On cryptographic mechanisms for the selective disclosure of verifiable credentials

被引:1
|
作者
Flamini, Andrea [1 ]
Sciarretta, Giada [2 ]
Scuro, Mario [1 ]
Sharif, Amir [2 ]
Tomasi, Alessandro [2 ]
Ranise, Silvio [1 ,2 ]
机构
[1] Univ Trento, Dept Math, Trento, Italy
[2] Fdn Bruno Kessler, Ctr Cybersecur, Trento, Italy
关键词
Selective disclosure; Verifiable credentials; Zero-knowledge proof; eIDAS; 2; GDPR; SIGNATURES;
D O I
10.1016/j.jisa.2024.103789
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiable credentials are a digital analogue of physical credentials. Their authenticity and integrity are protected by means of cryptographic techniques, and they can be presented to verifiers to reveal attributes or even predicates about the attributes included in the credential. One way to preserve privacy during presentation consists in selectively disclosing the attributes in a credential. In this paper we present the most widespread cryptographic mechanisms used to enable selective disclosure of attributes identifying two categories: the ones based on hiding commitments - e.g., m dl ISO/IEC 18013-5 - and the ones based on non -interactive zeroknowledge proofs - e.g., BBS signatures. We also include a description of the cryptographic primitives used to design such cryptographic mechanisms. We describe the design of the cryptographic mechanisms and compare them by performing an analysis on their standard maturity in terms of standardization, cryptographic agility and quantum safety, then we compare the features that they support with main focus on the unlinkability of presentations, the ability to create predicate proofs and support for threshold credential issuance. Finally we perform an experimental evaluation based on the Rust open source implementations that we have considered most relevant. In particular we evaluate the size of credentials and presentations built using different cryptographic mechanisms and the time needed to generate and verify them. We also highlight some trade-offs that must be considered in the instantiation of the cryptographic mechanisms.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] On the interoperability of verifiable credentials: simple universal verifier (SUV)
    Kaiiali, Mustafa
    Sette, Ioram Schechtman
    Wazan, Ahmad Samer
    Chadwick, David W.
    Alfandi, Omar
    ANNALS OF TELECOMMUNICATIONS, 2025,
  • [32] ElectionGuard: a Cryptographic Toolkit to Enable Verifiable Elections
    Benaloh, Josh
    Naehrig, Michael
    Pereira, Olivier
    Wallach, Dan S.
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 5485 - 5502
  • [33] Verifiable Contracting A Use Case for Onboarding and Contract Offering in Financial Services with eIDAS and Verifiable Credentials
    Goncalves, Sergio Manuel Nobrega
    Tomasi, Alessandro
    Bisegna, Andrea
    Pellizzari, Giulio
    Ranise, Silvio
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 133 - 144
  • [34] Attribute-based credentials with cryptographic collusion prevention
    Hajny, Jan
    Dzurenda, Petr
    Malina, Lukas
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 3836 - 3846
  • [35] BLS-MT-ZKP: A Novel Approach to Selective Disclosure of Claims From Digital Credentials
    Ramic, Seila Becirovic
    Prazina, Irfan
    Pozderac, Damir
    Mulahasanovic, Razija Turcinhodzic
    Mrdovic, Sasa
    IEEE ACCESS, 2024, 12 : 192062 - 192078
  • [36] Matching Expectations in Ensembles: Connecting Verifiable Credentials and the Semantic Web
    Suermeli, Jan
    Yilmaz, Sergen
    LEVERAGING APPLICATIONS OF FORMAL METHODS, VERIFICATION AND VALIDATION: RIGOROUS ENGINEERING OF COLLECTIVE ADAPTIVE SYSTEMS, PT II, ISOLA 2024, 2025, 15220 : 156 - 172
  • [37] Towards a standardized model for privacy-preserving Verifiable Credentials
    Garcia-Rodriguez, Jesus
    Torres Moreno, Rafael
    Bernal Bernabe, Jorge
    Skarmeta, Antonio
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [38] One to Bind Them: Binding Verifiable Credentials to User Attributes
    Muehle, Alexander
    Assaf, Katja
    Meinel, Christoph
    PROCEEDINGS OF THE 20TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, SECRYPT 2023, 2023, : 345 - 352
  • [39] Towards Functions for Verifiable Credentials in a 2-Holder Model
    Batz, Markus
    Zickau, Sebastian
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [40] Evaluating the Current State of Application Programming Interfaces for Verifiable Credentials
    Lalchandani, Nikesh
    Jiang, Frank
    Jeong, Jongkil Jay
    Zolotavkin, Yevhen
    Doss, Robin
    2021 18TH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2021,