DECIDE: A Scheme for Decentralized Identity Escrow

Size: px
Start display at page:

Download "DECIDE: A Scheme for Decentralized Identity Escrow"

Transcription

1 DECIDE: A Scheme for Decentralized Escrow ACM CCS 2005 Workshop on Digital Management Noburou Taniguchi, Koji Chida, Osamu Shionoiri, Atsushi Kanai Social Informatics Group Information Security Project NTT Information Sharing Platform Laboratories Nippon Telegraph and Telephone Corporation

2 Introduction Anonymity: one of the most controversial issues in the Internet Good things: it supports: - Privacy - Freedom of expression, speech, etc. Bad things: it numbs accountability and encourages - Slander, defamation - Fraud - Piracy - 2 -

3 Introduction (cont'd) Escrow [Killian and Petrank '98] - based on revocable anonymity ordinarily anonymous but in special case identity is disclosed - potential solution achieving a good balance between anonymity and accountability - 3 -

4 Goals To find the publicly acceptable "level" of anonymity with accountability.. and deploy it - 4 -

5 Definitions -, Pseudonymity, Anonymity - Digital world persona Specified Unspecified Real world person Specified Unspecified Pseudonymity Anonymity - 5 -

6 Definitions -, Pseudonymity, Anonymity - - Identified: specified as a real person in the real world - A principal (=real person) establishes identity by a set of information to specify the person Pseudonymity - Pseudonymous: specified as an unique virtual persona in the digital world, but unspecified as a real person in the real world - A principal gets pseudonymity by repeatedly-used identifier (=pseudonym) Anonymity - Anonymous: unspecified both in the real and digital world - A principal gets anonymity for example by using no identifier, by sharing the same single identifier with other principals, or by using different identifiers each time when authenticated - 6 -

7 (Another) Definitions -, Pseudonymity, Anonymity - Specified Real world person Unspecified Digital world persona Specified Unspecified Pseudonymity Anonymity - 7 -

8 Original model Escrow Issuer 2nd-tier identity (detailed) 1st-tier identity (anonymous) Verifier Identifier Escrow Agent(s) - 8 -

9 DECIDE DECentralized IDentity Escrow 3-layer model - added "Pseudonymity" layer Certificate issuer Proxy Pseudonymity Anonymity Service authenticator Principal (Person) Pseudonym - 9 -

10 Generic Model - Anonymity Provider - Pseudonymity Provider Pseudonymity- Anonymity Provider Pseudonymity Anonymity Authenticator Principal (Person) Pseudonymity- Anonymity- Pseudonymity Anonymity- Authority

11 Processing Flow (A) (B) information Certificate issuer (C) (D) Revocation list (J) Proxy (F) (L) (I) (E) Service authenticator A) registration Request for escrow certificate B)Issuance of escrow certificate C)Request for anonymous access D)Pseudonymous Authentication E)Anonymous proxy access F)Provision of service Principal (Person) (K) Pseudonym (G) (H) G)Request for pseudonym H)Response for pseudonym I)Revocation list update J)Request for identity K)Response for identity L)Access to identity information

12 Certificate Issuance (A) (B) information Certificate issuer (C) (D) Revocation list (J) Proxy (F) (L) (I) (E) Service authenticator A) registration Request for escrow certificate B)Issuance of escrow certificate C)Request for anonymous access D)Pseudonymous Authentication E)Anonymous proxy access F)Provision of service Principal (Person) (K) Pseudonym (G) (H) G)Request for pseudonym H)Response for pseudonym I)Revocation list update J)Request for identity K)Response for identity L)Access to identity information

13 Certificate Issuance Using fair blind signature technique - Main idea Principal(P) ==[FB(PK P )]==> certificate issuer(ci) CI ==[Sign CI (FB(PK P ))]==> P P unblinds Sign CI (FB(PK P )) => Sign CI (PK P ): to be used as P's certificate - Feature CI doesn't know relation between FB(PKP) and PKP Trustee(s) can disclose relation between FB(PK P ) and PK P (thanks to fairness)

14 Accessing service via proxy (A) (B) information Certificate issuer (C) (D) Revocation list (J) Proxy (F) (L) (I) (E) Service authenticator A) registration Request for escrow certificate B)Issuance of escrow certificate C)Request for anonymous access D)Pseudonymous Authentication E)Anonymous proxy access F)Provision of service Principal (Person) (K) Pseudonym (G) (H) G)Request for pseudonym H)Response for pseudonym I)Revocation list update J)Request for identity K)Response for identity L)Access to identity information

15 Accessing service via proxy Usual proxy: - Proxy(PX) authenticates principal(p) - Then service authenticator(sa) authenticates PX but, in SA-PX authn, PX passes PX-P authn transcript encrypted by threshold encryption to SA - The transcript will be used pseudonymity process, if needed. PX knows relation between P's certificate and service access - Pros: Membership revocation is made to be easy - Cons: Privacy risk Solutions: - Trusted PX - Multiple PXs (PX network => network level anonymity)

16 Pseudonym (A) (B) information Certificate issuer (C) (D) Revocation list (J) Proxy (F) (L) (I) (E) Service authenticator A) registration Request for escrow certificate B)Issuance of escrow certificate C)Request for anonymous access D)Pseudonymous Authentication E)Anonymous proxy access F)Provision of service Principal (Person) (K) Pseudonym (G) (H) G)Request for pseudonym H)Response for pseudonym I)Revocation list update J)Request for identity K)Response for identity L)Access to identity information

17 Pseudonym Service Authenticator (SA) passes thresholdencrypted PX-P authn transcript and asks pseudonym to Pseudonym Disclosure Authorities(PDA), when needed - Threshold encryption enables multiple PDAs configuration, which may help Principals (P) trust the process more k out of n PDAs agree to, the transcript is decrypted and P's certificate is disclosed For membership revocation, the cert is sent to PX(s) to be registered revocation list

18 (A) (B) information Certificate issuer (C) (D) Revocation list (J) Proxy (F) (L) (I) (E) Service authenticator A) registration Request for escrow certificate B)Issuance of escrow certificate C)Request for anonymous access D)Pseudonymous Authentication E)Anonymous proxy access F)Provision of service Principal (Person) (K) Pseudonym (G) (H) G)Request for pseudonym H)Response for pseudonym I)Revocation list update J)Request for identity K)Response for identity L)Access to identity information

19 When further is needed, Service Authenticator (SA) sends Principal's (P) cert to Disclosure Authorities (IDA) IDAs also run process in k-out-of-n manner to decide whether P's identity will be disclosed or not If IDAs decide to disclose, relation between P's cert (= Sign CI (PK P )) and fair blinded public key FB(PK P ) registered in identity database will be revealed and therefore P's identity will be specified

20 Service Analysis from the Viewpoint of "Trust" Every authentication scheme needs to be trusted by participants In the matter of trust, social (human relationship) factor is as important as technology Esp. in identity escrow scheme, principals' trust to authorities is the key - who take on the roles? - how many? (<= k-out-of-n) Three application models are analyzed

21 Service Analysis from the Viewpoint of "Trust" Three application models are analyzed.. - Online discussion community - Whistle blowing - School networking Please see the paper in the proceedings for detail

22 Conclusion New and generalized notion of identity escrow (from the social-scientific point of view) - Based on the intuitive (non-mathematical) definition of identity, pseudonymity, anonymity A concrete framework of identity escrow "DECIDE" - High decentralizability Application service model analysis to get more trust from principals

23 Future work Deeper analysis on application model: - Building a simulation as a strategic game - Laboratory experiments - Field experiments

24 Thanks

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation Identity Mixer: From papers to pilots and beyond Gregory Neven, IBM Research Zurich Motivation Online security & trust today: SSL/TLS for encryption and server authentication Username/password for client

More information

Privacy and Security in Ubiquitous Personalized Applications

Privacy and Security in Ubiquitous Personalized Applications Privacy and Security in Ubiquitous Personalized Applications Ajay Brar, Judy Kay School of Information Technologies University of Sydney {abrar1, judy}@it.usyd.edu.au Abstract. Personalization systems

More information

Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems Anja Lehmann IBM Research Zurich ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

U-Prove Technology Overview

U-Prove Technology Overview U-Prove Technology Overview November 2010 TOC Introduction Community Technology Preview Additional Capabilities RSA Demo Conclusion 2 Introduction History U-Prove well established in academia Patent portfolio

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Pseudonym Based Security Architecture for Wireless Mesh Network

Pseudonym Based Security Architecture for Wireless Mesh Network IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 4, Ver. VII (Jul Aug. 2014), PP 01-05 Pseudonym Based Security Architecture for Wireless Mesh Network

More information

Attribute-based Credentials on Smart Cards

Attribute-based Credentials on Smart Cards Attribute-based Credentials on Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Privacy & Identity Lab Institute for Computing and Information Sciences Digital Security SaToSS Research Meeting 28th February

More information

The Center for Affiliated Learning ( the CAL ) Privacy Policy

The Center for Affiliated Learning ( the CAL ) Privacy Policy The Center for Affiliated Learning ( the CAL ) Privacy Policy Welcome to the Center for Affiliated Learning ( the CAL ) an education and training platform owned and operated by Affiliates Risk Management

More information

PRIVACY BY DESIGN FOR DELAY TOLERANT NETWORKS

PRIVACY BY DESIGN FOR DELAY TOLERANT NETWORKS PRIVACY BY DESIGN FOR DELAY TOLERANT NETWORKS 9th ETSI Security Workshop Sophia Antipolis, France, on 15th 16th January 2014 Dr. Haitham Cruickshank H.Cruickshank@surrey.ac.uk, Naveed Ahmad n.ahmad@surrey.ac.uk

More information

LET S ENCRYPT SUBSCRIBER AGREEMENT

LET S ENCRYPT SUBSCRIBER AGREEMENT Page 1 of 7 LET S ENCRYPT SUBSCRIBER AGREEMENT This Subscriber Agreement ( Agreement ) is a legally binding contract between you and, if applicable, the company, organization or other entity on behalf

More information

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of Contents Security & Privacy Contents Web Architecture and Information Management [./] Spring 2009 INFO 190-02 (CCN 42509) Erik Wilde, UC Berkeley School of Information Abstract 1 Security Concepts Identification

More information

Yada. A blockchain-based social graph

Yada. A blockchain-based social graph Yada A blockchain-based social graph January 2018 Abstract The goal of Yada is to achieve an acceptable level anonymity, privacy, and freedom of expression while making available to the public a structure

More information

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp

Net Trust: User-Centered Detection of Pharming, Phishing and Fraud. L Jean Camp Net Trust: User-Centered Detection of Pharming, Phishing and Fraud L Jean Camp www.ljean.com Core Problem Statement How to inform individual assessments of trustworthiness of a potential online transaction.

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

Topics. Dramatis Personae Cathy, the Computer, trusted 3 rd party. Cryptographic Protocols

Topics. Dramatis Personae Cathy, the Computer, trusted 3 rd party. Cryptographic Protocols Cryptographic Protocols Topics 1. Dramatis Personae and Notation 2. Session and Interchange Keys 3. Key Exchange 4. Key Generation 5. Cryptographic Key Infrastructure 6. Storing and Revoking Keys 7. Digital

More information

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research Credentials: Motivation ID cards Sometimes used for other uses E.g. prove you re over 21, or

More information

Signature schemes variations

Signature schemes variations Signature schemes variations Multisignatures: several signers create a signature on a single message, that is shorter and faster to verify than when a standard signature scheme is used in a straightforward

More information

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea

Cryptography SSL/TLS. Network Security Workshop. 3-5 October 2017 Port Moresby, Papua New Guinea Cryptography SSL/TLS Network Security Workshop 3-5 October 2017 Port Moresby, Papua New Guinea 1 History Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent

More information

SSL Certificates Certificate Policy (CP)

SSL Certificates Certificate Policy (CP) SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full

More information

Digital Identity Management based on Digital Credentials. Credentica Inc. Version 1.0 of June 2002

Digital Identity Management based on Digital Credentials. Credentica Inc. Version 1.0 of June 2002 Digital Identity Management based on Digital Credentials Stefan Brands and Frédéric Légaré Credentica Inc. Version 1.0 of June 2002 fbrands,legareg@credentica.com Abstract: Today s commercial Digital Identity

More information

A privacy-enhancing technology:

A privacy-enhancing technology: A privacy-enhancing technology: sticky policies Privacy-Enhancing Technologies / DD3344 Guillermo Rodríguez Cano Stockholm, November 12th, 2012 what are they? how do they work? what are their problems?

More information

REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS

REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS REPORT OF INDEPENDENT CERTIFIED PUBLIC ACCOUNTANTS To the Management of Internet Security Research Group: Scope We have examined the assertion by the management of the Internet Security Research Group

More information

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research

More information

An Introduction to Trusted Platform Technology

An Introduction to Trusted Platform Technology An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK Siani_Pearson@hp.com Content What is Trusted Platform technology and TCPA? Why is Trusted Platform technology

More information

Privacy-Preserving & User-Auditable Pseudonym Systems. Jan Camenisch, Anja Lehmann IBM Research Zurich

Privacy-Preserving & User-Auditable Pseudonym Systems. Jan Camenisch, Anja Lehmann IBM Research Zurich Privacy-Preserving & User-Auditable Pseudonym Systems Jan Camenisch, Anja Lehmann IBM Research Zurich Motivation: How to maintain related yet distributed data? examples: social security system, ehealth

More information

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

Implementation of Decentralized Access Control with Anonymous Authentication in Cloud Volume-5, Issue-6, December-2015 International Journal of Engineering and Management Research Page Number: 210-214 Implementation of Decentralized Access Control with Anonymous Authentication in Cloud

More information

Lecture Notes 14 : Public-Key Infrastructure

Lecture Notes 14 : Public-Key Infrastructure 6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These

More information

Key Escrow free Identity-based Cryptosystem

Key Escrow free Identity-based Cryptosystem Key Escrow free Manik Lal Das DA-IICT, Gandhinagar, India About DA-IICT and Our Group DA-IICT is a private university, located in capital of Gujarat state in India. DA-IICT offers undergraduate and postgraduate

More information

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers;

Xpress Super may collect and hold the following personal information about you: contact details including addresses and phone numbers; 65 Gilbert Street, Adelaide SA 5000 Tel: 1300 216 890 Fax: 08 8221 6552 Australian Financial Services Licence: 430962 Privacy Policy This Privacy Policy was last updated on 27 February 2017. Our Commitment

More information

ICS 180 May 4th, Guest Lecturer: Einar Mykletun

ICS 180 May 4th, Guest Lecturer: Einar Mykletun ICS 180 May 4th, 2004 Guest Lecturer: Einar Mykletun 1 Symmetric Key Crypto 2 Symmetric Key Two users who wish to communicate share a secret key Properties High encryption speed Limited applications: encryption

More information

The Grid Authentication System for Mobile Grid Environment

The Grid Authentication System for Mobile Grid Environment IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 02, 2014 ISSN (online): 2321-0613 The Grid Authentication System for Mobile Grid Environment A.Sudha 1 S.M.Karpagavalli

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification

More information

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE

DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE DECENTRALIZED ATTRIBUTE-BASED ENCRYPTION AND DATA SHARING SCHEME IN CLOUD STORAGE ABSTRACT We propose a Multi-Authority Attribute-Based Encryption (ABE) system. In our system, any party can become an authority

More information

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation

Overview. Cryptographic key infrastructure Certificates. May 13, 2004 ECS 235 Slide #1. Notation Overview Key exchange Session vs. interchange keys Classical, public key methods Key generation Cryptographic key infrastructure Certificates Key storage Key escrow Key revocation Digital signatures May

More information

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms

CruiseSmarter PRIVACY POLICY. I. Acceptance of Terms I. Acceptance of Terms This Privacy Policy describes CRUISE SMARTER policies and procedures on the collection, use and disclosure of your information. CRUISE SMARTER LLC (hereinafter referred to as "we",

More information

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from Lecture 15 PKI & Authenticated Key Exchange COSC-260 Codes and Ciphers Adam O Neill Adapted from http://cseweb.ucsd.edu/~mihir/cse107/ Today We will see how signatures are used to create public-key infrastructures

More information

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33

Background. Network Security - Certificates, Keys and Signatures - Digital Signatures. Digital Signatures. Dr. John Keeney 3BA33 Background Network Security - Certificates, Keys and Signatures - Dr. John Keeney 3BA33 Slides Sources: Karl Quinn, Donal O Mahoney, Henric Johnson, Charlie Kaufman, Wikipedia, Google, Brian Raiter. Recommended

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

Security of vehicular communications. Vehicular communication (VC) systems

Security of vehicular communications. Vehicular communication (VC) systems Security of vehicular communications vehicular safety communications design constraints attacker classes desired security services a security architecture Vehicular communication (VC) systems motivations:

More information

Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli

Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli Privacy with attribute-based credentials ABC4Trust Project Fatbardh Veseli Deutsche Telekom Chair for Mobile Business and Multilateral Security Goethe University Frankfurt, Germany fatbardh.veseli@m-chair.de

More information

PRIVACY STATEMENT OF TIBBAA SMARTCARD

PRIVACY STATEMENT OF TIBBAA SMARTCARD PRIVACY STATEMENT OF TIBBAA SMARTCARD 1. PERSONAL USE OF DATA 2. TS INFORMATION COLLECTED AND USED 3. INFORMATION ACCESSED BY TS FROM THIRD PARTIES 4. INFORMATION COLLECTED ON WEBSITES 5. INFORMATION OF

More information

Differential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017

Differential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017 Differential Privacy Seminar: Robust Techniques Thomas Edlich Technische Universität München Department of Informatics kdd.in.tum.de July 16, 2017 Outline 1. Introduction 2. Definition and Features of

More information

Public-key Infrastructure Options and choices

Public-key Infrastructure Options and choices Public-key Infrastructure Options and choices Tim Moses Director, Advanced Security Technology April 98 1997 Entrust Technologies Overview General-purpose and Dedicated PKIs Trust models Two-key architecture

More information

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich

More information

Remote E-Voting System

Remote E-Voting System Remote E-Voting System Crypto2-Spring 2013 Benjamin Kaiser Jacob Shedd Jeremy White Phases Initialization Registration Voting Verifying Activities Trusted Authority (TA) distributes 4 keys to Registrar,

More information

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure

Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages

More information

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C FORM SD

UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C FORM SD UNITED STATES SECURITIES AND EXCHANGE COMMISSION Washington, D.C. 20549 FORM SD SPECIALIZED DISCLOSURE REPORT NIPPON TELEGRAPH AND TELEPHONE CORPORATION (Exact name of the registrant as specified in its

More information

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations

Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Apple Inc. Certification Authority Certification Practice Statement Worldwide Developer Relations Version 1.18 Effective Date: August 16, 2017 Table of Contents 1. Introduction... 5 1.1. Trademarks...

More information

A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards

A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards A Mechanism for Federated Identification Services for Public Access Portals Using Access-Cards Sylvia Encheva Stord/Haugesund University College Bjørnsonsg. 45 5528 Haugesund, Norway sbe@hsh.no Sharil

More information

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains Verifiable Anonymous Identities and Access Control in Permissioned Blockchains Thomas Hardjono MIT Internet Trust Consortium Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: hardjono@mit.edu

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.

More information

NYMBLE: Blocking Misbehaving Users in Anonymizing Networks

NYMBLE: Blocking Misbehaving Users in Anonymizing Networks RESEARCH ARTICLE OPEN ACCESS NYMBLE: Blocking Misbehaving Users in Anonymizing Networks 1 R.Ravikumar, 2 J.Ramesh Kumar 1 Asst.professor, Dept.of.Computer Science, Tamil University, Thanjavur-613010. 2

More information

Privacy-preserving PKI design based on group signature

Privacy-preserving PKI design based on group signature Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2011 Privacy-preserving PKI design based on group signature Sokjoon

More information

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao and Hanyue Cao Department of Mathematics, Shanghai University, Shanghai, China caozhj@shu.edu.cn Abstract. In 2007, Camenisch,

More information

A SIMPLE INTRODUCTION TO TOR

A SIMPLE INTRODUCTION TO TOR A SIMPLE INTRODUCTION TO TOR The Onion Router Fabrizio d'amore May 2015 Tor 2 Privacy on Public Networks Internet is designed as a public network Wi-Fi access points, network routers see all traffic that

More information

When does QuestCDN collect personally identifiable information?

When does QuestCDN collect personally identifiable information? Quest Construction Data Network, LLC PRIVACY POLICY May 24, 2014 THE QUEST CONSTRUCTION DATA NETWORK (QUESTCDN.COM) IS COMMITTED TO PROTECTING YOUR PRIVACY ONLINE. IN ORDER TO FULLY UNDERSTAND YOUR RIGHTS,

More information

Testpassport http://www.testpassport.net Exam : SY0-301 Title : Security+ Certification Exam 2011 version Version : Demo 1 / 5 1.Which of the following is the BEST approach to perform risk mitigation of

More information

Identifiers, Privacy and Trust in the Internet of Services

Identifiers, Privacy and Trust in the Internet of Services Identifiers, Privacy and Trust in the Internet of Services Leonardo A. Martucci, Sebastian Ries, and Max Mühlhäuser Technische Universität Darmstadt, CASED Mornewegstr. 32, DE-64293, Darmstadt, Germany

More information

ENEE 459-C Computer Security. Security protocols

ENEE 459-C Computer Security. Security protocols ENEE 459-C Computer Security Security protocols Key Agreement: Diffie-Hellman Protocol Key agreement protocol, both A and B contribute to the key Setup: p prime and g generator of Z p *, p and g public.

More information

Topic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services

Topic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services Topic LE /GAC position Registrar Position Agreement in Principle 1. Privacy and Proxy services 2. Prohibition of Certain Illegal, Criminal or Malicious Conduct In the event ICANN establishes an accreditation

More information

Fair Cryptography. Cryptography CS 507 Erkay Savas Sabanci University

Fair Cryptography. Cryptography CS 507 Erkay Savas Sabanci University Fair Cryptography Cryptography CS 507 Erkay Savas Sabanci University erkays@sabanciuniv.edu Conflicting Interests Private Industry wants to secure communications Citizens want privacy Law enforcement wants

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

Priv ac y Policy. Last upda ted:

Priv ac y Policy. Last upda ted: Priv ac y Policy Last upda ted: 05.2014 This Privacy Policy describes the policies and procedures of ZET / Adrian Zingg / ZetApps and any subsidiaries and affiliated entities (together, Company, we or

More information

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions.

Document Cloud (including Adobe Sign) Additional Terms of Use. Last updated June 5, Replaces all prior versions. Document Cloud (including Adobe Sign) Additional Terms of Use Last updated June 5, 2018. Replaces all prior versions. These Additional Terms govern your use of Document Cloud (including Adobe Sign) and

More information

CAREERBUILDER.COM - PRIVACY POLICY

CAREERBUILDER.COM - PRIVACY POLICY Effective Date: September 15, 2010 CareerBuilder, LLC and its subsidiaries and divisions (collectively, CareerBuilder, We or Our ) has drafted its Privacy Policy to ensure that you can use CareerBuilder

More information

A Brief Comparison of Security Patterns for Peer to Peer Systems

A Brief Comparison of Security Patterns for Peer to Peer Systems A Brief Comparison of Security Patterns for Peer to Peer Systems Rahul J. Vaghela 1, Kalpesh Patel 2 1 PG Student, Department of Computer Engineering, L.D. College Of Engineering, Gujarat Technological

More information

The power of Blockchain: Smart Contracts. Foteini Baldimtsi

The power of Blockchain: Smart Contracts. Foteini Baldimtsi The power of Blockchain: Smart Contracts Foteini Baldimtsi The Blockchain at the heart of a cryptocurrency Alice sends 2 John sends 1 Dave sends 5 to Bob to Eve to Alice Bob sends 1 Eve sends 4 to Dave

More information

TeliaSonera Gateway Certificate Policy and Certification Practice Statement

TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway Certificate Policy and Certification Practice Statement v. 1.2 TeliaSonera Gateway Certificate Policy and Certification Practice Statement TeliaSonera Gateway CA v1 OID 1.3.6.1.4.1.271.2.3.1.1.16

More information

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH

Privacy in Vehicular Ad-hoc Networks. Nikolaos Alexiou, LCN, EE KTH Privacy in Vehicular Ad-hoc Networks Nikolaos Alexiou, LCN, EE KTH alexiou@kth.se 2/10/2012 Outline Introduction VANETs: an overview VANET privacy - Anonymity - Location Privacy - VPKI Privacy Attacks

More information

Enabling Grids for E-sciencE. EGEE security pitch. Olle Mulmo. EGEE Chief Security Architect KTH, Sweden. INFSO-RI

Enabling Grids for E-sciencE. EGEE security pitch. Olle Mulmo. EGEE Chief Security Architect KTH, Sweden.  INFSO-RI EGEE security pitch Olle Mulmo EGEE Chief Security Architect KTH, Sweden www.eu-egee.org Project PR www.eu-egee.org EGEE EGEE is the largest Grid infrastructure project in the World? : 70 leading institutions

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST \ http://www.pass4test.com We offer free update service for one year Exam : SY0-301 Title : CompTIA Security+ Certification Exam (SY0-301) Vendor : CompTIA Version : DEMO 1 / 5 Get Latest & Valid

More information

Simulation on Agent-based Onion Routing Network *

Simulation on Agent-based Onion Routing Network * National Research Council Canada Institute for Information Technology Conseil national de recherches Canada Institut de technologie de l'information Simulation on Agent-based Onion Routing Network * Song,

More information

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls

Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls Overview Cryptography functions Secret key (e.g., DES) Public key (e.g., RSA) Message

More information

Made In Hackney Data Protection Policy Last Updated:

Made In Hackney Data Protection Policy Last Updated: Made In Hackney Data Protection Policy Last Updated: 16.05.2018 Definitions Charity GDPR Responsible Person Register of Systems Made In Hackney (MIH), a registered charity. means the General Data Protection

More information

NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) /

NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA (phone) / (fax) / NATIONAL REGISTRY OF CERTIFIED CHEMISTS 125 Rose Ann Lane, West Grove, PA 19390 610-322-0657 (phone) / 800-858-6273 (fax) / rphifer@nrcc6.org (email) 1 APPLICATION FOR CERTIFICATION AS A TOXICOLOGICAL

More information

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates

Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Disclosure text - PDS (PKI Disclosure Statement) for electronic signature and authentication certificates Index INDEX... 2 1. DISCLOSURE TEXT APPLICABLE TO NATURAL PERSON CERTIFICATES ISSUED ON QSCD...

More information

Certificateless Public Key Cryptography

Certificateless Public Key Cryptography Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

Apple Inc. Certification Authority Certification Practice Statement

Apple Inc. Certification Authority Certification Practice Statement Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective

More information

Covert Identity Information in Direct Anonymous Attestation (DAA)

Covert Identity Information in Direct Anonymous Attestation (DAA) Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de

More information

On the Revocation of U-Prove Tokens

On the Revocation of U-Prove Tokens On the Revocation of U-Prove Tokens Christian Paquin, Microsoft Research September nd 04 U-Prove tokens provide many security and privacy benefits over conventional credential technologies such as X.509

More information

OpenADR Alliance Certificate Policy. OpenADR-CP-I

OpenADR Alliance Certificate Policy. OpenADR-CP-I Notice This document is a cooperative effort undertaken at the direction of the OpenADR Alliance and NetworkFX, Inc. for the benefit of the OpenADR Alliance. Neither party is responsible for any liability

More information

RB Digital Signature Proxy Guide for Reporters

RB Digital Signature Proxy Guide for Reporters RB Digital Signature Proxy Guide for Reporters Table of Contents RB-DSP registration workflow.... 1 Obtaining your certificate.... 2 Using Firefox to obtain your certificate.... 2 Using Internet Explorer

More information

An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity

An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity Amang Sudarsono, Toru Nakanishi, Nobuo Funabiki Abstract An anonymous credential system allows the user to convince

More information

PayThankYou LLC Privacy Policy

PayThankYou LLC Privacy Policy PayThankYou LLC Privacy Policy Last Revised: August 7, 2017. The most current version of this Privacy Policy may be viewed at any time on the PayThankYou website. Summary This Privacy Policy covers the

More information

RAKUNA s PRIVACY POLICY

RAKUNA s PRIVACY POLICY RAKUNA s PRIVACY POLICY RAKUNA (the Company ) is committed to maintaining robust privacy protections for its users. Our Privacy Policy ( Privacy Policy ) is designed to help you understand how we collect,

More information

PRIVACY POLICY CHILDREN S PRIVACY

PRIVACY POLICY CHILDREN S PRIVACY PRIVACY POLICY The Community Foundation of Greater Memphis (referenced herein as Foundation, we or us ) respects the privacy of visitors to our website. Please read this Privacy Policy carefully so that

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

CS Computer and Network Security: PKI

CS Computer and Network Security: PKI CS 5410 - Computer and Network Security: PKI Professor Kevin Butler Fall 2015 Reminders No in-person class on Friday, October 2nd. We have pre-recorded the second half of the PKI lecture which will be

More information

Configuring SSL Security

Configuring SSL Security CHAPTER9 This chapter describes how to configure SSL on the Cisco 4700 Series Application Control Engine (ACE) appliance. This chapter contains the following sections: Overview Configuring SSL Termination

More information

Digital Cash Systems

Digital Cash Systems Digital Cash Systems Xiang Yin Department of Computer Science McMaster University December 1, 2010 Outline 1 Digital Cash 2 3 4 5 Digital Cash Overview Properties Digital Cash Systems Digital Cash Digital

More information

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN SESSION ID: GPS-R09B BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN Sid Desai Head of Business Development Remme.io @skd_desai Agenda Our relationship to our digital-selves Evolution of Authentication

More information

OpenbankIT: a banking platform for e- money management based on blockchain technology

OpenbankIT: a banking platform for e- money management based on blockchain technology OpenbankIT: a banking platform for e- money management based on blockchain technology Dr. Pavel Kravchenko, Sergiy Vasilchuk, Bohdan Skriabin pavel@distributedlab.com, vsv@atticlab.net, bohdan@distributedlab.com

More information

CS 395T. Formal Model for Secure Key Exchange

CS 395T. Formal Model for Secure Key Exchange CS 395T Formal Model for Secure Key Exchange Main Idea: Compositionality Protocols don t run in a vacuum Security protocols are typically used as building blocks in a larger secure system For example,

More information

OPC UA security management with GDS

OPC UA security management with GDS security management with GDS Application Discovery PKI Certificate Management User Management PubSub Security Key Management www.unifiedautomation.com 2 Unified Automation GDS Unified Automation SDK Products

More information

Emsi Privacy Shield Policy

Emsi Privacy Shield Policy Emsi Privacy Shield Policy Scope The Emsi Privacy Shield Policy ( Policy ) applies to the collection and processing of Personal Data that Emsi obtains from Data Subjects located in the European Union (

More information

Avira Certification Authority Policy

Avira Certification Authority Policy Avira Certification Authority Policy Version: 1.0 Status: Draft Updated: 2010-03-09 Copyright: Avira GmbH Author: omas Merkel Introduction is document describes the Certification Policy (CP) of Avira Certification

More information

Security protocols and their verification. Mark Ryan University of Birmingham

Security protocols and their verification. Mark Ryan University of Birmingham Security protocols and their verification Mark Ryan University of Birmingham Contents 1. Authentication protocols (this lecture) 2. Electronic voting protocols 3. Fair exchange protocols 4. Digital cash

More information