anonymous credentials on java card - sit smartcard 2011

25
1 © 2009 IBM Corporation Anonymous Credentials on Java Card Patrik Bichsel, Jan Camenisch, Thomas Groß, Victor Shoup Dr. Thomas Groß – Research Scientist 03 February 2011

Upload: thomas-gross

Post on 25-May-2015

1.880 views

Category:

Technology


0 download

DESCRIPTION

How anonymous credentials can enhance electronic identity cards with strong security and privacy. A feasibility study presented at the Fraunhofer SIT Smartcard workshop 2011

TRANSCRIPT

Page 1: Anonymous Credentials on Java Card - SIT Smartcard 2011

1

copy 2009 IBM Corporation

Anonymous Credentials on Java CardPatrik Bichsel Jan Camenisch Thomas Groszlig Victor Shoup

Dr Thomas Groszlig ndash Research Scientist03 February 2011

2

Privacy Feasibility Way Ahead

[Images from iStockPhotocom]

3

Privacy Feasibility Way Ahead

4

ldquoNeil Armstrongrsquos Footsteps are still thererdquo (Robin Wilton Sun Microsystems)

5 copy 2011 IBM Corporation

Anonymous Credentials Attribute-based Access w Strong Security amp Privacy

IBM Presentation Template Full Version

Private Credentials How to Build Them

In the beginning

State of the Art How to Build Them

asking for a credential

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 2: Anonymous Credentials on Java Card - SIT Smartcard 2011

2

Privacy Feasibility Way Ahead

[Images from iStockPhotocom]

3

Privacy Feasibility Way Ahead

4

ldquoNeil Armstrongrsquos Footsteps are still thererdquo (Robin Wilton Sun Microsystems)

5 copy 2011 IBM Corporation

Anonymous Credentials Attribute-based Access w Strong Security amp Privacy

IBM Presentation Template Full Version

Private Credentials How to Build Them

In the beginning

State of the Art How to Build Them

asking for a credential

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 3: Anonymous Credentials on Java Card - SIT Smartcard 2011

3

Privacy Feasibility Way Ahead

4

ldquoNeil Armstrongrsquos Footsteps are still thererdquo (Robin Wilton Sun Microsystems)

5 copy 2011 IBM Corporation

Anonymous Credentials Attribute-based Access w Strong Security amp Privacy

IBM Presentation Template Full Version

Private Credentials How to Build Them

In the beginning

State of the Art How to Build Them

asking for a credential

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 4: Anonymous Credentials on Java Card - SIT Smartcard 2011

4

ldquoNeil Armstrongrsquos Footsteps are still thererdquo (Robin Wilton Sun Microsystems)

5 copy 2011 IBM Corporation

Anonymous Credentials Attribute-based Access w Strong Security amp Privacy

IBM Presentation Template Full Version

Private Credentials How to Build Them

In the beginning

State of the Art How to Build Them

asking for a credential

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 5: Anonymous Credentials on Java Card - SIT Smartcard 2011

5 copy 2011 IBM Corporation

Anonymous Credentials Attribute-based Access w Strong Security amp Privacy

IBM Presentation Template Full Version

Private Credentials How to Build Them

In the beginning

State of the Art How to Build Them

asking for a credential

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 6: Anonymous Credentials on Java Card - SIT Smartcard 2011

Private Credentials How to Build Them

In the beginning

State of the Art How to Build Them

asking for a credential

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 7: Anonymous Credentials on Java Card - SIT Smartcard 2011

State of the Art How to Build Them

asking for a credential

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 8: Anonymous Credentials on Java Card - SIT Smartcard 2011

State of the Art How to Build Them

getting a credential

containing ldquobirth date = April 3 1987rdquo

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 9: Anonymous Credentials on Java Card - SIT Smartcard 2011

State of the Art How to Build Them

showing a credential

goes off-line

- drivers license- insurance- older gt 20

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 10: Anonymous Credentials on Java Card - SIT Smartcard 2011

State of the Art How to Build Them

showing a credential

Using identity mixer user can transform (different) token(s) into a new single one that however still verifies wrt original signers public keys

containing statements ldquodrivers license age (as stated in driverrsquos license) gt 20 and insurancerdquo

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 11: Anonymous Credentials on Java Card - SIT Smartcard 2011

Signature Scheme based on SRSA [CL01]

Public key of signer RSA modulus n and ai b d Є QRn

Secret key factors of n

To sign k messages m1 mk Є 01ℓ choose random prime e gt 2ℓ and integer s asymp n compute c such that

d = a1m1 ak

mk bs ce mod n

signature is (ces)[SRSA CL-signature system introduced in Camenisch and Lysyanskaya 01 There exist alternative systems in elliptic curve settings for instance with BBS-alike signatures]

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 12: Anonymous Credentials on Java Card - SIT Smartcard 2011

Signature Scheme based on SRSA [CL01]

Theorem Signature scheme is secure against adaptively chosen message attacks under Strong RSA assumption

A signature (ces) on messages m1 mk is valid iff m1 mk Є 01ℓ e gt 2ℓ

d = a1m1 ak

mk bs ce mod n

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 13: Anonymous Credentials on Java Card - SIT Smartcard 2011

Proof of Knowledge of a CL Signature

Solution randomize c

ndash Let c = c bsmod n with random s

ndash then d = ce a1m1 ak

mk bs (mod n) holds

ie (ce s) is a also a valid signature

Therefore to prove knowledge of signature on hidden msgs provide c

PK(e m1 mk s) d = ce a1m1 ak

mk b s

and mi Є 01ℓ and e Є 2ℓ+1 plusmn 01ℓ

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 14: Anonymous Credentials on Java Card - SIT Smartcard 2011

14

Privacy Feasibility Way Ahead

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 15: Anonymous Credentials on Java Card - SIT Smartcard 2011

copy 2011 IBM Corporation

Vision Smart Identity Card

Strong accountability and privacy

Sustainable secondary use

Trusted identity basis

Cost effective

Future-proof

[Card picture is an artists conception the chip of the actual JCOP 41v22 Java Card used for the feasibility study is on the backside]

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 16: Anonymous Credentials on Java Card - SIT Smartcard 2011

16 copy 2011 IBM Corporation

Feasibility ProblemIBM Presentation Template Full Version

Run anonymous credential system autonomously and securely on a standard off-the-shelf Java Card

AutonomyAll data on card

Malicious terminal

[Independent proof point Sterckx Gierlichs Preneel Verbauwhede lsquo09]

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 17: Anonymous Credentials on Java Card - SIT Smartcard 2011

17 copy 2011 IBM Corporation

Java CardLimitations

IBM Presentation Template Full Version

sect 8-bit CPU (357 MHz)

sect Limited access to public key-CP (only standard RSA DSA)

sect Limited RAM (2K)

JCOP 41v22

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 18: Anonymous Credentials on Java Card - SIT Smartcard 2011

18 copy 2011 IBM Corporation

[Source Prof Wolfgang Reif ndash chip cards]

IBM Presentation Template Full Version

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Card-Specific Operating System

Card Manager

Java Card API

Java Card VM

8-bit CPU 3DES CP Public Key CP

IDMX Applet

interfaceBasic Ops

Java CardStructure

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 19: Anonymous Credentials on Java Card - SIT Smartcard 2011

19 copy 2011 IBM Corporation

System Overview

Secure Javacard

User PC

User Browser

Identity Wallet

Smart ID CardIdentity Mixer

Backend(Server)

Identity MixerValidation

insertsowns

interactsconsentsto policy

request policyresponse proof

request policyresponse proof

skskUU certificatescertificates

Maintains master key and certificates confidential

pkpkII

Validates proofs withissuerrsquos public keyKey Point

Transformscertificatesin privacy-preserving

identity proof statements

Won the Innovation Award 2009 (Gesellschaft fuumlr Informatik GI)

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 20: Anonymous Credentials on Java Card - SIT Smartcard 2011

20 copy 2011 IBM Corporation

Execution Times for a Full Proof (incl Communication)

IBM Presentation Template Full Version

Modulus 1280 bit 1536 bit 1984 bitPrecomputation 5203 ms 7828 ms 13250 ms

Compute Arsquo 2125 ms 2906 ms 5000 ms

Compute T1 3078 ms 4922 ms 8250 ms

Policy-dependent 2234 ms 2625 ms 3298 ms

Compute 1 response

562 ms 656 ms 828 ms

Total 7437 ms 10453 ms 16548 ms

[Avg performance measurements with 100 experiments on JCOP 41v22 A credential blinding T1 first stage of Sigma-proof commitment response Sigma-proof response]

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 21: Anonymous Credentials on Java Card - SIT Smartcard 2011

21

Privacy Technology Way Ahead

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 22: Anonymous Credentials on Java Card - SIT Smartcard 2011

22 copy 2011 IBM Corporation

Just Launched ABC4Trust Project EU FP 7 research project 135 Million EUR 4 years

12 partners

IBM Presentation Template Full Version

Goethe University Frankfurt

Alexandra Institute

Research Academic Computer Technology Institute

IBM Research

Lenio

Nokia Siemens Networks

Unabhaumlngiges Landeszentrum fuumlr Datenschutz

Eurodocs

CryptoExperts (SmartCards)

Microsoft RampD France

Municipality of Soumlderhamn

Technische Universitaumlt Darmstadt

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 23: Anonymous Credentials on Java Card - SIT Smartcard 2011

23 copy 2011 IBM Corporation

ABC4Trust Goals

Achieve paradigm shift and interoperability in trustworthy infrastructures

Establish abstraction and unification of different crypto algorithms Create interaction flows architecture amp data formats as well as policies Realize reference implementation Validate concepts by real-world pilots in the eID space

Establish NG smart card implementation of anonymous credentialsndashRealization by CryptoExperts lead by Pascal PaillierndashNative SmartCard direct access to crypto co-processor

IBM Presentation Template Full Version

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 24: Anonymous Credentials on Java Card - SIT Smartcard 2011

24

Anonymous credentials future-proof solution to

minimal disclosure

and attribute authentication

Technology feasible and

practical efficiently

realizable on smart cards

Privacy Feasibility Way Ahead

Anonymous credential

systems to be harmonized integrated

into identity management

systems

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25
Page 25: Anonymous Credentials on Java Card - SIT Smartcard 2011

25 copy 2011 IBM Corporation

ResourcesIBM Presentation Template Full Version

This talk is based on P Bichsel J Camenisch T Gross V Shoup Anonymous Credentials on a Standard Java Card ACM CCS 2009 Prof V Shoup is affiliated with the New York University and contributed to this work during a sabbatical at IBM Research ndash Zurich

Identity Mixer Community idemixwordpresscomndash Download Identity Mixer Library 232ndash Read Identity Mixer Specification 232ndash httpprimeinftu-dresdendeidemix

PrimeLife wwwprimelifeeu

ABC4Trust wwwabc4trustde

Email Jan or Thomas jca tgr[at]zurichibmcom

  • Slide 1
  • Slide 2
  • Slide 3
  • Slide 4
  • Slide 5
  • State of the Art How to Build Them
  • Slide 7
  • Slide 8
  • Slide 9
  • Slide 10
  • Slide 11
  • Slide 12
  • Slide 13
  • Slide 14
  • Slide 15
  • Slide 16
  • Slide 17
  • Slide 18
  • Slide 19
  • Slide 20
  • Slide 21
  • Slide 22
  • Slide 23
  • Slide 24
  • Slide 25