Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich

Size: px
Start display at page:

Download "Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems. Anja Lehmann IBM Research Zurich"

Transcription

1 Privacy-Enhancing Technologies: Anonymous Credentials and Pseudonym Systems Anja Lehmann IBM Research Zurich

2 ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving & auditable data exchange 2

3 Strong User Authentication Strong (user) authentication via certificates / attribute-based credentials Many European countries have or will introduce e cards Desirable for security, but detrimental for privacy Existing schemes require full information disclosure & user is linkable in all transactions This is a privacy and security problem! Linkability enables tracking & profiling of users Acquired personal data requires protection Aha, you are Alice Doe born on Dec 12, 1978 live at Waterdrive 22, Berlin e expires Aug 4, 2018 Name Alice Doe Date Of Birth Dec 12, 1978 Address Waterdrive 22 City Berlin Country Germany Expiry Date Aug 4, 2018 Service Provider Movie Streaming Service 3

4 Strong & Privacy-Preserving User Authentication Envisioned by Chaum in 1981, first full scheme by Camenisch & Lysyanskaya in 2001 User can selectively disclose each attribute User can prove predicates over the attributes, e.g., I'm over 18 Unlinkable authentication as default, linkability as an option Pseudonym Moviefan Name Alice Doe Date of Birth > 18 years ago Address 7 Waterdrive City 8003 Zurich Country Germany Expiry Date > today Service Provider Aha, you are user Moviefan, from Germany, have valid e and are over 18! Movie Streaming Service 4

5 Strong & Privacy-Preserving User Authentication Envisioned by Chaum in 1981, first full scheme by Camenisch & Lysyanskaya in 2001 User can selectively disclose each attribute User can prove predicates over the attributes, e.g., I'm over 18 Unlinkable authentication as default, linkability as an option Aha, you have are user Alice2000,... Pseudonym Alice200 Name Alice Doe Date of Birth > 18 years ago Address 7 Waterdrive City 8003 Zurich Country Germany Expiry Date > today Service Provider Alice2000 = Moviefan? Movie Streaming Service 5

6 Privacy-Enhancing Credentials Existing Solutions Most prominent core-credential/signature schemes: Identity Mixer (IBM) U-Prove (Microsoft) 6 Multi-use credentials Zero-Knowledge Proofs Strong RSA, pairings (LRSW, qsdh) One-time use credentials (multi-use via batch-issuance) Blind Signatures RSA, DL

7 Privacy-Enhancing Credentials Extended Features Many more extensions & properties: Revocation, multi-credential proofs, issuance with carry-over attributes, conditional disclosure, symmetric credentials Various cryptographic realizations 7

8 Privacy-Enhancing Credentials Generic Framework ABC4Trust (EU project) Technology-independent & easy-to-use framework Comprehensive & standardized language framework Technology-agnostic credential & policy handling on top of crypto engine Generic, automated crypto engine request resource application layer Credential Wallet Browser/ Application presentation policy presentation token Application Access Control Engine policy layer User Credential Engine policy credential matcher evidence generation orchestration storage credential mgr Verifier Credential Engine policy token matcher evidence verification orchestration storage token mgr crypto layer Crypto Engine ZKP Sig Crypto Engine Com ZKP Sig Com 8

9 Privacy-Enhancing Credentials New Applications V2X communication (vehicles (V2V) and infrastructure (V2I)) Security needs: authentication & privacy Current approach: pseudonym CA Privacy-credentials fit perfectly! (almost) Pseudonym CA status msg revocation status Long-term CA long-term certificate pseudonym certificates Hardware-based device/user attestation (DAA) Draft for FO standard TPM FO ("Fast entity Online") Alliance = industry consortium developing standardized strong user/device authentication Blockchain: eternal and public transaction ledger Privacy credentials needed to avoid privacy nightmare Identity Mixer being integrated into Hyperledger Fabric IBM joined the Sovrin Foundation decentralized digital identity network 9

10 ROADMAP Anonymous Credentials privacy-preserving (user) authentication Pseudonym Systems privacy-preserving & auditable data exchange [CL15] Camenisch, Lehmann. (Un)linkable Pseudonyms for Governmental bases. CCS15. [CL17] Camenisch, Lehmann. Privacy-Preserving User-Auditable Pseudonym Systems. IEEE EuroSP17. 10

11 Pseudonym System Motivation How to exchange and correlate (pseudonymous) data? E.g., ehealth records, social security system User-centric conversion inconvenient & unreliable Laboratory Health Insurance Unique Doctor A Hba02 912uj Doctor B Bob.0411 Hospital sd7ab y2b4m 11

12 Pseudonym System Globally Unique Pseudonyms gets associated with globally unique identifiers / pseudonyms E.g., social security number in US, Belgium, Sweden,... Laboratory Health Insurance Unique Bob.0411 Doctor A Hospital Hba02 912uj sd7ab Doctor B Unique identifiers are security & privacy risk y2b4m no control about data exchange & usage if associated data is lost, all pieces can be linked together linkability of data allows re-identification of anonymized data (e.g. Netflix challenge) 12

13 Pseudonym System Local Pseudonyms & Trusted Converter User data is associated with random looking local identifiers the pseudonyms Only central entity the converter can link & convert pseudonyms new Japan e / social security number system (?) Converter Main Doctor A Hospital Alice.1210 Hba02 7twnG Bob.0411 Carol uj sd7ab + control about data exchange Record of from Hospital? Record of? + if records are lost, pieces cannot be linked together Doctor A Hospital Hba02 912uj sd7ab y2b4m 13

14 Pseudonym System Local Pseudonyms & Trusted Converter 14 User data is associated with random looking local identifiers the pseudonyms Only central entity the converter can link & convert pseudonyms User Portal for Bob.0411 Doctor A Hospital. 02/26/2017 Unique Bob.0411 Converter Main Doctor A Hospital Alice.1210 Hba02 7twnG Bob.0411 Carol uj sd7ab + control about data exchange Record of from Hospital? Record of? + if records are lost, pieces cannot be linked together Doctor A Hospital + converter can provide audit logs to users (GDPR-requirement) converter learns all request & knows all correlations Hba02 912uj sd7ab y2b4m

15 Pseudonym System Local Pseudonyms & Oblivious Converter 15 User data is associated with random looking local identifiers the pseudonyms Only central entity the converter can link & convert pseudonyms User Portal for Bob.0411 Doctor A Hospital. 02/26/2017 Unique Bob.0411 Converter Main Doctor A Hospital Alice.1210 Hba02 7twnG Bob.0411 Carol uj sd7ab + control about data exchange Record of from Hospital? Record of? + if records are lost, pieces cannot be linked together Doctor A Hospital + converter can provide audit logs to users (GDPR-requirement) converter learns all request & knows all correlations Hba02 912uj sd7ab y2b4m

16 (Un)linkable Pseudonyms Pseudonym Generation User, converter & server jointly derive pseudonyms from unique identifiers Doctor A Converter Hba02 912uj Hospital Unique Bob.0411 [CL15] generation triggered by converter, knows unique s [CL17] oblivious pseudonym generation triggered by user sd7ab y2b4m 16

17 (Un)linkable Pseudonyms Pseudonym Conversion Only converter can link & convert pseudonyms, but does so in a blind way Converter Record of at Hospital Record of? blind conversion Record of at Hospital Record of at Hospital Doctor A blind conversion request unblinding conversion response Record of? Record of? Hba02 912uj Hospital sd7ab y2b4m 17

18 (Un)linkable Pseudonyms Consistency pseudonym generation is deterministic & consistent with blind conversion Doctor A Converter Hba02 912uj Hospital Unique Bob.0411 sd7ab y2b4m 18

19 (Un)linkable Pseudonyms Consistency pseudonym conversions are transitive, unlinkable data can be aggregated Invoice for Doctor A Hba02 Converter 912uj Invoice for Invoice for RtE14 Insurance Hospital 6Wz6P fx4o7 RtE14 $ $ $ sd7ab y2b4m 19

20 (Un)linkable Pseudonyms User Audits [CL17] every pseudonym conversion triggers blind generation of audit log entry Audit Bulletin Board Converter Doctor A Hba02 912uj Hospital Doctor A Hospital. 02/26/2017 Unique Bob.0411 sd7ab y2b4m 20

21 (Un)linkable Pseudonyms Security Model Universal composability (UC) model convenient & simple for privacy-preserving systems NymGen, S A NymGen, S B F Nyms: [U i, S A, nym i,a ] [U i, S B, nym i,b ]. Conversion: [U i, S A, S B ]. Server S A U i Chooses random pseudonym z, nym i,b,. nym i,a Audit Conversion via Nyms table [U i, S A, S B ] Audit returns Conversion entries for U i Server S B Convert, S A, S B, qid Convert, qid, OK Converter X 21

22 Our Protocol high-level idea of convertible pseudonyms adding (efficient) auditability security against active adversaries

23 High-level Idea Pseudonym Generation Core Idea Generation: X blindly computes nym i,a PRF(k,uid i ) x A pk A,sk A [1] X and U i jointly compute z i OPRF(k,uid i ) k, for each server: x A, x B, x C, Converter X C nym [3] X blindly computes nym i,a C nym C nym xa Server A nym i,a [4] S A decrypts pseudonym nym i,a Dec(sk A,C nym ) nym i,a = PRF(k,uid i ) x A [2] Ui encrypts z i for S A C nym Enc(pk A,z i ) z i C nym uid i 23

24 High-level Idea Pseudonym Conversion Core Idea Generation: X blindly computes nym i,a PRF(k,uid i ) x A Conversion: X blindly computes nym i,b nym i,a xb / xa [1] S A encrypts nym i,a under S B 's key C Enc(pk B, nym i,a ) C, S B, qid Server A pk A,sk A nym i,a Converter X k, for each server: x A, x B, x C, C', S A, qid [2] X blindly transforms encrypted pseudonym C' C Δ with Δ = x B / x A C = Enc(pk B, nym i,a ) x B / xa C ' = Enc(pk B, PRF(k,uid i ) x A ) x B / xa C ' = Enc(pk B, PRF(k,uid i ) x B ) C = Enc(pk B, nym i,b ) Server B pk B,sk B nym i,b [3] S B decrypts converted pseudonym nym i,b Dec(sk B, C ) nym i,b = PRF(k,uid i ) xb 24

25 High-level Idea Overview NymRequest Converter X NymResponse Server A nym i,a Generation Conversion ConvRequest Server A nym i,a Converter X ConvResponse Server B nym i,b 25

26 High-level Idea Adding Auditability usk, upk upk is randomizable encryption key upk RAND(upk) decrypt all audit ciphertexts: info Dec(usk,C*)? NymRequest, upk Converter X NymResponse, upk Server A nym i,a, upk Generation Conversion ConvRequest, upk Server A nym i,a, upk Audit Bulletin Board C* Converter X C* Enc(upk, info) ConvResponse, upk Server B nym i,b, upk 26

27 High-level Idea Adding Efficient Auditability (via Audit Tags) decrypt ciphertext for T A : info Dec(usk,C*) usk, upk, {T A } NymRequest, upk, C T C T Enc(pk A, T A ) for random T A Converter X NymResponse, upk, C T Server A nym i,a, upk, T A T A Dec(sk A, C T ) Generation Conversion ConvRequest, upk, T A Server A nym i,a, upk, T A Audit Bulletin Board T A, C* Converter X C* Enc(upk, info) ConvResponse, upk Server B nym i,b, upk 27

28 High-level Idea Adding Efficient Auditability (via Audit Tags) usk, upk, {T A, T B } decrypt ciphertext for T A : info Dec(usk,C*) C T Enc(pk A, T A ) for random T A get new audit tags for T A : T B Dec(usk, C* TB ) NymRequest, upk, C T Converter X NymResponse, upk, C T Server A nym i,a, upk, T A T A Dec(sk A, C T ) Generation Conversion ConvRequest, upk, T A Server A nym i,a, upk, T A Audit Bulletin Board T A, C* Tag Chain: T A, C* TB Converter X C* Enc(upk, info) ConvResponse, upk C* TB Server B nym i,b, upk, T B C*TB Enc(upk, TB) for random TB 28

29 High-level Idea Adding Efficient Auditability (via Audit Tags) usk, upk, {T A, T B, T A, } decrypt ciphertext for T A : info Dec(usk,C*) C T Enc(pk A, T A ) for random T A get new audit tags for T A : T B Dec(usk, C* TB ) T A Dec(usk, C* TA ) NymRequest, upk, C T Converter X NymResponse, upk, C T Server A nym i,a, upk, T A T A Dec(sk A, C T ) Generation Conversion ConvRequest, upk, T A, C* TA Server A nym i,a, upk, T A Audit Bulletin Board T A, C* Tag Chain: T A, C* TB T A, C* TA Converter X C* Enc(upk, info) ConvResponse, upk C* TB T A C* TA Enc(upk, T A ) for random T A Server B nym i,b, upk, T B C* TB Enc(upk, T B ) for random T B 29

30 High-level Idea Security against Active Adversaries decrypt ciphertext for T A : info Dec(usk,C*) get new audit tags for T A : T B Dec(usk, C* TB ) T A Dec(usk, C* TA ) usk, upk, {T A, T B, T A, } C T Enc(pk A, T A ) for random T A NymRequest, upk, C T Converter X NymResponse, upk, C T Signature scheme for homomorphic encodings Server A nym i,a, upk, T A T A Dec(sk A, C T ) Generation Conversion ConvRequest, upk, T A, C* TA, π A Server A nym i,a, upk, T A Audit Bulletin Board T A, C*, T B, C** Tag Chain: T A, C* TB T A, C* TA Converter X C* Enc(upk, info) ConvResponse, upk C* TB T A C* TA Enc(upk, T A ) for random T A Server B nym i,b, upk, T B C* TB Enc(upk, T B ) for random T B 30

31 (Un)linkable & Auditable Pseudonyms Security & Efficiency Provably secure construction in the Universal Composability (UC) framework based on homomorphic encryption scheme (ElGamal encryption) homomorphic encryption scheme with re-randomizable public keys (ElGamal-based) oblivious pseudorandom function with committed outputs (based on Dodis-Yampolskiy-PRF) signature scheme for homomorphic encoding functions (based on Groth signature scheme) zero-knowledge proofs (Fiat-Shamir NIZKs) commitment scheme (ElGamal based) DDH Secure against actively corrupt users & servers, and honest-but-curious converter (w/o audits even fully corrupt converter [CL15]) Concrete instantiation ~50ms computational time per party for conversion 31

32 Summary Mature privacy-enhancing technologies exist privacy and functionality are not exclusive Linkability crucial for utility, but also weakens privacy Paradigm shift: unlinkability per default, linkability only when necessary Controlled, selective linkability & enforced transparency GDPR creates a great practical demand for privacy-preserving mechanisms data minimisation, consent enforcement, auditability,... Crypto Magic needs education and dissemination! Thanks! Questions? anj@zurich.ibm.com 32

Privacy-Preserving & User-Auditable Pseudonym Systems. Jan Camenisch, Anja Lehmann IBM Research Zurich

Privacy-Preserving & User-Auditable Pseudonym Systems. Jan Camenisch, Anja Lehmann IBM Research Zurich Privacy-Preserving & User-Auditable Pseudonym Systems Jan Camenisch, Anja Lehmann IBM Research Zurich Motivation: How to maintain related yet distributed data? examples: social security system, ehealth

More information

Cryptography 4 People

Cryptography 4 People ZISC Lunch Seminar, ETH Zurich, March 15, 2017 Cryptography 4 People bases Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch Facts We

More information

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich

Privacy-Enhancing Technologies & Applications to ehealth. Dr. Anja Lehmann IBM Research Zurich Privacy-Enhancing Technologies & Applications to ehealth Dr. Anja Lehmann IBM Research Zurich IBM Research Zurich IBM Research founded in 1945 employees: 3,000 12 research labs on six continents IBM Research

More information

Cryptography 4 People

Cryptography 4 People International Workshop on Inference & Privacy in a Hyperconnected World 2016 Cryptography 4 People Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch

More information

Directions in Security Research

Directions in Security Research Directions in Security Research Jan Camenisch IBM Research Zurich jca@zurich.ibm.com @JanCamenisch ibm.biz/jancamenisch Facts 33% of cyber crimes, including identity theft, take less time than to make

More information

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation

Identity Mixer: From papers to pilots and beyond. Gregory Neven, IBM Research Zurich IBM Corporation Identity Mixer: From papers to pilots and beyond Gregory Neven, IBM Research Zurich Motivation Online security & trust today: SSL/TLS for encryption and server authentication Username/password for client

More information

Cryptographic dimensions of Privacy

Cryptographic dimensions of Privacy PRIVACY SUMMIT 2016 The Alain Turing Institute Cryptographic dimensions of Privacy Dr. Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch

More information

Direct Anonymous Attestation

Direct Anonymous Attestation Direct Anonymous Attestation Revisited Jan Camenisch IBM Research Zurich Joint work with Ernie Brickell, Liqun Chen, Manu Drivers, Anja Lehmann. jca@zurich.ibm.com, @JanCamenisch, ibm.biz/jancamenisch

More information

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features

IBM Identity Mixer. Introduction Deployment Use Cases Blockchain More Features Introduction Deployment Use Cases Blockchain More Features IBM Identity Mixer Privacy-preserving identity management and authentication for Blockchain and beyond Dr. Maria Dubovitskaya IBM Research Zurich

More information

Forschungsrichtungen in der IT-Sicherheit

Forschungsrichtungen in der IT-Sicherheit Forschungsrichtungen in der IT-Sicherheit Dr. Jan Camenisch Principle Researcher; Member, IBM Academy of Technology IBM Research Zurich jca@zurich.ibm.com @JanCamenisch ibm.biz/jancamenisch Facts 33% of

More information

Cryptography 4 Privacy

Cryptography 4 Privacy SuRI School of Computer and Communication Sciences EPFL Cryptography 4 Privacy Jan Camenisch Principle RSM; Member, IBM Academy of Technology IBM Research Zurich @JanCamenisch ibm.biz/jancamenisch Facts

More information

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research

Anonymous Credentials: How to show credentials without compromising privacy. Melissa Chase Microsoft Research Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research Credentials: Motivation ID cards Sometimes used for other uses E.g. prove you re over 21, or

More information

A Decade of Direct Anonymous Attestation

A Decade of Direct Anonymous Attestation A Decade of Direct Anonymous Attestation From Research to Standard and Back Jan Camenisch IBM Research Zurich Joint work with Ernie Brickell, Liqun Chen, Manu Drivers, Anja Lehmann. jca@zurich.ibm.com

More information

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric Elli Androulaki Staff member, IBM Research, Zurich Workshop on cryptocurrencies Athens, 06.03.2016 Blockchain systems

More information

Attribute-based Credentials on Smart Cards

Attribute-based Credentials on Smart Cards Attribute-based Credentials on Smart Cards ir. Pim Vullers p.vullers@cs.ru.nl Privacy & Identity Lab Institute for Computing and Information Sciences Digital Security SaToSS Research Meeting 28th February

More information

IBM Identity Mixer. Authentication without identification. Introduction Demo Use Cases Features Overview Deployment

IBM Identity Mixer. Authentication without identification. Introduction Demo Use Cases Features Overview Deployment Introduction Demo Use Cases Features Overview Deployment IBM Identity Mixer Authentication without identification Jan Camenisch, Maria Dubovitskaya, Peter Kalambet, Anja Lehmann, Gregory Neven, Franz-Stefan

More information

Fujitsu World Tour 2018

Fujitsu World Tour 2018 Fujitsu World Tour 2018 May 30, 2018 #FujitsuWorldTour 1 Copyright 2018 FUJITSU Security and Privacy of Big Data A NIST Perspective Arnab Roy Fujitsu Laboratories of America Co-Chair, NIST Big Data WG:

More information

Covert Identity Information in Direct Anonymous Attestation (DAA)

Covert Identity Information in Direct Anonymous Attestation (DAA) Covert Identity Information in Direct Anonymous Attestation (DAA) Carsten Rudolph Fraunhofer Institute for Secure Information Technology - SIT, Rheinstrasse 75, Darmstadt, Germany, Carsten.Rudolph@sit.fraunhofer.de

More information

Cryptography for People

Cryptography for People CySeP2015 Winter School on Cyber Security & Privacy KTH Stockholm Cryptography for People Dr. Jan Camenisch Cryptography & Privacy Principal Research Staff Member Member, IBM Academy of Technology jca@zurich.ibm.com

More information

Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli

Privacy with attribute-based credentials ABC4Trust Project. Fatbardh Veseli Privacy with attribute-based credentials ABC4Trust Project Fatbardh Veseli Deutsche Telekom Chair for Mobile Business and Multilateral Security Goethe University Frankfurt, Germany fatbardh.veseli@m-chair.de

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

U-Prove Technology Overview

U-Prove Technology Overview U-Prove Technology Overview November 2010 TOC Introduction Community Technology Preview Additional Capabilities RSA Demo Conclusion 2 Introduction History U-Prove well established in academia Patent portfolio

More information

Trusted Computing: Introduction & Applications

Trusted Computing: Introduction & Applications Trusted Computing: Introduction & Applications Lecture 5: Remote Attestation, Direct Anonymous Attestation Dr. Andreas U. Schmidt Fraunhofer Institute for Secure Information Technology SIT, Darmstadt,

More information

On the Revocation of U-Prove Tokens

On the Revocation of U-Prove Tokens On the Revocation of U-Prove Tokens Christian Paquin, Microsoft Research September nd 04 U-Prove tokens provide many security and privacy benefits over conventional credential technologies such as X.509

More information

Structure-Preserving Certificateless Encryption and Its Application

Structure-Preserving Certificateless Encryption and Its Application SESSION ID: CRYP-T06 Structure-Preserving Certificateless Encryption and Its Application Prof. Sherman S. M. Chow Department of Information Engineering Chinese University of Hong Kong, Hong Kong @ShermanChow

More information

D3.1 Scientific comparison of ABC protocols

D3.1 Scientific comparison of ABC protocols -Based Credentials for Trust D3.1 Scientific comparison of ABC protocols Part II: Practical comparison Fatbardh Veseli, Tsvetoslava Vateva-Gurova, Ahmad Sabouri, Michael Østergaard Pedersen, Jesus Luna

More information

FORMALIZING GROUP BLIND SIGNATURES... PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES. Essam Ghadafi ACISP 2013

FORMALIZING GROUP BLIND SIGNATURES... PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES. Essam Ghadafi ACISP 2013 FORMALIZING GROUP BLIND SIGNATURES AND PRACTICAL CONSTRUCTIONS WITHOUT RANDOM ORACLES Essam Ghadafi ghadafi@cs.bris.ac.uk University of Bristol ACISP 2013 FORMALIZING GROUP BLIND SIGNATURES... OUTLINE

More information

CSE 565 Computer Security Fall 2018

CSE 565 Computer Security Fall 2018 CSE 565 Computer Security Fall 2018 Lecture 11: Public Key Infrastructure Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Public key infrastructure Certificates Trust

More information

Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft

Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft Decentralized Identity for a Decentralized World Alex Simons Partner Director Program Management, Identity Division Microsoft Today Your Identity == App(username, password) However u s e r n a m e Your

More information

A privacy-preserving authentication service using mobile devices

A privacy-preserving authentication service using mobile devices A privacy-preserving authentication service using mobile devices Mihai Togan Security Software Architect certsign Context Mobile devices Present everywhere What to consider High performance Computing power

More information

10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims

10 minutes, 10 slides, goals, tech details and why it matters. Decentralized ID & Verifiable Claims 10 minutes, 10 slides, goals, tech details and why it matters Decentralized ID & Verifiable Claims Terminology & Current Model Claim or Assertion a claim or way of communicating what a person or thing

More information

Anonymous Attestation with Subverted TPMs

Anonymous Attestation with Subverted TPMs Anonymous Attestation with Subverted TPMs Jan Camenisch 1, Manu Drijvers 1,2, and Anja Lehmann 1 1 IBM Research Zurich, Säumerstrasse 4, 8803 Rüschlikon, Switzerland {jca,mdr,anj}@zurich.ibm.com 2 Department

More information

Privacy Enhancing Technologies CSE 701 Fall 2017

Privacy Enhancing Technologies CSE 701 Fall 2017 Privacy Enhancing Technologies Lecture 2: Anonymity Applications Department of Computer Science and Engineering University at Buffalo 1 Lecture Outline Anonymous communication mixes, anonymizing proxies,

More information

Certificateless Public Key Cryptography

Certificateless Public Key Cryptography Certificateless Public Key Cryptography Mohsen Toorani Department of Informatics University of Bergen Norsk Kryptoseminar November 9, 2011 1 Public Key Cryptography (PKC) Also known as asymmetric cryptography.

More information

Practical Anonymous Subscriptions! Alan Dunn, Jonathan Katz, Sangman Kim, Michael Lee, Lara Schmidt, Brent Waters, Emmett Witchel"

Practical Anonymous Subscriptions! Alan Dunn, Jonathan Katz, Sangman Kim, Michael Lee, Lara Schmidt, Brent Waters, Emmett Witchel Practical Anonymous Subscriptions! Alan Dunn, Jonathan Katz, Sangman Kim, Michael Lee, Lara Schmidt, Brent Waters, Emmett Witchel" Practical Anonymous Subscriptions! Alan Dunn, Jonathan Katz, Sangman Kim,

More information

Anonymity and Privacy

Anonymity and Privacy Computer Security Spring 2008 Anonymity and Privacy Aggelos Kiayias University of Connecticut Anonymity in networks Anonymous Credentials Anonymous Payments Anonymous E-mail and Routing E-voting Group,

More information

Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018

Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018 Unbounded Inner Product Functional Encryption from Bilinear Maps ASIACRYPT 2018 Junichi Tomida (NTT), Katsuyuki Takashima (Mitsubishi Electric) Functional Encryption[OʼNeill10, BSW11] msk Bob f(x) sk f

More information

IRMA: I Reveal My Attributes

IRMA: I Reveal My Attributes IRMA: I Reveal My Attributes Roland van Rijswijk - Deij roland.vanrijswijk@surfnet.nl rijswijk@cs.ru.nl Project partners 2 What is an attribute? An attribute is a property of a person: Full name Date of

More information

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains

Verifiable Anonymous Identities and Access Control in Permissioned Blockchains Verifiable Anonymous Identities and Access Control in Permissioned Blockchains Thomas Hardjono MIT Internet Trust Consortium Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: hardjono@mit.edu

More information

Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains

Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains Proceedings of ACM IoT Privacy, Trust & Security - IoTPTS 2016 Xi'an, China, May 2016 Cloud-Based Commissioning of Constrained Devices using Permissioned Blockchains ABSTRACT Thomas Hardjono MIT Connection

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme

Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Improvement of Camenisch-Neven-Shelat Oblivious Transfer Scheme Zhengjun Cao and Hanyue Cao Department of Mathematics, Shanghai University, Shanghai, China caozhj@shu.edu.cn Abstract. In 2007, Camenisch,

More information

NYMBLE: Blocking Misbehaving Users in Anonymizing Networks

NYMBLE: Blocking Misbehaving Users in Anonymizing Networks RESEARCH ARTICLE OPEN ACCESS NYMBLE: Blocking Misbehaving Users in Anonymizing Networks 1 R.Ravikumar, 2 J.Ramesh Kumar 1 Asst.professor, Dept.of.Computer Science, Tamil University, Thanjavur-613010. 2

More information

D2.2 - Architecture for Attribute-based Credential Technologies - Final Version

D2.2 - Architecture for Attribute-based Credential Technologies - Final Version D2.2 - Architecture for Attribute-based Credential Technologies - Final Version Patrik Bichsel, Jan Camenisch, Maria Dubovitskaya, Robert R. Enderlein, Stephan Krenn, Ioannis Krontiris, Anja Lehmann, Gregory

More information

Enterprise Privacy and Federated Identity Management

Enterprise Privacy and Federated Identity Management Enterprise Privacy and Federated Identity Management Michael Waidner IBM Zurich Research Lab & IBM Privacy Research Institute April 2003 Outline 1. Motivation 2. Enterprise Privacy Management 3. Federated

More information

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from

Lecture 15 PKI & Authenticated Key Exchange. COSC-260 Codes and Ciphers Adam O Neill Adapted from Lecture 15 PKI & Authenticated Key Exchange COSC-260 Codes and Ciphers Adam O Neill Adapted from http://cseweb.ucsd.edu/~mihir/cse107/ Today We will see how signatures are used to create public-key infrastructures

More information

Trustworthy user authentication, authorization, data integrity AND consent management

Trustworthy user authentication, authorization, data integrity AND consent management RapidQube Solutions Trustworthy user authentication, authorization, data integrity AND consent management I D E N T I T Y A N D A CC E S S M A N A G E M E N T S O L U T I O N RapidQube Solutions 2 IDENTITY

More information

DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME

DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME DYNAMIC PRIVACY PROTECTING SHORT GROUP SIGNATURE SCHEME Ashy Eldhose 1 and Thushara Sukumar 2 1 Student, Department of Computer Science and Engineering, MBITS Nellimattom 2 Assistant Professor, Department

More information

Identity Management: Setting Context

Identity Management: Setting Context Identity Management: Setting Context Joseph Pato Trusted Systems Lab Hewlett-Packard Laboratories One Cambridge Center Cambridge, MA 02412, USA joe.pato@hp.com Identity Management is the set of processes,

More information

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh

Securing Distributed Computation via Trusted Quorums. Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Securing Distributed Computation via Trusted Quorums Yan Michalevsky, Valeria Nikolaenko, Dan Boneh Setting Distributed computation over data contributed by users Communication through a central party

More information

Privacy Privacy Preserving Authentication Schemes: Theory and Applications

Privacy Privacy Preserving Authentication Schemes: Theory and Applications Privacy Privacy Preserving Authentication Schemes: Theory and Applications 18 th Infocom World, Athens, Greece, 2016 Yannis C. Stamatiou Computer Technology Institute & Press Diophantus and Business Administration

More information

Maintaining the Anonymity of Direct Anonymous Attestation with Subverted Platforms MIT PRIMES Computer Science Conference October 13, 2018

Maintaining the Anonymity of Direct Anonymous Attestation with Subverted Platforms MIT PRIMES Computer Science Conference October 13, 2018 Maintaining the Anonymity of Direct Anonymous Attestation with Subverted Platforms MIT PRIMES Computer Science Conference October 13, 2018 By: Ethan Mendes and Patrick Zhang Mentor: Kyle Hogan What is

More information

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010

Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Can eid card make life easier and more secure? Michal Ševčík Industry Solution Consultant Hewlett-Packard, Slovakia ITAPA, November 9 th, 2010 Content eid Primary Functions eid Privacy Features and Security

More information

Secure Multiparty Computation

Secure Multiparty Computation CS573 Data Privacy and Security Secure Multiparty Computation Problem and security definitions Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation

An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation An Efficient System for Non-transferable Anonymous Credentials with ptional Anonymity Revocation Jan Camenisch IBM Research Zurich Research Laboratory CH 8803 Rüschlikon jca@zurich.ibm.com Anna Lysyanskaya

More information

EXTENDED NYMBLE: METHOD FOR TRACKING MISBEHAVING USERS ANONYMOSLY WHILE BLOCKING

EXTENDED NYMBLE: METHOD FOR TRACKING MISBEHAVING USERS ANONYMOSLY WHILE BLOCKING EXTENDED NYMBLE: METHOD FOR TRACKING MISBEHAVING USERS ANONYMOSLY WHILE BLOCKING M.Durga Prasad 1, Dr P.Chenna Reddy 2, Banoth Samya 3 1 Asst Professor, Department of CSE, Vijay Institute of Tech & Sciences,

More information

TANDEM: Securing Keys by Using a Central Server While Preserving Privacy

TANDEM: Securing Keys by Using a Central Server While Preserving Privacy TANDEM: Securing Keys by Using a Central Server While Preserving Privacy Wouter Lueks SPRING Lab, EPFL wouter.lueks@epfl.ch Brinda Hampiholi Radboud University brinda@cs.ru.nl Greg Alpár Open University

More information

Security Protections for Mobile Agents

Security Protections for Mobile Agents Stephen R. Tate Dept. of Computer Science and Engineering University of North Texas Talk describes joint work with Ke Xu and Vandana Gunupudi Research supported by the National Science Foundation class

More information

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication

Concepts and Languages for Privacy-Preserving Attribute-Based Authentication Concepts and Languages for Privacy-Preserving Attribute-Based Authentication Jan Camenisch 1, Maria Dubovitskaya 1, Anja Lehmann 1, Gregory Neven 1, Christian Paquin 2, and Franz-Stefan Preiss 1 1 IBM

More information

Preserving Data Privacy in the IoT World

Preserving Data Privacy in the IoT World MASSACHUSETTS INSTITUTE OF TECHNOLOGY Preserving Data Privacy in the IoT World Thomas Hardjono Alex Sandy Pentland Connection Science & Engineering Massachusetts Institute of Technology July 2016 connection.mit.edu

More information

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module 1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2016/17 Roadmap: TPM

More information

Cryptography. Lecture 12. Arpita Patra

Cryptography. Lecture 12. Arpita Patra Cryptography Lecture 12 Arpita Patra Digital Signatures q In PK setting, privacy is provided by PKE q Integrity/authenticity is provided by digital signatures (counterpart of MACs in PK world) q Definition:

More information

Lecture 9. Anonymity in Cryptocurrencies

Lecture 9. Anonymity in Cryptocurrencies Lecture 9 Anonymity in Cryptocurrencies Some say Bitcoin provides anonymity Bitcoin is a secure and anonymous digital currency WikiLeaks donations page Others say it doesn t Bitcoin won't hide you from

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis H2020 Clustering

More information

Prof. Christos Xenakis

Prof. Christos Xenakis From Real-world Identities to Privacy-preserving and Attribute-based CREDentials for Device-centric Access Control Device-Centric Authentication for Future Internet Prof. Christos Xenakis SAINT Workshop

More information

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module

Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module 1 Lecture Secure, Trusted and Trustworthy Computing Trusted Platform Module Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt Germany Winter Term 2017/18 Roadmap: TPM

More information

Pretty Good Privacy (PGP)

Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) -- PGP services -- PGP key management (c) Levente Buttyán (buttyan@crysys.hu) What is PGP? general purpose application to protect (encrypt and/or sign) files can be used to protect

More information

Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting

Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting Scratch & Vote: Self-Contained Paper-Based Cryptographic Voting Ben Adida Ronald L. Rivest 30 October 2006 The Next Harvard Pres! Chain of Custody Chain of Custody /* * source * code */ 1 if (... Vendor

More information

The Potential for Blockchain to Transform Electronic Health Records ARTICLE TECHNOLOGY. by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw

The Potential for Blockchain to Transform Electronic Health Records ARTICLE TECHNOLOGY. by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw REPRINT H03I15 PUBLISHED ON HBR.ORG MARCH 03, 2017 ARTICLE TECHNOLOGY The Potential for Blockchain to Transform Electronic Health Records by John D. Halamka, MD, Andrew Lippman and Ariel Ekblaw This article

More information

Introduction to Cryptography in Blockchain Technology. December 23, 2018

Introduction to Cryptography in Blockchain Technology. December 23, 2018 Introduction to Cryptography in Blockchain Technology December 23, 2018 What is cryptography? The practice of developing protocols that prevent third parties from viewing private data. Modern cryptography

More information

Privacy-preserving PKI design based on group signature

Privacy-preserving PKI design based on group signature Edith Cowan University Research Online Australian Information Security Management Conference Conferences, Symposia and Campus Events 2011 Privacy-preserving PKI design based on group signature Sokjoon

More information

Phoenix: Rebirth of a Cryptographic Password-Hardening Service

Phoenix: Rebirth of a Cryptographic Password-Hardening Service Phoenix: Rebirth of a Cryptographic Password-Hardening Service Russell W.F. Lai 1,2 Christoph Egger 1 Dominique Schro der 1 Sherman S.M. Chow 2 1 Friedrich-Alexander-Universita t Erlangen-Nu rnberg University

More information

0x1A Great Papers in Computer Security

0x1A Great Papers in Computer Security CS 380S 0x1A Great Papers in Computer Security Vitaly Shmatikov http://www.cs.utexas.edu/~shmat/courses/cs380s/ Privacy on Public Networks Internet is designed as a public network Wi-Fi access points,

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

Security & Privacy. Larry Rudolph. Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph

Security & Privacy. Larry Rudolph. Pervasive Computing MIT SMA 5508 Spring 2006 Larry Rudolph Security & Privacy Larry 1 Who cares about Privacy? Everybody? Nobody? Criminals? Governments? Corporations? Privacy is the right to keep information hidden. But there is lots of information. You do not

More information

Analysis of Revocation Strategies for Anonymous Idemix Credentials

Analysis of Revocation Strategies for Anonymous Idemix Credentials Analysis of Revocation Strategies for Anonymous Idemix Credentials Jorn Lapon 1, Markulf Kohlweiss 3, Bart De Decker 2, Vincent Naessens 1 1 Katholieke Hogeschool Sint-Lieven, Industrial Engineering 2

More information

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong

CS573 Data Privacy and Security. Cryptographic Primitives and Secure Multiparty Computation. Li Xiong CS573 Data Privacy and Security Cryptographic Primitives and Secure Multiparty Computation Li Xiong Outline Cryptographic primitives Symmetric Encryption Public Key Encryption Secure Multiparty Computation

More information

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1

Information Security. message M. fingerprint f = H(M) one-way hash. 4/19/2006 Information Security 1 Information Security message M one-way hash fingerprint f = H(M) 4/19/2006 Information Security 1 Outline and Reading Digital signatures Definition RSA signature and verification One-way hash functions

More information

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment

Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Using Blockchain for Consent and Access to Private and Sensitive Data in the GDPR Environment Gary Leeming, Chief Technology Officer Connected Health Cities, University of Manchester 1 Connected Health

More information

SAFE-BioPharma RAS Privacy Policy

SAFE-BioPharma RAS Privacy Policy SAFE-BioPharma RAS Privacy Policy This statement discloses the privacy practices for the SAFE-BioPharma Association ( SAFE- BioPharma ) Registration Authority System ( RAS ) web site and describes: what

More information

Blockchain, cryptography, and consensus

Blockchain, cryptography, and consensus ITU Workshop on Security Aspects of Blockchain (Geneva, Switzerland, 21 March 2017) Blockchain, cryptography, and consensus Dr. Christian Cachin IBM Research - Zurich www.zurich.ibm.com/~cca/ Geneva, Switzerland,

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

Decentralized Anonymous Credentials

Decentralized Anonymous Credentials Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers The Johns Hopkins University Department of Computer Science, Baltimore, USA {cgarman, mgreen, imiers}@cs.jhu.edu October 15,

More information

Using Cryptography CMSC 414. October 16, 2017

Using Cryptography CMSC 414. October 16, 2017 Using Cryptography CMSC 414 October 16, 2017 Digital Certificates Recall: K pub = (n, e) This is an RSA public key How do we know who this is for? Need to bind identity to a public key We can do this using

More information

BNymble (a short paper)

BNymble (a short paper) BNymble (a short paper) More anonymous blacklisting at almost no cost Peter Lofgren and Nicholas Hopper University of Minnesota Abstract. Anonymous blacklisting schemes allow online service providers to

More information

Lecture Embedded System Security Trusted Platform Module

Lecture Embedded System Security Trusted Platform Module 1 Lecture Embedded System Security Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2015 Roadmap: TPM Introduction to TPM TPM architecture

More information

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!?

CS 470 Spring Security. Mike Lam, Professor. a.k.a. Why on earth do Alice and Bob need to share so many secrets?!? 50fb6be35f4c3105 9d4ed08fb86d8887 b746c452a9c9443b 15b22f450c76218e CS 470 Spring 2018 9df7031cdbff9d10 b700a92855f16328 5b757e66d2131841 62fedd7d9131e42e Mike Lam, Professor Security a.k.a. Why on earth

More information

An Introduction to Trusted Platform Technology

An Introduction to Trusted Platform Technology An Introduction to Trusted Platform Technology Siani Pearson Hewlett Packard Laboratories, UK Siani_Pearson@hp.com Content What is Trusted Platform technology and TCPA? Why is Trusted Platform technology

More information

Decentralized Anonymous Credentials

Decentralized Anonymous Credentials Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers The Johns Hopkins niversity Department of Computer Science, Baltimore, SA {cgarman, mgreen, imiers}@cs.jhu.edu Abstract Anonymous

More information

Randomness Extractors. Secure Communication in Practice. Lecture 17

Randomness Extractors. Secure Communication in Practice. Lecture 17 Randomness Extractors. Secure Communication in Practice Lecture 17 11:00-12:30 What is MPC? Manoj Monday 2:00-3:00 Zero Knowledge Muthu 3:30-5:00 Garbled Circuits Arpita Yuval Ishai Technion & UCLA 9:00-10:30

More information

Public-Key Cryptography

Public-Key Cryptography Computer Security Spring 2008 Public-Key Cryptography Aggelos Kiayias University of Connecticut A paradox Classic cryptography (ciphers etc.) Alice and Bob share a short private key using a secure channel.

More information

UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens

UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens UC Commitments for Modular Protocol Design and Applications to Revocation and Attribute Tokens Jan Camenisch 1, Maria Dubovitskaya 1, and Alfredo Rial 2 1 IBM Research Zurich 2 University of Luxembourg

More information

STRONGER SECURITY NOTIONS FOR DECENTRALIZED TRACEABLE ATTRIBUTE-BASED SIGNATURES AND MORE EFFICIENT CONSTRUCTIONS

STRONGER SECURITY NOTIONS FOR DECENTRALIZED TRACEABLE ATTRIBUTE-BASED SIGNATURES AND MORE EFFICIENT CONSTRUCTIONS STRONGER SECURITY NOTIONS FOR DECENTRALIZED TRACEABLE ATTRIBUTE-BASED SIGNATURES AND MORE EFFICIENT CONSTRUCTIONS Essam Ghadafi University College London e.ghadafi@ucl.ac.uk CT-RSA 2015 STRONGER SECURITY

More information

Cryptography Lecture 4. Attacks against Block Ciphers Introduction to Public Key Cryptography. November 14, / 39

Cryptography Lecture 4. Attacks against Block Ciphers Introduction to Public Key Cryptography. November 14, / 39 Cryptography 2017 Lecture 4 Attacks against Block Ciphers Introduction to Public Key Cryptography November 14, 2017 1 / 39 What have seen? What are we discussing today? What is coming later? Lecture 3

More information

Digital Cash Systems

Digital Cash Systems Digital Cash Systems Xiang Yin Department of Computer Science McMaster University December 1, 2010 Outline 1 Digital Cash 2 3 4 5 Digital Cash Overview Properties Digital Cash Systems Digital Cash Digital

More information

A Credential-Based System for the Anonymous Delegation of Rights

A Credential-Based System for the Anonymous Delegation of Rights A Credential-Based System for the Anonymous Delegation of Rights Liesje Demuynck, Bart De Decker, and Wouter Joosen Katholieke Universiteit Leuven, Department of Computer Science, Celestijnenlaan 200A,

More information

Lecture 3. Introduction to Cryptocurrencies

Lecture 3. Introduction to Cryptocurrencies Lecture 3 Introduction to Cryptocurrencies Public Keys as Identities public key := an identity if you see sig such that verify(pk, msg, sig)=true, think of it as: pk says, [msg] to speak for pk, you must

More information

A Direct Anonymous Attestation Scheme for Embedded Devices

A Direct Anonymous Attestation Scheme for Embedded Devices A Direct Anonymous Attestation Scheme for Embedded Devices He Ge 1, and Stephen R. Tate 2 1 Microsoft Corporation, One Microsoft Way, Redmond 98005 hege@microsoft.com 2 Department of Computer Science and

More information

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell

Introduction. CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell Introduction CSE 5351: Introduction to cryptography Reading assignment: Chapter 1 of Katz & Lindell 1 Cryptography Merriam-Webster Online Dictionary: 1. secret writing 2. the enciphering and deciphering

More information

Identity-Based Decryption

Identity-Based Decryption Identity-Based Decryption Daniel R. L. Brown May 30, 2011 Abstract Identity-based decryption is an alternative to identity-based encryption, in which Alice encrypts a symmetric key for Bob under a trusted

More information