Abstract
The increasing use of digital credentials undermines the owner’s privacy. Anonymous credentials offer a powerful means to improve this. However, more is needed w.r.t. usability. A user will indeed have to manage dozens of credentials in the future: sporting club credentials, a digital driving license, e-tickets, etc. The owner will want to use these anytime at any place. The credentials must remain manageable as well and, in case of theft or loss, they must become unusable by others and recoverable by the legitimate owner. A possible solution based on smart card or SIM tokens is presented, in which user privacy is maximized. An evaluation reveals both strengths and future challenges.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Entrust authority roaming server. http://www.entrust.com/pki/roaming/index.htm.
Higgins trust framework project home. http://www.eclipse.org/higgins/.
Introducing windows cardspace. http://msdn2.microsoft.com/en-us/library/aa480189.aspx.
Liberty allicance project. http://www.projectliberty.org/.
Verisign roaming. http://www.verisign.com/products-services/security-services/pki/pkisecurity/ wireless-roaming/index.html.
J. Basney, W. Yurcik, R. Bonilla, and A. Slagell. The credential wallet: A classification of credential repositories highlighting myproxy. In Proceedings of the 31st Research Conference on Communication, Information and Internet Policy, 2003.
Stefan A. Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, Cambridge, MA, USA, 2000.
Jan Camenisch and Anna Lysyanskaya. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In EUROCRYPT ’01: Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, pages 93–118, London, UK, 2001. Springer-Verlag.
Jan Camenisch and Markus Stadler. Efficient group signature schemes for large groups (extended abstract). In CRYPTO ’97: Proceedings of the 17th Annual International Cryptology Conference on Advances in Cryptology, pages 410–424, London, UK, 1997. Springer-Verlag.
David Chaum. Security without identification: transaction systems to make big brother obsolete. Commun. ACM, 28(10):1030–1044, 1985.
Matt Hooks and Jadrian Miles. Onion routing and online anonymity. CS182S, 2006.
Arjen K. Lenstra and Eric R. Verheul. Selecting cryptographic key sizes. Journal of Cryptology: the journal of the International Association for Cryptologic Research, 14(4):255–293, 2001.
J. Novotny, S. Tuecke, and V. Welch. An online credential repository for the grid: Myproxy. In Proceedings of the Tenth International Symposium on High Performance Distributed Computing (HPDC-10). IEEE Press, 2001.
G. Sarbari. Security characteristics of cryptographic mobility solutions. In Proceedings of the 1 Annual PKI Research Workshop, Gaithersburg, Maryland, 2002.
Paul F. Syverson, David M. Goldschlag, and Michael G. Reed. Anonymous connections and onion routing. In SP ’97: Proceedings of the 1997 IEEE Symposium on Security and Privacy, page 44, Washington, DC, USA, 1997. IEEE Computer Society.
David Del Vecchio, Marty Humphrey, Jim Basney, and Nataraj Nagaratnam. Credex: Usercentric credential management for grid and web services. In ICWS ’05: Proceedings of the IEEE International Conference on Web Services (ICWS’05), pages 149–156,Washington, DC, USA, 2005. IEEE Computer Society.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 IFIP International Federation for Information Processing
About this paper
Cite this paper
Verslype, K., Decker, B.D. (2008). Ubiquitous Privacy-Preserving Identity Managment. In: Jajodia, S., Samarati, P., Cimato, S. (eds) Proceedings of The Ifip Tc 11 23rd International Information Security Conference. SEC 2008. IFIP – The International Federation for Information Processing, vol 278. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-09699-5_38
Download citation
DOI: https://doi.org/10.1007/978-0-387-09699-5_38
Publisher Name: Springer, Boston, MA
Print ISBN: 978-0-387-09698-8
Online ISBN: 978-0-387-09699-5
eBook Packages: Computer ScienceComputer Science (R0)