pseudonym per scope (URL).
Advantages
10
German eID Integration
11
R. Bjones, “eParticipation Scenario Reference Guide”, Microsoft, Tech. Rep., October 2010
ABCs on Smart Cards
• ABCs are practical on smart cards
• We selected a contactless smart card chip with cryptoprocessor
• We found that, using precomputations (coupons):
– U-Prove can be made efficient
• Issuance < 260 ms
• Presentation 434 ms for 10 attributes
– Idemix can be made efficient
• Issuance 231 ms
• (less clear for presentation)
• Specification and development of the ABC4Trust card are now underway
12
Smart Card Architecture
1332-bit chip made available by Invia
• Protocol-level design choices
– Adapt data flow to minimize computations on the card's side
– Use delegation if neutral with respect to (crypto) security
– Store precomputed values as coupons
• Optimized implementations
– Boost point operations with best coordinate system (Jacobian, mixed,
Edwards, etc)
– Aggregate scalar multiplications to share intermediate variables
whenever possible
– Find optimal setting on the given model of computation (h/w
architecture)
14
Optimizing Performance
Thank you!
Ioannis Krontiris {ikrontiris@gmx.de},
Goethe University Frankfurt, Germany
15

Mais conteúdo relacionado

Mais procurados

Mais procurados (19)

Solving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine IntelligenceSolving Industrial Data Integration with Machine Intelligence
Solving Industrial Data Integration with Machine Intelligence
 
Scalable Identity Relationship Management
Scalable Identity Relationship ManagementScalable Identity Relationship Management
Scalable Identity Relationship Management
 
Edge intelligence slide share
Edge intelligence slide shareEdge intelligence slide share
Edge intelligence slide share
 
Data protection by design and by default on the blockchain
Data protection by design and by default on the blockchainData protection by design and by default on the blockchain
Data protection by design and by default on the blockchain
 
11th International Conference on Artificial Intelligence, Soft Computing and ...
11th International Conference on Artificial Intelligence, Soft Computing and ...11th International Conference on Artificial Intelligence, Soft Computing and ...
11th International Conference on Artificial Intelligence, Soft Computing and ...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Digital Forensics Projects Research Topics
Digital Forensics Projects Research TopicsDigital Forensics Projects Research Topics
Digital Forensics Projects Research Topics
 
Driving IT Transformation with Agile Analytics
Driving IT Transformation with Agile AnalyticsDriving IT Transformation with Agile Analytics
Driving IT Transformation with Agile Analytics
 
Ledger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à ToursLedger Meetup Bitcoin à Tours
Ledger Meetup Bitcoin à Tours
 
Industrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine LearningIndustrial Pioneers Days - Machine Learning
Industrial Pioneers Days - Machine Learning
 
Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...
 
6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...6th International Conference on Cryptography and Information Security (CRIS 2...
6th International Conference on Cryptography and Information Security (CRIS 2...
 
Call for Paper - 11th International Conference on Artificial Intelligence, So...
Call for Paper - 11th International Conference on Artificial Intelligence, So...Call for Paper - 11th International Conference on Artificial Intelligence, So...
Call for Paper - 11th International Conference on Artificial Intelligence, So...
 
The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar The Future of Tokens - Fran Strajnar
The Future of Tokens - Fran Strajnar
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
 
Harrison lsri blockchain 2017
Harrison lsri blockchain 2017Harrison lsri blockchain 2017
Harrison lsri blockchain 2017
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Blockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscapeBlockchanging the world - An overview of the blockchain academic landscape
Blockchanging the world - An overview of the blockchain academic landscape
 
Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...Call for Papers - 11th International Conference on Artificial Intelligence, S...
Call for Papers - 11th International Conference on Artificial Intelligence, S...
 

Semelhante a Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication

Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
Hai Nguyen
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
OKsystem
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
Ulf Mattsson
 

Semelhante a Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication (20)

ABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID SchemesABC4Trust Architecture and the Benefits for eID Schemes
ABC4Trust Architecture and the Benefits for eID Schemes
 
Vanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmapVanderhoof smartcard-roadmap
Vanderhoof smartcard-roadmap
 
Lesson 2
Lesson 2Lesson 2
Lesson 2
 
Trustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data ManagementTrustworthy Infrastructure for Personal Data Management
Trustworthy Infrastructure for Personal Data Management
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...Jun 15 privacy in the cloud at financial institutions at the object managemen...
Jun 15 privacy in the cloud at financial institutions at the object managemen...
 
Authentication and Privacy in Cloud
Authentication and Privacy in CloudAuthentication and Privacy in Cloud
Authentication and Privacy in Cloud
 
Multitel Cybersecurity Projects
Multitel Cybersecurity ProjectsMultitel Cybersecurity Projects
Multitel Cybersecurity Projects
 
Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?Encryption in industrial control systems; Is the juice worth the squeeze?
Encryption in industrial control systems; Is the juice worth the squeeze?
 
H2020 project WITDOM overview
H2020 project WITDOM overviewH2020 project WITDOM overview
H2020 project WITDOM overview
 
Data protection on premises, and in public and private clouds
Data protection on premises, and in public and private cloudsData protection on premises, and in public and private clouds
Data protection on premises, and in public and private clouds
 
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud ComputingSmart Cards & Devices Forum 2012 - Securing Cloud Computing
Smart Cards & Devices Forum 2012 - Securing Cloud Computing
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 
DLT analytics and AI workshop 13 march 2019
DLT analytics and AI workshop   13 march  2019DLT analytics and AI workshop   13 march  2019
DLT analytics and AI workshop 13 march 2019
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
IBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf MattssonIBM Share Conference 2010, Boston, Ulf Mattsson
IBM Share Conference 2010, Boston, Ulf Mattsson
 
Develop and/or Secure your IoT project, see how MU-Electronics can help you
Develop and/or Secure your IoT project, see how MU-Electronics can help youDevelop and/or Secure your IoT project, see how MU-Electronics can help you
Develop and/or Secure your IoT project, see how MU-Electronics can help you
 
Internet of things .pptx [repaired]
Internet of things .pptx [repaired]Internet of things .pptx [repaired]
Internet of things .pptx [repaired]
 
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow BalticsDSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
DSS Symantec PGP Encryption Fortress 2014 - ArrowECS - RoadShow Baltics
 
Minimizing Information Transparency
Minimizing Information TransparencyMinimizing Information Transparency
Minimizing Information Transparency
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Cyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdfCyberprint. Dark Pink Apt Group [EN].pdf
Cyberprint. Dark Pink Apt Group [EN].pdf
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 

Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication

  • 1. Integrating Anonymous Credentials with eIDs for Privacy-respecting Online Authentication Ronny Bjones, Ioannis Krontiris, Pascal Paillier, Kai Rannenberg 10 October2012 Annual Privacy Forum - Limassol, Cyprus Ioannis Krontiris Goethe University Frankfurt
  • 2. Overview • Example of German eID • Privacy problems • Privacy-ABCs to the rescue • Integration to the German eID system • Privacy-ABCs on Smart Cards 2
  • 3. eIDs in Europe • A number of eIDs and qualified electronic signatures (QES) already exist – e-Government services – Healthcare services – Financial services – Online shopping 3
  • 4. The German e-ID system Notice & Selective Disclosure 4
  • 5. Security and Privacy Problems • eID server knows all user transactions The eID server traces and links all communications and transactions of each user • eID server knows all customers of the service provider The eID server learns all customers trying to access a specific service • User impersonation Insiders can copy or alter user’s credentials and impersonate them to services. • Availability Denial of service attacks against the eID server impacts all applications using the service. 5
  • 6. Moving Ahead “As such, privacy-enhanced PKI technologies have significant potential to enhance existing eID card privacy functions. Although these technologies have been available for a long time, there has not been much adoption in mainstream applications and eID card implementations” • the available technologies based on Privacy-ABCs use different terminology for their features and even different cryptographic mechanisms to realize them • the performance of Privacy-ABCs on smart cards (like eIDs) was poor and did not allow practical deployment • Privacy-ABCs are very complex and hard to understand for non-specialists 6
  • 7. • Scheduled duration: November 2010 – October 2014 • Funding: The ABC4Trust project receives research funding from the European Union's Seventh Framework Programme under grant agreement n° 257782 as part of the “ICT Trust and Security Research” theme. • Web Page: https://abc4trust.eu 7
  • 8. ABC4Trust Objectives 8 • Abstraction of concepts of privacy-ABCs & unification of features • A common unified architecture  That is independent of the specific technologies  Federation of privacy-ABC Systems based on different technologies  Interoperability between different privacy-ABC technologies  Avoid technology lock-in  Raise trust in privacy-ABC technologies • Reference implementations of the framework involving Smart Cards • Deployments in large scale user-trials.  University of Patras – Greece  Norrtullskolan school – Sweden
  • 9. ABC4Trust Interactions and Entities 9 Unlinkability (presentation) Selective Disclosure Unlinkability (multi-use)
  • 10. • Privacy-ABCs are by default untraceable IdSPs are not able to track and trace at which sites the user is presenting the information • Privacy-ABCs can be obtained in advance and stored No real-time burden of the IdSP – better scalability • User-binding No credential pooling possible – Presentation requires proof of knowledge of a secret key (stored on a secure device like SC) • Unlimited number of pseudonyms supported In addition to which, scope-exclusive pseudonyms can be imposed – user can only register one pseudonym per scope (URL). Advantages 10
  • 11. German eID Integration 11 R. Bjones, “eParticipation Scenario Reference Guide”, Microsoft, Tech. Rep., October 2010
  • 12. ABCs on Smart Cards • ABCs are practical on smart cards • We selected a contactless smart card chip with cryptoprocessor • We found that, using precomputations (coupons): – U-Prove can be made efficient • Issuance < 260 ms • Presentation 434 ms for 10 attributes – Idemix can be made efficient • Issuance 231 ms • (less clear for presentation) • Specification and development of the ABC4Trust card are now underway 12
  • 13. Smart Card Architecture 1332-bit chip made available by Invia
  • 14. • Protocol-level design choices – Adapt data flow to minimize computations on the card's side – Use delegation if neutral with respect to (crypto) security – Store precomputed values as coupons • Optimized implementations – Boost point operations with best coordinate system (Jacobian, mixed, Edwards, etc) – Aggregate scalar multiplications to share intermediate variables whenever possible – Find optimal setting on the given model of computation (h/w architecture) 14 Optimizing Performance
  • 15. Thank you! Ioannis Krontiris {ikrontiris@gmx.de}, Goethe University Frankfurt, Germany 15