Projects per year
Abstract
As centralized identity management solutions amass identity
data, they increasingly become attractive targets for cyber attacks,
which entail consequences for users that range from service disruptions
to exposure of sensitive user data. Self-sovereign identity (SSI) strives to
return the control over identity data to the users by building on decentralized
architectures. However, the adoption of SSI systems is currently
hampered by a lack of qualified identity data that satisfies the services'
requirements. Additionally, there is a gap w.r.t the user's privacy: Intermediate
components (e.g., importers or SSI network nodes) learn the
users' sensitive attributes during the derivation of eID data.
In this work, we present a decentralized eID derivation concept that
preserves the users' privacy while maintaining the data's trustworthiness
without revealing the plain data to any component outside the users' control.
Our proposed system also enables users to selectively disclose only
relevant parts of the imported identity assertion according to the service's
requirements. We also implement and evaluate a proof-of-concept
to demonstrate the feasibility and performance of our concept.
data, they increasingly become attractive targets for cyber attacks,
which entail consequences for users that range from service disruptions
to exposure of sensitive user data. Self-sovereign identity (SSI) strives to
return the control over identity data to the users by building on decentralized
architectures. However, the adoption of SSI systems is currently
hampered by a lack of qualified identity data that satisfies the services'
requirements. Additionally, there is a gap w.r.t the user's privacy: Intermediate
components (e.g., importers or SSI network nodes) learn the
users' sensitive attributes during the derivation of eID data.
In this work, we present a decentralized eID derivation concept that
preserves the users' privacy while maintaining the data's trustworthiness
without revealing the plain data to any component outside the users' control.
Our proposed system also enables users to selectively disclose only
relevant parts of the imported identity assertion according to the service's
requirements. We also implement and evaluate a proof-of-concept
to demonstrate the feasibility and performance of our concept.
Original language | English |
---|---|
Title of host publication | Information and Communications Security - 21st International Conference, ICICS 2019, Revised Selected Papers |
Editors | Jianying Zhou, Xiapu Luo, Qingni Shen, Zhen Xu |
Publisher | Springer |
Pages | 307-323 |
Number of pages | 17 |
Volume | 11999 |
ISBN (Electronic) | 978-3-030-41579-2 |
ISBN (Print) | 978-3-030-41578-5 |
DOIs | |
Publication status | Published - 18 Feb 2020 |
Event | 21st International Conference on Information and Communications Security: ICICS 2019 - Peking, China Duration: 15 Dec 2019 → 17 Dec 2019 http://icics.cn |
Publication series
Name | Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) |
---|---|
Volume | 11999 LNCS |
ISSN (Print) | 0302-9743 |
ISSN (Electronic) | 1611-3349 |
Conference
Conference | 21st International Conference on Information and Communications Security |
---|---|
Abbreviated title | ICICS'19 |
Country/Territory | China |
City | Peking |
Period | 15/12/19 → 17/12/19 |
Internet address |
Keywords
- Qualified Electronic Identities
- Self-Sovereign Identity
- Distributed Ledger
- Identity Derivation
- Distributed Trust
- Privacy
- Distributed ledger
- Qualified electronic identity
- Identity derivation
- Distributed trust
ASJC Scopus subject areas
- Theoretical Computer Science
- Computer Science(all)
Projects
- 1 Active
-
E-Government Innovationszentrum - EGIZ - E-Government innovation center (EGIZ)
Krnjic, V., Lenz, T., Tauber, A., Posch, R., Abraham, A. & Hörandner, F.
1/09/05 → …
Project: Research project