On cryptographic mechanisms for the selective disclosure of verifiable credentials

被引:1
|
作者
Flamini, Andrea [1 ]
Sciarretta, Giada [2 ]
Scuro, Mario [1 ]
Sharif, Amir [2 ]
Tomasi, Alessandro [2 ]
Ranise, Silvio [1 ,2 ]
机构
[1] Univ Trento, Dept Math, Trento, Italy
[2] Fdn Bruno Kessler, Ctr Cybersecur, Trento, Italy
关键词
Selective disclosure; Verifiable credentials; Zero-knowledge proof; eIDAS; 2; GDPR; SIGNATURES;
D O I
10.1016/j.jisa.2024.103789
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Verifiable credentials are a digital analogue of physical credentials. Their authenticity and integrity are protected by means of cryptographic techniques, and they can be presented to verifiers to reveal attributes or even predicates about the attributes included in the credential. One way to preserve privacy during presentation consists in selectively disclosing the attributes in a credential. In this paper we present the most widespread cryptographic mechanisms used to enable selective disclosure of attributes identifying two categories: the ones based on hiding commitments - e.g., m dl ISO/IEC 18013-5 - and the ones based on non -interactive zeroknowledge proofs - e.g., BBS signatures. We also include a description of the cryptographic primitives used to design such cryptographic mechanisms. We describe the design of the cryptographic mechanisms and compare them by performing an analysis on their standard maturity in terms of standardization, cryptographic agility and quantum safety, then we compare the features that they support with main focus on the unlinkability of presentations, the ability to create predicate proofs and support for threshold credential issuance. Finally we perform an experimental evaluation based on the Rust open source implementations that we have considered most relevant. In particular we evaluate the size of credentials and presentations built using different cryptographic mechanisms and the time needed to generate and verify them. We also highlight some trade-offs that must be considered in the instantiation of the cryptographic mechanisms.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Verifiable Subgraph Matching With Cryptographic Accumulators in Cloud Computing
    Zhu, Yixiao
    Li, Hui
    Cui, Jiangtao
    Ma, Yong
    IEEE ACCESS, 2019, 7 : 169636 - 169645
  • [42] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Mehmet Sabır Kiraz
    Osmanbey Uzunkol
    International Journal of Information Security, 2016, 15 : 519 - 537
  • [43] Efficient and verifiable algorithms for secure outsourcing of cryptographic computations
    Kiraz, Mehmet Sabir
    Uzunkol, Osmanbey
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 15 (05) : 519 - 537
  • [44] Prevent Session Hijacking by Binding the Session to the Cryptographic Network Credentials
    Burgers, Willem
    Verdult, Roel
    van Eekelen, Marko
    SECURE IT SYSTEMS, NORDSEC 2013, 2013, 8208 : 33 - 50
  • [45] Decentralized Identifiers and Verifiable Credentials for Smartphone Anticounterfeiting and Decentralized IMEI Database
    Sghaier Omar, Ahmad
    Basir, Otman
    CANADIAN JOURNAL OF ELECTRICAL AND COMPUTER ENGINEERING-REVUE CANADIENNE DE GENIE ELECTRIQUE ET INFORMATIQUE, 2020, 43 (03): : 174 - 180
  • [46] Access control for interoperable energy management systems using Verifiable Credentials
    Fotiou, Nikos
    Chadoulos, Spiros
    Koutsopoulos, Iordanis
    Siris, Vasilios A.
    Polyzos, George C.
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1540 - 1545
  • [47] Self-Sovereign Identity and Verifiable Credentials in Your Digital Wallet
    Lacity, Mary
    Carmel, Erran
    MIS QUARTERLY EXECUTIVE, 2022, 21 (03) : 241 - 251
  • [48] Combining Verifiable Credentials and Blockchain Tokens for Traceable and Offline Token Operations
    Chenna, Srivatsav
    Prehofer, Christian
    2023 IEEE 9TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT, 2023,
  • [49] A Subject-Centric Credential Management Method based on the Verifiable Credentials
    Lim, Seungjoo
    Rhie, Min-Hyung
    Hwang, DongYeop
    Kim, Ki-Hyung
    35TH INTERNATIONAL CONFERENCE ON INFORMATION NETWORKING (ICOIN 2021), 2021, : 508 - 510
  • [50] Secure Data Provenance in Internet of Vehicles with Verifiable Credentials for Security and Privacy
    Nepal, Anuj
    Doss, Robin
    Jiang, Frank
    2024 54TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS-SUPPLEMENTAL VOLUME, DSN-S 2024, 2024, : 59 - 61