skip to main content
10.1145/2046642.2046647acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

A comprehensive framework enabling data-minimizing authentication

Published:21 October 2011Publication History

ABSTRACT

Classical authentication mechanisms have various drawbacks such as the weak security properties they achieve, users' privacy, service providers' data quality, and the necessary protection of the collected data. Credential-based authentication is a first step towards overcoming these drawbacks. When used with anonymous credentials, the personal data disclosed can be reduced to the minimum with respect to a business purpose while improving the assurance of the communicated data. However, this privacy-preserving combination of technologies is not used today. One reason for this lack of adoption is that a comprehensive framework for privacy-enhancing credential-based authentication is not available. In this paper we review the different components of such an authentication framework and show that one remaining missing piece is a translation between high-level authentication policies and the cryptographic token specification level. We close this gap by (1) proposing an adequate claim language specifying which certified data a user wants to reveal to satisfy a policy and by (2) providing translation algorithms for generating the anonymous credentials (cryptographic tokens) providing the data to be revealed. For the latter we consider the Identity Mixer and the U-Prove technologies, where we provide detailed translation instructions for the former.

References

  1. Claudio A. Ardagna, Sabrina De Capitani di Vimercati, Gregory Neven, Stefano Paraboschi, Franz-Stefan Preiss, Pierangela Samarati, and Mario Verdicchio. Enabling Privacy-Preserving Credential-Based Access Control with XACML and SAML. In Proc. of the Third IEEE TSP, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Patrik Bichsel and Jan Camenisch. Mixing identities with ease. In Evelyne De Leeuw, Simone Fischer-Hübner, and Lothar Fritsch, editors, IDMAN '10, pages 1--17. Springer, November 2010.Google ScholarGoogle Scholar
  3. Patrik Bichsel, Jan Camenisch, Franz-Stefan Preiss, and Dieter Sommer. Dynamically-changing interface for interactive selection of information cards satisfying policy requirements. Technical Report RZ 3756, IBM Research Zurich, 2009. domino.research.ibm.com/library/cyberdig.nsf.Google ScholarGoogle Scholar
  4. Fabrice Boudot. Efficient proofs that a committed number lies in an interval. In Bart Preneel, editor, EUROCRYPT '00, volume 1807 of LNCS, pages 431--444. Springer, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Stefan Brands. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy. MIT Press, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Jan Camenisch and Thomas Groß. Efficient attributes for anonymous credentials. In Proc. 15th ACM CCS, pages 345--356. ACM Press, November 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Jan Camenisch, Susan Hohenberger, Markulf Kohlweiss, Anna Lysyanskaya, and Mira Meyerovich. How to win the clonewars: efficient periodic n-times anonymous authentication In Ari Juels, Rebecca N. Wright, and Sabrina De Capitani di Vimercati, editors, Proc. 13th ACM CCS, pages 201--210. ACM Press, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Jan Camenisch and Anna Lysyanskaya. Efficient non-transferable anonymous multi-show credential system with optional anonymity revocation. In Birgit Pfitzmann, editor, EUROCRYPT '01, volume 2045 of LNCS, pages 93--118. Springer, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Jan Camenisch, Sebastian Moedersheim, Gregory Neven, Franz-Stefan Preiss, and Dieter Sommer. A Card Requirements Language Enabling Privacy-Preserving Access Control. In Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Jan Camenisch and Victor Shoup. Practical verifiable encryption and decryption of discrete logarithms. http://eprint.iacr.org/2002/161, 2002.Google ScholarGoogle Scholar
  11. David Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. of the ACM, 24(2):84--88, February 1981. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, and W. Polk. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. RFC 5280 (Proposed Standard), May 2008. http://www.ietf.org/rfc/rfc5280.txt.Google ScholarGoogle Scholar
  13. Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Andrew M. Odlyzko, editor, CRYPTO '86, volume 263 of LNCS, pages 186--194. Springer, 1987. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. OASIS. Assertions and protocols for the OASIS security assertion markup language (SAML) v2.0, 2005. http://docs.oasis-open.org/security/saml/v2.0/saml-core-2.0-os.pdf.Google ScholarGoogle Scholar
  15. OpenID authentication 2.0, December 2007. http://openid.net/developers/specs/.Google ScholarGoogle Scholar
  16. Christian Paquin. U-Prove cryptographic specification V1.1. Technical report, Microsoft Corporation, February 2011.Google ScholarGoogle Scholar
  17. Christian Paquin. U-Prove WS-Trust Profile V1.0. Technical report, Microsoft Corporation, February 2011.Google ScholarGoogle Scholar
  18. Security Team, IBM Research Zurich. Specification of the identity mixer cryptographic library. IBM Research Report RZ 3730, IBM Research Division, April 2010. http://domino.research.ibm.com/library/cyberdig.nsf.Google ScholarGoogle Scholar
  19. K. Zeilenga. Lightweight Directory Access Protocol (LDAP): Technical Specification Road Map. RFC 4510 (Proposed Standard), June 2006. http://www.ietf.org/rfc/rfc4510.txt.Google ScholarGoogle Scholar

Index Terms

  1. A comprehensive framework enabling data-minimizing authentication

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            DIM '11: Proceedings of the 7th ACM workshop on Digital identity management
            October 2011
            102 pages
            ISBN:9781450310062
            DOI:10.1145/2046642

            Copyright © 2011 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 21 October 2011

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            Overall Acceptance Rate16of34submissions,47%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader