Secure & privacy-preserving eID systems with Attribute-based credentials

نویسنده

  • Brinda Badarinath Hampiholi
چکیده

National electronic identification (eID) systems aim to provide universal, unique and reliable identification and authentication mechanisms to the citizens. Many countries in Europe have already introduced or are about to introduce electronic ID cards to their citizens. The increasing number of eID infrastructures and initiatives have been taken to scale the eID systems to support both eGovernment and eCommerce services and this has necessitated security and privacy to be of highest order in all the use-case scenarios. As the ID documents are the carriers of a citizen’s identity and personal data, the outgoing information from the cards must be restricted in order to prevent unwanted data disclosure, subsequent data misuse and loss of the citizen’s privacy. The German eID system (nPA) is by-far the most advanced and privacy-preserving eID solution that has been launched in Europe as it has taken extra measures to protect its citizen’s data and privacy; however some security and privacy threats persist in nPA. In this thesis, we study the key concepts and security protocols used in nPA and identify its main threats. Furthermore, we explore Attribute-Based Credentials (ABC) by studying in detail about I Reveal My Attributes (IRMA), that is a recent technology built upon the principles on ABC. IRMA is a partial implementation of Idemix specification and it mainly focusses on enhancing security and privacy of identity management systems. IRMA makes use of zero-knowledge protocols to prove the validity of certain attributes of the eID cardholder while allowing the selective disclosure of attributes and supporting unlinkability features. We elaborate on the advantages of such ABCs that could be used to address the threats identified in nPA and propose a specific scheme that integrates IRMA authentication with nPA. Our proposal shows how to use IRMA in eID systems like nPA in order to overcome the its prevalent shortcomings. The IRMA authentication provides better privacy, security and flexibility for the eID infrastructure. Finally, we discuss the performance of smart-card implementation of IRMA credentials and present some use-cases that would benefit from the proposed eID scheme.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Attribute-based Access Control for Cloud-based Electronic Health Record (EHR) Systems

Electronic health record (EHR) system facilitates integrating patients' medical information and improves service productivity. However, user access to patient data in a privacy-preserving manner is still challenging problem. Many studies concerned with security and privacy in EHR systems. Rezaeibagha and Mu [1] have proposed a hybrid architecture for privacy-preserving accessing patient records...

متن کامل

Integrating Anonymous Credentials with eIDs for Privacy-Respecting Online Authentication

Electronic Identity (eID) cards are rapidly emerging in Europe and are gaining user acceptance. As an authentication token, an eID card is a gateway to personal information and as such it is subject to privacy risks. Several European countries have taken extra care to protect their citizens against these risks. A notable example is the German eID card, which we take as a case study in this pape...

متن کامل

Previous and Ongoing Work

Broadly speaking, my research interests lie at the intersection of the computer security, privacy, and distributed systems disciplines. In particular, I am interested in systems that facilitate secure interactions across multiple security domains while still preserving each individual’s privacy and autonomy. For my dissertation, I have focused mainly on the systems challenges surrounding the ad...

متن کامل

Privacy-Preserving Auditing for Attribute-Based Credentials

Privacy-enhancing attribute-based credentials (PABCs) allow users to authenticate to verifiers in a data-minimizing way, in the sense that users are unlinkable between authentications and only disclose those attributes from their credentials that are relevant to the verifier. We propose a practical scheme to apply the same data minimization principle when the verifiers’ authentication logs are ...

متن کامل

Privacy-Preserving Biometric Authentication: Challenges and Directions

An emerging direction for authenticating people is the adoption of biometric authentication systems. Biometric credentials are becoming increasingly popular as a mean of authenticating people due to the wide rage of advantages that they provide with respect to classical authentication methods (e.g., password-based authentication). The most characteristic feature of this authentication method is...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014