IRMA: I Reveal My Attributes

Size: px
Start display at page:

Download "IRMA: I Reveal My Attributes"

Transcription

1 IRMA: I Reveal My Attributes Roland van Rijswijk - Deij roland.vanrijswijk@surfnet.nl rijswijk@cs.ru.nl

2 Project partners 2

3 What is an attribute? An attribute is a property of a person: Full name Date of birth Social Security Number address Over 18 Younger than 65 Student Enrolled curriculum Home institution (university, college,...)... 3

4 We are already using attributes The identity federations used in academia rely heavily on the use CONEXT of attributes (e.g. SURFconext or InCommon) Most identity federations rely on the SAML2 protocol Authentication in SAML2 relies on release of attributes about a user by an IdP to an SP 4

5 Attribute-based Authentication Issuer In a federation: Identity Provider (IdP) ➊ ➋ In a federation: Service Provider (SP) User ➍ ➌ Relying Party 5

6 Privacy and Attributes There are two kinds of attributes: Non-identifying attributes (e.g. over 18 ) Identifying attributes (e.g. name, SSN, address,...) Users traditionally have little control over their privacy In some federations this situation is improving with the introduction of user consent 6

7 Technology under the hood of IRMA IRMA is based on the Idemix technology, developed by J. Camenisch and A. Lysyanskaya at IBM Research in Zürich Idemix is an extremely privacy-friendly attributebased authentication technology Idemix gives the user full control over her attributes 7

8 Key properties of IRMA Key properties of the technology behind IRMA: Non-transferability Attributes are protected against copying Issuer unlinkability Issuers of attributes cannot trace use of these attributes Multi-show unlinkability Colluding service providers cannot retrace use of attributes to an identifiable user These properties rely on novel cryptographic techniques like zero-knowledge proofs and blind signatures 8

9 Zero-knowledge Proofs A Peggy Victor B 9

10 Zero-knowledge Proofs Victor A B 10

11 Zero-knowledge Proofs Victor A B 10

12 Zero-knowledge Proofs Victor A B 10

13 Zero-knowledge Proofs A B 11

14 Zero-knowledge Proofs A B B 11

15 Zero-knowledge Proofs A B 12

16 Zero-knowledge Proofs A OK! B 12

17 Zero-knowledge Proofs A Peggy Victor B 13

18 Zero-knowledge Proofs Victor A B 14

19 Zero-knowledge Proofs Victor A B 14

20 Zero-knowledge Proofs A B 15

21 Zero-knowledge Proofs A A B 15

22 Zero-knowledge Proofs A B 16

23 Zero-knowledge Proofs After 20 iterations the probability that Peggy correctly guesses the exit path chosen by Victor is less than 1 in 1.05 million A OK! B 16

24 Structure of Credentials secret key attributes issuer's digital signature Credentials consist of: A secret key A number of attributes that can be revealed independently (called selective disclosure) A digital signature by the credential issuer 17

25 Examples of Credentials Minimum age 12 years 16 years 18 years 21 years Seniority 50 years 60 years 65 years 75 years Anonymous (Partially) identifying Address Country City Street + number ZIP ID SSN Date-of-birth Place-of-birth Sex 18

26 IRMA smart card Front Back MULTOS smart card with Idemix implementation Only identifying information is a photo 19

27 Demonstration DEMONSTRATION 20

28 Point-of-Sales terminal demo 21

29 Pilot Project We have recently started with a pilot project Participants are students and staff of the Kerckhoffs institute about 100 students some 20 people in the staff Goal of this project is to trial the IRMA card in practice, with real users 22

30 Use cases Online: Reduced price for software purchased online ( SURFspot ) Access to course-related materials (e.g. grading of teachers)... (suggestions welcome) Offline: Reduced price coffee at several teaching locations Free printing for students at one teaching location... (suggestions welcome) 23

31 External Interest Over the course of the project we have organised (and will organise) public meetings There is a broad interest from business and government E.g. Ministry of Internal Affairs, Tax Office, DMV Ministry of IA has funded additional work 24

32 Future Work Revocation of credentials is an open problem and subject to extensive research Interaction with the user is another open issue Which attributes are to be revealed is now listed on a webpage owned by the relying party We want to perform a user study after the pilot 25

33 Conclusions IRMA shows that privacy and strong authentication are not mutually exclusive Authentication does not require identification Attributes have the future, also outside of identity federations The technology is promising but more research is required to lift it to production ready status 26

34 Questions? Remarks?

Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli

Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli Privacy with attribute-based credentials ABC4Trust Project Fatbardh Veseli Deutsche Telekom Chair for Mobile Business and Multilateral Security Goethe University Frankfurt, Germany fatbardh.veseli@m-chair.de

More information

U-Prove Technology Overview

U-Prove Technology Overview U-Prove Technology Overview November 2010 TOC Introduction Community Technology Preview Additional Capabilities RSA Demo Conclusion 2 Introduction History U-Prove well established in academia Patent portfolio

More information

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation Identity Mixer: From papers to pilots and beyond Gregory Neven, IBM Research Zurich Motivation Online security & trust today: SSL/TLS for encryption and server authentication Username/password for client

More information

Attribute-based Credentials on Smart Cards

Attribute-based Credentials on Smart Cards Attribute-based Credentials on Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Privacy & Identity Lab Institute for Computing and Information Sciences Digital Security SaToSS Research Meeting 28th February

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop

More information

SWAMID Person-Proofed Multi-Factor Profile

SWAMID Person-Proofed Multi-Factor Profile Document SWAMID Person-Proofed Multi-Factor Profile Identifier http://www.swamid.se/policy/assurance/al2mfa Version V1.0 Last modified 2018-09-12 Pages 10 Status FINAL License Creative Commons BY-SA 3.0

More information

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich

More information

Genesis Credit Portal Reference Guide

Genesis Credit Portal Reference Guide Genesis Credit Portal Reference Guide (Pre-Screen esign ) https://partners.mygenesiscredit.com Click the Pre-Screen navigation box. Have the applicant sign and date the Customer Information Authorization

More information

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research

More information

Cryptographic dimensions of Privacy

Cryptographic dimensions of Privacy PRIVACY SUMMIT 2016 The Alain Turing Institute Cryptographic dimensions of Privacy Dr. Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch

More information

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains Verifiable Anonymous Identities and Access Control in Permissioned Blockchains Thomas Hardjono MIT Internet Trust Consortium Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: hardjono@mit.edu

More information

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research Credentials: Motivation ID cards Sometimes used for other uses E.g. prove you re over 21, or

More information

Covert Identity Information in Direct Anonymous Attestation (DAA)

Covert Identity Information in Direct Anonymous Attestation (DAA) Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de

More information

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014

CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 CONNECT TRANSIT CARD Pilot Program - Privacy Policy Effective Date: April 18, 2014 1. Welcome 1.1 Welcome to the Connect Transit Card Program. The Connect Card Program makes using public transit easier

More information

Federated Authentication for E-Infrastructures

Federated Authentication for E-Infrastructures Federated Authentication for E-Infrastructures A growing challenge for on-line e-infrastructures is to manage an increasing number of user accounts, ensuring that accounts are only used by their intended

More information

ECA Trusted Agent Handbook

ECA Trusted Agent Handbook Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name:_Gale_Cengage Learning Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Efficient, broad-based solution for a Swiss digital ID

Efficient, broad-based solution for a Swiss digital ID Press release November 21, 2017 Government and private sector produce joint solution Efficient, broad-based solution for a Swiss digital ID The people of this country should have a simple, secure and unambiguous

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Society of Chemistry Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

INTERNET BASICS 1. Introduction to the Internet

INTERNET BASICS 1. Introduction to the Internet INTERNET BASICS 1 Introduction to the Internet Level: Media Needed: All ESL Levels Computer Learn New Words Do this page at your desk. Directions: Write the words. (choose) select select scroll bar s Back

More information

HOW TO RECEIVE YOUR JAMES MADISON UNIVERSITY COOPERATING TEACHER HONORARIUM

HOW TO RECEIVE YOUR JAMES MADISON UNIVERSITY COOPERATING TEACHER HONORARIUM HOW TO RECEIVE YOUR JAMES MADISON UNIVERSITY COOPERATING TEACHER HONORARIUM Thank you for hosting a James Madison University student teacher. Please complete the following after the first 2 weeks of student

More information

Lecture Notes 14 : Public-Key Infrastructure

Lecture Notes 14 : Public-Key Infrastructure 6.857 Computer and Network Security October 24, 2002 Lecture Notes 14 : Public-Key Infrastructure Lecturer: Ron Rivest Scribe: Armour/Johann-Berkel/Owsley/Quealy [These notes come from Fall 2001. These

More information

2015 AmeriHealth New Jersey Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS

2015 AmeriHealth New Jersey Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS 2015 AmeriHealth New Jersey Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS SALES SENTINEL LINK The Sales Sentinel link below should be used for Flexible Benefits Plans affiliated selling agents and

More information

Continuing Education

Continuing Education Continuing Education Attendance & Grade Roster Training Documentation 7/21/08 1 Welcome to CE Faculty Web Services. This page can be accessed using: http://cefaculty.sdccd.edu or via the District Web Page.

More information

Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems Anja Lehmann IBM Research Zurich ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving

More information

Facilitating the Attribute Economy. David W Chadwick George Inman, Kristy Siu 2011 University of Kent

Facilitating the Attribute Economy. David W Chadwick George Inman, Kristy Siu 2011 University of Kent Facilitating the Attribute Economy David W Chadwick George Inman, Kristy Siu University of Kent 2011 University of Kent Internet 2 Fall 2011 Member Meeting 1 (Some) Attribute AuthzRequirements Attributes

More information

U.S. E-Authentication Interoperability Lab Engineer

U.S. E-Authentication Interoperability Lab Engineer Using Digital Certificates to Establish Federated Trust chris.brown@enspier.com U.S. E-Authentication Interoperability Lab Engineer Agenda U.S. Federal E-Authentication Background Current State of PKI

More information

Trusted Computing: Introduction & Applications

Trusted Computing: Introduction & Applications Trusted Computing: Introduction & Applications Lecture 5: Remote Attestation, Direct Anonymous Attestation Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt,

More information

Data Sharing Project CompTIA Update

Data Sharing Project CompTIA Update Data Sharing Project CompTIA Update Gretchen Koch December 17, 2014 Certification Data Exchange Project Phase I CompTIA & IL Community College Board (ICCB) Pilot Project Phase II Opened up to other states.

More information

Creating a Parent Portal Account

Creating a Parent Portal Account Creating a Parent Portal Account Step 1: Go to https://focus.bayschools.net/focus/auth Step 2: Click on I DO NOT have an Account Registered on the Parent Portal but my child is Actively Enrolled Welcome

More information

Member Access User Guide Edit My Profile

Member Access User Guide Edit My Profile UMN.8.015 Revised Date: 10/7/2008 Edit My Profile 3.0 EDIT MY PROFILE 3.1 Overview Click Edit My Profile to update your email address, phone number, or change your Password. Simply enter the new information.

More information

MyUni - Discussion Boards, Blogs, Wikis & Journals

MyUni - Discussion Boards, Blogs, Wikis & Journals - Discussion Boards, Blogs, Wikis & Journals Discussion Boards... 2 Create a discussion board forum... 2 Discussion Board Threads... 2 Create a thread... 2 Reply to a thread... 2 Forum settings... 3 Edit

More information

D3.1 Scientific comparison of ABC protocols

D3.1 Scientific comparison of ABC protocols -Based Credentials for Trust D3.1 Scientific comparison of ABC protocols Part II: Practical comparison Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna

More information

Privacy Privacy Preserving Authentication Schemes: Theory and Applications

Privacy Privacy Preserving Authentication Schemes: Theory and Applications Privacy Privacy Preserving Authentication Schemes: Theory and Applications 18 th Infocom World, Athens, Greece, 2016 Yannis C. Stamatiou Computer Technology Institute & Press Diophantus and Business Administration

More information

Trusted National Identity Schemes. Coralie MESNARD

Trusted National Identity Schemes. Coralie MESNARD Trusted National Identity Schemes Coralie MESNARD Worldwide digital transactions are booming Digitization The number of G2C digital transactions is said to grow 30% by 2020 Privacy - Convenience Citizens

More information

SYDNEY FESTIVAL PRIVACY POLICY

SYDNEY FESTIVAL PRIVACY POLICY 1. Level 5, 10 Hickson Road The Rocks Sydney NSW 2000 Australia Phone 61 2 8248 6500 Fax 61 2 8248 6599 sydneyfestival.org.au ABN 60 070 285 344 SYDNEY FESTIVAL PRIVACY POLICY Our Commitment to your Privacy

More information

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model

TRUST IDENTITY. Trusted Relationships for Access Management: AND. The InCommon Model TRUST. assured reliance on the character, ability, strength, or truth of someone or something - Merriam-Webster TRUST AND IDENTITY July 2017 Trusted Relationships for Access Management: The InCommon Model

More information

Enterprise Privacy and Federated Identity Management

Enterprise Privacy and Federated Identity Management Enterprise Privacy and Federated Identity Management Michael Waidner IBM Zurich Research Lab & IBM Privacy Research Institute April 2003 Outline 1. Motivation 2. Enterprise Privacy Management 3. Federated

More information

SECTION 2: PROGRAM IDENTIFICATION

SECTION 2: PROGRAM IDENTIFICATION UTAH REGISTRY FOR PROFESSIONAL DEVELOPMENT PROFESSIONAL DEVELOPMENT INCENTIVE APPLICATION SECTION 1: CANDIDATE IDENTIFICATION (Use through 7/1/2017 5/31/2018) DATE OF BIRTH / / FILL OUT PAGE 1 OF THE ATTACHED

More information

On the Revocation of U-Prove Tokens

On the Revocation of U-Prove Tokens On the Revocation of U-Prove Tokens Christian Paquin, Microsoft Research September nd 04 U-Prove tokens provide many security and privacy benefits over conventional credential technologies such as X.509

More information

Federated authentication for e-infrastructures

Federated authentication for e-infrastructures Federated authentication for e-infrastructures 5 September 2014 Federated Authentication for E-Infrastructures Jisc Published under the CC BY 4.0 licence creativecommons.org/licenses/by/4.0/ Contents Introduction

More information

Mobile Driver s License Region IV May 24, 2017 Seattle, WA

Mobile Driver s License Region IV May 24, 2017 Seattle, WA Mobile Driver s License 2017 Region IV May 24, 2017 Seattle, WA Presenter: Loffie Jordaan Senior Project Manager, AAMVA 2 Introduction & background CDS Committee & eid WG What is a mdl? Functional requirements

More information

Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden

Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden Gerri Holden Ministries Executive Summary Student Consultant, Kate Stepp Community Partner, Gerri Holden I. Background Information The mission of Gerri Holden Ministries is to provide academic programs

More information

Measuring Authentication: NIST and Vectors of Trust

Measuring Authentication: NIST and Vectors of Trust SESSION ID: IDY-F01 Measuring Authentication: NIST 800-63 and Vectors of Trust auth Sarah Squire Senior Identity Solution Architect Engage Identity @SarahKSquire Eyewitness News 3 A Play in Five Acts

More information

2015 Independence Blue Cross Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS

2015 Independence Blue Cross Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS 2015 Independence Blue Cross Sales Sentinel User Guide FLEXIBLE BENEFITS PLANS SALES SENTINEL LINK The Sales Sentinel link below should be used for Flexible Benefits Plans affiliated selling agents and

More information

Privacy-preserving PKI design based on group signature

Privacy-preserving PKI design based on group signature Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2011 Privacy-preserving PKI design based on group signature Sokjoon

More information

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels /

PRISMACLOUD. Privacy and Security Maintaining Services in the Cloud Thomas Loruenser. CSP2015 Brussels / PRISMACLOUD Privacy and Security Maintaining Services in the Cloud Thomas Loruenser CSP2015 Brussels / 29.04.2015 Challenges for future ICT Cloud computing will be at the heart of future ICT systems The

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name:_Unversity of Regina Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Personal Data collected for the following purposes and using the following services: Personal Data: address, first name and last name

Personal Data collected for the following purposes and using the following services: Personal Data:  address, first name and last name Privacy Policy This Application collects some Personal Data from its Users. POLICY SUMMARY Personal Data collected for the following purposes and using the following services: Contacting the User Contact

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

SWAMID Identity Assurance Level 2 Profile

SWAMID Identity Assurance Level 2 Profile Document SWAMID Identity Assurance Level 2 Profile Identifier http://www.swamid.se/policy/assurance/al2 Version V1.0 Last modified 2015-12-02 Pages 11 Status FINAL License Creative Commons BY-SA 3.0 SWAMID

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Lynda.com Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Polymorphic Encryption and Pseudonymization in the Dutch eid scheme. IRMA meeting, 23 September 2016

Polymorphic Encryption and Pseudonymization in the Dutch eid scheme. IRMA meeting, 23 September 2016 1 Polymorphic Encryption and Pseudonymization in the Dutch eid scheme Eric.Verheul@logius.nl IRMA meeting, 23 September 2016 1 2 Agenda Background on the Dutch eid scheme The Dutch eid Introduction Plateau

More information

PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale

PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale PRIMA: Privacy-Preserving Identity and Access Management at Internet-Scale Muhammad Rizwan Asghar Department of Computer Science The University of Auckland Michael Backes CISPA, Saarland University & MPI-SWS

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

NASS Remote Notarization Task Force

NASS Remote Notarization Task Force NASS Remote Notarization Task Force Knowledge-Based Verification David Temoshok Applied Cybersecurity IT Laboratory National Institute of Standards and Technology (NIST) 2/23/2017 1 Today s Discussion

More information

Using Trusted Execution Environments in Two-Factor Authentication

Using Trusted Execution Environments in Two-Factor Authentication Using Trusted Execution Environments in Two-Factor Authentication Roland van Rijswijk-Deij M.Sc. rijswijk@cs.ru.nl http://www.cs.ru.nl/~rijswijk/ nstitute for Computing and nformation Sciences Digital

More information

How to Use the LaunchBoard Contract Education Tool

How to Use the LaunchBoard Contract Education Tool How to Use the LaunchBoard Contract Education Tool The Contract Education Tool can be used to record students' participation in contract education. Information is gathered by creating discrete training

More information

D2.2 - Architecture for Attribute-based Credential Technologies - Final Version

D2.2 - Architecture for Attribute-based Credential Technologies - Final Version D2.2 - Architecture for Attribute-based Credential Technologies - Final Version Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory

More information

Combining ABCs with ABE

Combining ABCs with ABE Combining ABCs with ABE T. R. van de Kamp Combining ABCs with ABE Privacy-Friendly Key Generation for Smart Card Based Attribute-Based Encryption 2014 Master s thesis Computer Science, Services, Cybersecurity,

More information

ABOUT THE DELTEK CERTIFICATION PROGRAM

ABOUT THE DELTEK CERTIFICATION PROGRAM DELTEK CERTIFICATION POLICY AND AGREEMENT Deltek offers certification exams to help identify people with Deltek skills and to enable individuals to distinguish themselves and validate their experience

More information

Electronic ID at work: issues and perspective

Electronic ID at work: issues and perspective Electronic ID at work: issues and perspective Antonio Lioy < lioy @ polito.it > Politecnico di Torino Dip. Automatica e Informatica Why should I have/use an (e-) ID? to prove my identity to an "authority":

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue

More information

Conceptual Data Modeling and the Entity- Relationship Model. Department of Computer Science Northern Illinois University September 2014

Conceptual Data Modeling and the Entity- Relationship Model. Department of Computer Science Northern Illinois University September 2014 Conceptual Data Modeling and the Entity- Relationship Model Department of Computer Science Northern Illinois University September 2014 Data Models A means of describing the structure of the data A set

More information

Rhode Island Medicaid Provider Enrollment User Guide. Executive Office of Health and Human Services Medicaid

Rhode Island Medicaid Provider Enrollment User Guide. Executive Office of Health and Human Services Medicaid Rhode Island Executive Office of Health and Human Services Medicaid Ordering, Prescribing, Referring Provider User Guide Version 1.0 DXC Technology PR0123 V1.0 06/19/2017 Rhode Island Page 1 of 24 Revision

More information

Side-channel attacks on the IRMA card

Side-channel attacks on the IRMA card Radboud University Nijmegen Master Thesis Computer Science Side-channel attacks on the IRMA card April 1, 2014 Author: C.W.T.P. Thijssen, BSc. christiaanthijssen@gmail.com Supervisors: Prof. dr. B.P.F.

More information

Task: Design an ER diagram for that problem. Specify key attributes of each entity type.

Task: Design an ER diagram for that problem. Specify key attributes of each entity type. Q1. Consider the following set of requirements for a university database that is used to keep track of students transcripts. (10 marks) 1. The university keeps track of each student s name, student number,

More information

Attribute-based Authentication

Attribute-based Authentication Attribute-based Authentication Privacy and Identity Bart Jacobs and Gergely Alpár Institute for Computing and Information Sciences Digital Security Radboud University 5th January 2016 Page 1 of 46 Jacobs

More information

How to Activate Your Tk20 Account for SHSU Students

How to Activate Your Tk20 Account for SHSU Students How to Activate Your Tk20 Account for SHSU Students Who Needs To Have an Activated Tk20 Account? All undergraduate and post-baccalaureate students seeking initial teacher certification. This includes graduate

More information

MERLIN Documentation Applicant Interface

MERLIN Documentation Applicant Interface MERLIN Documentation: Applicant Interface 1 MERLIN Documentation Applicant Interface Table of Contents Getting Started... 1 Creating a Merlin Account... 2 Starting an Application... 3 HSC General Information

More information

Pennsylvania Certification by Endorsement

Pennsylvania Certification by Endorsement Pennsylvania Certification by Endorsement Thank you for your interest in obtaining Pennsylvania EMS Certification by Endorsement. This is the process whereby a person certified by a state other than Pennsylvania

More information

Digital Identity Guidelines aka NIST SP March 1, 2017 Ken Klingenstein, Internet2

Digital Identity Guidelines aka NIST SP March 1, 2017 Ken Klingenstein, Internet2 Digital Identity Guidelines aka NIST SP 800-63 March 1, 2017 Ken Klingenstein, Internet2 Topics 800-63 History and Current Revision process Caveats and Comments LOA Evolution Sections: 800-63A (Enrollment

More information

Step 1: Completing the CCCApply and Cabrillo Application (TO BE COMPLETED FROM OCT 1 st and ON)

Step 1: Completing the CCCApply and Cabrillo Application (TO BE COMPLETED FROM OCT 1 st and ON) Step 1: Completing the CCCApply and Cabrillo Application (TO BE COMPLETED FROM OCT 1 st and ON) Information Needed Before Applying Before beginning the Cabrillo application have the following information

More information

Returning student-athletes

Returning student-athletes v. 3-16-18 - Contact Jcampbell@vivature.com for edits. Page 1 Click ONE of the three boxes below. Click links throughout to navigate instructions. Returning student-athletes I DO NOT KNOW/REMEMBER my Athletic

More information

10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims

10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims 10 minutes, 10 slides, goals, tech details and why it matters Decentralized ID & Verifiable Claims Terminology & Current Model Claim or Assertion a claim or way of communicating what a person or thing

More information

Where we are, so far. IRMA history, in two phases. IRMA overview. Cryptographic essentials. IRMA in action. Conclusions

Where we are, so far. IRMA history, in two phases. IRMA overview. Cryptographic essentials. IRMA in action. Conclusions Attribute-based Authentication and Signing with IRMA Summer School on real-world crypto and privacy Bart Jacobs Radboud University and Privacy by Design foundation bart@cs.ru.nl Šibenik, Croatia, 15 June

More information

LOG IN AT THE APPLICATION PORTAL

LOG IN AT THE APPLICATION PORTAL LOG IN AT THE APPLICATION PORTAL You log in to the Application Portal through WAYF (Where Are You From), a national login service, which is used by Danish universities, NemID, etc. There are three different

More information

All about SAML End-to-end Tableau and OKTA integration

All about SAML End-to-end Tableau and OKTA integration Welcome # T C 1 8 All about SAML End-to-end Tableau and OKTA integration Abhishek Singh Senior Manager, Regional Delivery Tableau Abhishek Singh Senior Manager Regional Delivery asingh@tableau.com Agenda

More information

Dissecting NIST Digital Identity Guidelines

Dissecting NIST Digital Identity Guidelines Dissecting NIST 800-63 Digital Identity Guidelines KEY CONSIDERATIONS FOR SELECTING THE RIGHT MULTIFACTOR AUTHENTICATION Embracing Compliance More and more business is being conducted digitally whether

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Concordia University of Edmonton Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that

More information

If you have any questions or concerns about this Privacy Policy, please Contact Us.

If you have any questions or concerns about this Privacy Policy, please Contact Us. Illuminate Education Your Privacy Rights Are Important To Us The privacy of students and their parents and guardians is important to Illuminate Education, Inc. ( Illuminate ) and the teachers, administrators,

More information

Protecting Your Gear, Your Work & Cal Poly

Protecting Your Gear, Your Work & Cal Poly 9/20/2016 1 Protecting Your Gear, Your Work & Cal Poly Information Security Office Shar i f Shar i f i, CI SSP, CRISC Kyle Gustafson, Information Security Analyst Jon Vasquez, Information Security Analyst

More information

Digital Identity Modelling and Management

Digital Identity Modelling and Management Digital Identity Modelling and Management by Sittampalam Subenthiran Supervisor Dr Johnson Agbinya Thesis submitted to the University of Technology, Sydney in total fulfilment of the requirement for the

More information

Direct Anonymous Attestation

Direct Anonymous Attestation Direct Anonymous Attestation Revisited Jan Camenisch IBM Research Zurich Joint work with Ernie Brickell, Liqun Chen, Manu Drivers, Anja Lehmann. jca@zurich.ibm.com, @JanCamenisch, ibm.biz/jancamenisch

More information

Identity Proofing Standards and Beyond

Identity Proofing Standards and Beyond Solutions for Health Care Providers Identity Proofing Standards and Beyond Kimberly Little Sutherland LexisNexis Risk Solutions Sr. Director, Identity Management Solution Strategy Agenda Identity Proofing

More information

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman

Public Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National

More information

A privacy-preserving authentication service using mobile devices

A privacy-preserving authentication service using mobile devices A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power

More information

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions?

Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Will Federated Cross Credentialing Solutions Accelerate Adoption of Smart Card Based Identity Solutions? Jack Radzikowski,, Northrop Grumman & FiXs Smart Card Alliance Annual Meeting La Jolla, California

More information

CPE Webcast Encrypting PDF Files in Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by:

CPE Webcast Encrypting PDF Files in  Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by: CPE Webcast Encrypting PDF Files in Email Attachments: Reduce Risk, Automation & Compliance Presented by: Sponsored by: Administrative Items 100 120 Minutes (Education, Demo, Q&A) Participants are muted.

More information

Welcome to the Guest Access Portal

Welcome to the Guest Access Portal Welcome to the Guest Access Portal The Guest Access Portal allows students to grant a guest, such as a parent or spouse, access to view their education records in Banner Self-Service. Only students may

More information

New user introduction to Attend

New user introduction to Attend 1 New user introduction to Attend 1. Sign up to Attend... 2 2. First Steps Create a Course... 2 3. Sharing your course... 4 4. Viewing the course participants... 5 5. Create a new member of Staff... 6

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources being accessed, and that Participants

More information

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift

Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) ATTPS. Achieving The Trust Paradigm Shift Deliverable D3.5 Harmonised e-authentication architecture in collaboration with STORK platform (M40) Version 1.0 Author: Bharadwaj Pulugundla (Verizon) 25.10.2015 Table of content 1. Introduction... 3

More information

Configuring EAP for Wireless Network Connectivity By Victor Zapata

Configuring EAP for Wireless Network Connectivity By Victor Zapata Configuring EAP for Wireless Network Connectivity By Victor Zapata Requirements: 1. Windows 2000 Domain Controller Service Pack 2 with hotfixes Q306260 and Q304347 OR Service Pack 3 2. Enterprise Certificate

More information

An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity

An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity An Implementation of a Pairing-Based Anonymous Credential System with Constant Complexity Amang Sudarsono, Toru Nakanishi, Nobuo Funabiki Abstract An anonymous credential system allows the user to convince

More information

De Montfort Students Union Student Data Privacy Statement

De Montfort Students Union Student Data Privacy Statement De Montfort Students Union Student Data Privacy Statement Introduction De Montfort Students Union (DSU) promises to respect any personal data you share with us, or that we get from other organisations

More information

HANDWRITTEN FORMS WILL NOT BE ACCEPTED APPLICATION MUST BE SINGLE SIDED DO NOT STAPLE. Directions for Completion of the IRB Application Form

HANDWRITTEN FORMS WILL NOT BE ACCEPTED APPLICATION MUST BE SINGLE SIDED DO NOT STAPLE. Directions for Completion of the IRB Application Form HANDWRITTEN FORMS WILL NOT BE ACCEPTED APPLICATION MUST BE SINGLE SIDED DO NOT STAPLE Directions for Completion of the IRB Application Form Handwritten forms will not be accepted. Check boxes by double

More information

HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL

HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL HIPAA and Research Contracts JILL RAINES, ASSISTANT GENERAL COUNSEL AND UNIVERSITY PRIVACY OFFICIAL Just a Few Reminders HIPAA applies to Covered Entities HIPAA is a federal law that governs the privacy

More information