Abstract
This paper summarizes the contents and presentations held at a workshop at the IFIP Summer School on Privacy and Identity Management 2021, focusing on privacy-preserving identity management. In this document, we first introduce the necessary background on privacy-preserving identity management, including core cryptographic concepts. We then present a demonstrator scenario which benefits from the use of such technologies. Finally, we present a distributed privacy-preserving identity management framework offering an even higher level of security and privacy than previous work.
Authors are listed in alphabetical order, cf. https://www.ams.org/profession/leaders/CultureStatement04.pdf.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Baldimtsi, F., Camenisch, J., Hanzlik, L., Krenn, S., Lehmann, A., Neven, G.: Recovering lost device-bound credentials. In: Malkin, T., Kolesnikov, V., Lewko, A.B., Polychronakis, M. (eds.) ACNS 2015. LNCS, vol. 9092, pp. 307–327. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-28166-7_15
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M., Lysyanskaya, A., Shacham, H.: Randomizable proofs and delegatable anonymous credentials. In: Halevi, S. (ed.) CRYPTO 2009. LNCS, vol. 5677, pp. 108–125. Springer, Heidelberg (2009). https://doi.org/10.1007/978-3-642-03356-8_7
Blömer, J., Bobolz, J.: Delegatable attribute-based anonymous credentials from dynamically malleable signatures. In: Preneel, B., Vercauteren, F. (eds.) ACNS 2018. LNCS, vol. 10892, pp. 221–239. Springer, Cham (2018). https://doi.org/10.1007/978-3-319-93387-0_12
Bobolz, J., Eidens, F., Krenn, S., Ramacher, S., Samelin, K.: Issuer-hiding attribute-based credentials. In: Conti, M., Stevens, M., Krenn, S. (eds.) CANS 2021. LNCS, vol. 13099, pp. 158–178. Springer, Heidelberg (2021). https://doi.org/10.1007/978-3-030-92548-2_9
Bosk, D., Bouget, S., Buchegger, S.: Distance-bounding, privacy-preserving attribute-based credentials. In: Krenn, S., Shulman, H., Vaudenay, S. (eds.) CANS 2020. LNCS, vol. 12579, pp. 147–166. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-65411-5_8
Brands, S.: Rethinking public key infrastructure and digital certificates - buildingin privacy. Ph.D. thesis, Eindhoven Institute of Technology (1999)
Camenisch, J., Herreweghen, E.V.: Design and implementation of the idemix anonymous credential system. In: Atluri, V. (ed.) ACM Conference on Computer and Communications Security - CCS 2002, pp. 21–30. ACM (2002). https://doi.org/10.1145/586110.586114
Camenisch, J., Krenn, S., Lehmann, A., Mikkelsen, G.L., Neven, G., Pedersen, M.Ø.: Formal treatment of privacy-enhancing credential systems. In: Dunkelman, O., Keliher, L. (eds.) SAC 2015. LNCS, vol. 9566, pp. 3–24. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31301-6_1
Camenisch, J., Lysyanskaya, A.: A signature scheme with efficient protocols. In: Cimato, S., Persiano, G., Galdi, C. (eds.) SCN 2002. LNCS, vol. 2576, pp. 268–289. Springer, Heidelberg (2003). https://doi.org/10.1007/3-540-36413-7_20
Camenisch, J., Lysyanskaya, A.: Signature schemes and anonymous credentials from bilinear maps. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 56–72. Springer, Heidelberg (2004). https://doi.org/10.1007/978-3-540-28628-8_4
Chase, M., Lysyanskaya, A.: On signatures of knowledge. In: Dwork, C. (ed.) CRYPTO 2006. LNCS, vol. 4117, pp. 78–96. Springer, Heidelberg (2006). https://doi.org/10.1007/11818175_5
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84–88 (1981). https://doi.org/10.1145/358549.358563
Chaum, D.: Security without identification: transaction systems to make big brother obsolete. Commun. ACM 28(10), 1030–1044 (1985). https://doi.org/10.1145/4372.4373
Crites, E.C., Lysyanskaya, A.: Delegatable anonymous credentials from mercurial signatures. In: Matsui, M. (ed.) CT-RSA 2019. LNCS, vol. 11405, pp. 535–555. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-12612-4_27
ekathimerini.com: Minister admits number of civil servants with forged degrees was exaggerated (2013). https://www.ekathimerini.com/news/154846/minister-admits-number-of-civil-servants-with-forged-degrees-was-exaggerated/
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: Odlyzko, A.M. (ed.) CRYPTO 1986. LNCS, vol. 263, pp. 186–194. Springer, Heidelberg (1987). https://doi.org/10.1007/3-540-47721-7_12
de Fuentes, J.M., González-Manzano, L., Serna-Olvera, J., Veseli, F.: Assessment of attribute-based credentials for privacy-preserving road traffic services in smart cities. Pers. Ubiquit. Comput. 21(5), 869–891 (2017). https://doi.org/10.1007/s00779-017-1057-6
García-Rodríguez, J., Torres Moreno, R., Bernal Bernabe, J., Skarmeta, A.: Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures. J. Inf. Secur. Appl. 62, 102971 (2021). https://www.sciencedirect.com/science/article/pii/S2214212621001824
Goldwasser, S., Micali, S., Rackoff, C.: The knowledge complexity of interactive proof-systems (extended abstract). In: Sedgewick, R. (ed.) ACM Symposium on Theory of Computing - STOC 1985, pp. 291–304. ACM (1985). https://doi.org/10.1145/22145.22178
Goldwasser, S., Micali, S., Rivest, R.L.: A digital signature scheme secure against adaptive chosen-message attacks. SIAM J. Comput. 17(2), 281–308 (1988). https://doi.org/10.1137/0217017
Haböck, U., Krenn, S.: Breaking and fixing anonymous credentials for the cloud. In: Mu, Y., Deng, R.H., Huang, X. (eds.) CANS 2019. LNCS, vol. 11829, pp. 249–269. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-31578-8_14
Han, J., Chen, L., Schneider, S., Treharne, H., Wesemeyer, S.: Privacy-preserving electronic ticket scheme with attribute-based credentials. IEEE Trans. Dependable Secur. Comput. 18(4), 1836–1849 (2021). https://doi.org/10.1109/TDSC.2019.2940946
Krenn, S., Lorünser, T., Salzer, A., Striecks, C.: Towards attribute-based credentials in the cloud. In: Capkun, S., Chow, S.S.M. (eds.) CANS 2017. LNCS, vol. 11261, pp. 179–202. Springer, Cham (2018). https://doi.org/10.1007/978-3-030-02641-7_9
Liagkou, V., Metakides, G., Pyrgelis, A., Raptopoulos, C., Spirakis, P., Stamatiou, Y.C.: Privacy preserving course evaluations in Greek higher education institutes: an e-participation case study with the empowerment of attribute based credentials. In: Preneel, B., Ikonomou, D. (eds.) APF 2012. LNCS, vol. 8319, pp. 140–156. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-642-54069-1_9
Paquin, C., Zaverucha, G.: U-prove cryptographic specification v1.1 (revision2). Technical report, Microsoft Corporation, April 2013
Pussewalage, H.S.G., Oleshchuk, V.A.: An anonymous delegatable attribute-based credential scheme for a collaborative e-health environment. ACM Trans. Internet Tech. 19(3), 41:1-41:22 (2019). https://doi.org/10.1145/3338854
Schnorr, C.P.: Efficient identification and signatures for smart cards. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 239–252. Springer, New York (1990). https://doi.org/10.1007/0-387-34805-0_22
Sforzin, A.: D5.1 - Requirements analysis of demonstration cases phase 1. H2020 CyberSec4Europe project deliverable (2020). https://cybersec4europe.eu/
Sforzin, A.: D5.2 - Specification and set-up demonstration case phase 1. H2020 CyberSec4Europe project deliverable (2020). https://cybersec4europe.eu/
Sforzin, A., Bobba, R.: D5.3 - Validation of demonstration case phase 1. H2020 CyberSec4Europe project deliverable (2021). https://cybersec4europe.eu/
Stamatiou, Y., et al.: Course evaluation in higher education: the Patras pilot of ABC4Trust. In: Rannenberg, K., Camenisch, J., Sabouri, A. (eds.) Attribute-Based Credentials for Trust, pp. 197–239. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14439-9_7
Torres Moreno, R., et al.: The OLYMPUS architecture - oblivious identity management for private user-friendly services. Sensors 20(3), 945 (2020)
Torres Moreno, R., García-Rodríguez, J., Bernal Bernabe, J., Skarmeta, A.: A trusted approach for decentralised and privacy-preserving identity management. IEEE Access 9, 105788–105804 (2021)
Acknowledgements
The work leading to this workshop was funded by the European Union under the H2020 Programme Grant Agreement No. 830929 (CyberSec4Europe) and No. 786725 (OLYMPUS).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 IFIP International Federation for Information Processing
About this paper
Cite this paper
Bernabe, J.B., García-Rodríguez, J., Krenn, S., Liagkou, V., Skarmeta, A., Torres, R. (2022). Privacy-Preserving Identity Management and Applications to Academic Degree Verification. In: Friedewald, M., Krenn, S., Schiering, I., Schiffner, S. (eds) Privacy and Identity Management. Between Data Protection and Security. Privacy and Identity 2021. IFIP Advances in Information and Communication Technology, vol 644. Springer, Cham. https://doi.org/10.1007/978-3-030-99100-5_4
Download citation
DOI: https://doi.org/10.1007/978-3-030-99100-5_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-99099-2
Online ISBN: 978-3-030-99100-5
eBook Packages: Computer ScienceComputer Science (R0)