ad-hoc-domain signatures for personal eid documents · ad-hoc-domain signatures kluczniak, hanzlik,...

69
Ad-Hoc- Domain Signatures Kluczniak, Hanzlik, Kutylowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for Personal eID Documents Kamil Kluczniak , Lucjan Hanzlik, Miroslaw Kutylowski Wroclaw University of Science and Technology, Poland ArcticCrypt 2016, Longyearbyen, Svalbard 1 / 25

Upload: others

Post on 20-Jul-2020

13 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Ad-Hoc-Domain Signatures for Personal eIDDocuments

Kamil Kluczniak, Lucjan Hanzlik, Mirosław Kutyłowski

Wrocław University of Science and Technology, Poland

ArcticCrypt 2016,Longyearbyen, Svalbard

1 / 25

Page 2: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Overview

1 Domain Pseudonymous Signatures

2 Ad Hoc Domain Signatures - Formal Models

3 Scheme

4 Open Problems

2 / 25

Page 3: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Motivation

eIDAS - EU REGULATION No 910/2014identification, authentication and other trust services in theEuropean market

growing scope of usage of electronic documentsreliable authentication of documents badly needed.Electronic signatures one of a few reliable choices.

“Privacy by Design” paradigma technical system must be designed in a way that protectsprivacyprivacy protection is a fundamental security condition

3 / 25

Page 4: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Pseudonyms Concept

Pseudonym:A unique ID in each service that does not reveal the realidentity

preventing Sybil attacks: appearing under different IDs in the sameservice.

4 / 25

Page 5: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Pseudonyms Signatures Concept

Domain Signatures:1 one user - just one private key for all domains

2 domain pseudonym acts as a public key

3 verification related to the domain pseudonym

4 verification must not reveal the real identity

5 / 25

Page 6: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Pseudonyms Signatures Concept

Domain Signatures:1 one user - just one private key for all domains

2 domain pseudonym acts as a public key

3 verification related to the domain pseudonym

4 verification must not reveal the real identity

5 / 25

Page 7: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Pseudonyms Signatures Concept

Domain Signatures:1 one user - just one private key for all domains

2 domain pseudonym acts as a public key

3 verification related to the domain pseudonym

4 verification must not reveal the real identity

5 / 25

Page 8: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Pseudonyms Signatures Concept

Domain Signatures:1 one user - just one private key for all domains

2 domain pseudonym acts as a public key

3 verification related to the domain pseudonym

4 verification must not reveal the real identity

5 / 25

Page 9: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domains and Requirements

Domain/SectorService area where the user must appear under the same(pseudonymous) identity.like a user account

UnlinkabilityThe pseudonyms in different sectors must beunlinkable.

SeclusivenessOnly the Issuer may create/admit new users.like for issuing personal ID cards

6 / 25

Page 10: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domains and Requirements

Domain/SectorService area where the user must appear under the same(pseudonymous) identity.like a user account

UnlinkabilityThe pseudonyms in different sectors must beunlinkable.

SeclusivenessOnly the Issuer may create/admit new users.like for issuing personal ID cards

6 / 25

Page 11: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domains and Requirements

Domain/SectorService area where the user must appear under the same(pseudonymous) identity.like a user account

UnlinkabilityThe pseudonyms in different sectors must beunlinkable.

SeclusivenessOnly the Issuer may create/admit new users.like for issuing personal ID cards

6 / 25

Page 12: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Requirements

RevocationThe Issuer can revoke a user within a domain.like for stolen personal ID cards

Pseudonym Uniqueness - Resistance to Sybil attacksA user may have just one pseudonym per domain.previous work was focused on this, but surprisingly a formal requirementwas missing

7 / 25

Page 13: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Requirements

RevocationThe Issuer can revoke a user within a domain.like for stolen personal ID cards

Pseudonym Uniqueness - Resistance to Sybil attacksA user may have just one pseudonym per domain.previous work was focused on this, but surprisingly a formal requirementwas missing

7 / 25

Page 14: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Comparison to Direct Anonymous Attestation

Domain Signatures

Direct Anonymous Attestation

8 / 25

Page 15: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Comparison to Direct Anonymous Attestation

Ad Hoc DS: DAA:

Environment: Smart Cards Host with TPM

Privacy issues: a reader is a privacy threat host is NOT a privacy threat

Revocation method: blacklist a pseudonym publish the secret key

Updating the state of a device: Impossible Possible

differences mainly implied by the execution environment

in contrast to Domain Signatures, DAA does not have a revocationmethod without publishing the secret key

9 / 25

Page 16: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Comparison to Direct Anonymous Attestation

Ad Hoc DS: DAA:

Environment: Smart Cards Host with TPM

Privacy issues: a reader is a privacy threat host is NOT a privacy threat

Revocation method: blacklist a pseudonym publish the secret key

Updating the state of a device: Impossible Possible

differences mainly implied by the execution environment

in contrast to Domain Signatures, DAA does not have a revocationmethod without publishing the secret key

9 / 25

Page 17: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Comparison to Direct Anonymous Attestation

Ad Hoc DS: DAA:

Environment: Smart Cards Host with TPM

Privacy issues: a reader is a privacy threat host is NOT a privacy threat

Revocation method: blacklist a pseudonym publish the secret key

Updating the state of a device: Impossible Possible

differences mainly implied by the execution environment

in contrast to Domain Signatures, DAA does not have a revocationmethod without publishing the secret key

9 / 25

Page 18: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Signatures - Formal Definition

Procedures

Setup: Setup(1k )→ (gPK , iSK )

Join/Issue: (uSK [i])← Join(gPK , i)↔ Issue(gPK , iSK , uRT )→(uRT [i])

Generate Pseudonym: NymGen(gPK ,dom, uSK [i])→ nym

Generate Domain Revocation Token:DomainRevocationTokenGen(gPK ,dom, uRT [i])→dRT [i]

Revocation Check: RevocationCheck(dPK ,dom, nym, dRT [i])→ {0, 1}Sign: Sign(gPK ,dom, uSK [i],m)→ σ

Verify: Verify(gPK ,dom, nym,m, σ)→ {0, 1}:

10 / 25

Page 19: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Signatures - Formal Definition

Procedures

Setup: Setup(1k )→ (gPK , iSK )

Join/Issue: (uSK [i])← Join(gPK , i)↔ Issue(gPK , iSK , uRT )→(uRT [i])

Generate Pseudonym: NymGen(gPK ,dom, uSK [i])→ nym

Generate Domain Revocation Token:DomainRevocationTokenGen(gPK ,dom, uRT [i])→dRT [i]

Revocation Check: RevocationCheck(dPK ,dom, nym, dRT [i])→ {0, 1}Sign: Sign(gPK ,dom, uSK [i],m)→ σ

Verify: Verify(gPK ,dom, nym,m, σ)→ {0, 1}:

10 / 25

Page 20: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Signatures - Formal Definition

Procedures

Setup: Setup(1k )→ (gPK , iSK )

Join/Issue: (uSK [i])← Join(gPK , i)↔ Issue(gPK , iSK , uRT )→(uRT [i])

Generate Pseudonym: NymGen(gPK ,dom, uSK [i])→ nym

Generate Domain Revocation Token:DomainRevocationTokenGen(gPK ,dom, uRT [i])→dRT [i]

Revocation Check: RevocationCheck(dPK ,dom, nym, dRT [i])→ {0, 1}Sign: Sign(gPK ,dom, uSK [i],m)→ σ

Verify: Verify(gPK ,dom, nym,m, σ)→ {0, 1}:

10 / 25

Page 21: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Signatures - Formal Definition

Procedures

Setup: Setup(1k )→ (gPK , iSK )

Join/Issue: (uSK [i])← Join(gPK , i)↔ Issue(gPK , iSK , uRT )→(uRT [i])

Generate Pseudonym: NymGen(gPK ,dom, uSK [i])→ nym

Generate Domain Revocation Token:DomainRevocationTokenGen(gPK ,dom, uRT [i])→dRT [i]

Revocation Check: RevocationCheck(dPK ,dom, nym, dRT [i])→ {0, 1}Sign: Sign(gPK ,dom, uSK [i],m)→ σ

Verify: Verify(gPK ,dom, nym,m, σ)→ {0, 1}:

10 / 25

Page 22: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Signatures - Formal Definition

Procedures

Setup: Setup(1k )→ (gPK , iSK )

Join/Issue: (uSK [i])← Join(gPK , i)↔ Issue(gPK , iSK , uRT )→(uRT [i])

Generate Pseudonym: NymGen(gPK ,dom, uSK [i])→ nym

Generate Domain Revocation Token:DomainRevocationTokenGen(gPK ,dom, uRT [i])→dRT [i]

Revocation Check: RevocationCheck(dPK ,dom, nym, dRT [i])→ {0, 1}

Sign: Sign(gPK ,dom, uSK [i],m)→ σ

Verify: Verify(gPK ,dom, nym,m, σ)→ {0, 1}:

10 / 25

Page 23: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Signatures - Formal Definition

Procedures

Setup: Setup(1k )→ (gPK , iSK )

Join/Issue: (uSK [i])← Join(gPK , i)↔ Issue(gPK , iSK , uRT )→(uRT [i])

Generate Pseudonym: NymGen(gPK ,dom, uSK [i])→ nym

Generate Domain Revocation Token:DomainRevocationTokenGen(gPK ,dom, uRT [i])→dRT [i]

Revocation Check: RevocationCheck(dPK ,dom, nym, dRT [i])→ {0, 1}Sign: Sign(gPK ,dom, uSK [i],m)→ σ

Verify: Verify(gPK ,dom, nym,m, σ)→ {0, 1}:

10 / 25

Page 24: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Domain Signatures - Formal Definition

Procedures

Setup: Setup(1k )→ (gPK , iSK )

Join/Issue: (uSK [i])← Join(gPK , i)↔ Issue(gPK , iSK , uRT )→(uRT [i])

Generate Pseudonym: NymGen(gPK ,dom, uSK [i])→ nym

Generate Domain Revocation Token:DomainRevocationTokenGen(gPK ,dom, uRT [i])→dRT [i]

Revocation Check: RevocationCheck(dPK ,dom, nym, dRT [i])→ {0, 1}Sign: Sign(gPK ,dom, uSK [i],m)→ σ

Verify: Verify(gPK ,dom, nym,m, σ)→ {0, 1}:

10 / 25

Page 25: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unforgeability

1 The adversary obtains Issuer’s secret key

2 The adversary may:add new honest users – as the Issuer,ask for pseudonyms, signatures and user secret keys.

3 The adversary returns a pseudonym nym, a domaindom and a signature σ on message m, and wins if:

The signature σ verifies correctly with respect to nymand domThe revocation token of some user i revokes nym.The adversary has not asked for the secret key of thisuser.

11 / 25

Page 26: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unforgeability

1 The adversary obtains Issuer’s secret key

2 The adversary may:add new honest users – as the Issuer,ask for pseudonyms, signatures and user secret keys.

3 The adversary returns a pseudonym nym, a domaindom and a signature σ on message m, and wins if:

The signature σ verifies correctly with respect to nymand domThe revocation token of some user i revokes nym.The adversary has not asked for the secret key of thisuser.

11 / 25

Page 27: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unforgeability

1 The adversary obtains Issuer’s secret key

2 The adversary may:add new honest users – as the Issuer,ask for pseudonyms, signatures and user secret keys.

3 The adversary returns a pseudonym nym, a domaindom and a signature σ on message m, and wins if:

The signature σ verifies correctly with respect to nymand domThe revocation token of some user i revokes nym.The adversary has not asked for the secret key of thisuser.

11 / 25

Page 28: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unforgeability

1 The adversary obtains Issuer’s secret key

2 The adversary may:add new honest users – as the Issuer,ask for pseudonyms, signatures and user secret keys.

3 The adversary returns a pseudonym nym, a domaindom and a signature σ on message m, and wins if:

The signature σ verifies correctly with respect to nymand dom

The revocation token of some user i revokes nym.The adversary has not asked for the secret key of thisuser.

11 / 25

Page 29: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unforgeability

1 The adversary obtains Issuer’s secret key

2 The adversary may:add new honest users – as the Issuer,ask for pseudonyms, signatures and user secret keys.

3 The adversary returns a pseudonym nym, a domaindom and a signature σ on message m, and wins if:

The signature σ verifies correctly with respect to nymand domThe revocation token of some user i revokes nym.

The adversary has not asked for the secret key of thisuser.

11 / 25

Page 30: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unforgeability

1 The adversary obtains Issuer’s secret key

2 The adversary may:add new honest users – as the Issuer,ask for pseudonyms, signatures and user secret keys.

3 The adversary returns a pseudonym nym, a domaindom and a signature σ on message m, and wins if:

The signature σ verifies correctly with respect to nymand domThe revocation token of some user i revokes nym.The adversary has not asked for the secret key of thisuser.

11 / 25

Page 31: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Seclusiveness

1 The adversary creates all users by interacting with theIssuer.(all users are under control of the adversary)

2 The adversary returns a pseudonym nym, a domaindom and a signature σ on a message m.

3 The adversary , and wins if:

The signature σ verifies correctly with respect to nymand dom.No revocation token created by the Issuer revokes nym.

12 / 25

Page 32: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Seclusiveness

1 The adversary creates all users by interacting with theIssuer.(all users are under control of the adversary)

2 The adversary returns a pseudonym nym, a domaindom and a signature σ on a message m.

3 The adversary , and wins if:

The signature σ verifies correctly with respect to nymand dom.No revocation token created by the Issuer revokes nym.

12 / 25

Page 33: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Seclusiveness

1 The adversary creates all users by interacting with theIssuer.(all users are under control of the adversary)

2 The adversary returns a pseudonym nym, a domaindom and a signature σ on a message m.

3 The adversary , and wins if:

The signature σ verifies correctly with respect to nymand dom.

No revocation token created by the Issuer revokes nym.

12 / 25

Page 34: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Seclusiveness

1 The adversary creates all users by interacting with theIssuer.(all users are under control of the adversary)

2 The adversary returns a pseudonym nym, a domaindom and a signature σ on a message m.

3 The adversary , and wins if:

The signature σ verifies correctly with respect to nymand dom.No revocation token created by the Issuer revokes nym.

12 / 25

Page 35: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Pseudonym Uniqueness

1 The adversary obtains the Issuer’s secret key.

2 His goal is to return a revocation token uRT , a domaindom, and tuples (m0,nym0, σ0) and (m1,nym1, σ1).

3 The adversary wins ifsignatures σ0, σ1 verify correctly with respect to(m0,nym0) and (m1,nym1), respectively,uRT revokes both nym0 and nym1.

13 / 25

Page 36: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Pseudonym Uniqueness

1 The adversary obtains the Issuer’s secret key.

2 His goal is to return a revocation token uRT , a domaindom, and tuples (m0,nym0, σ0) and (m1,nym1, σ1).

3 The adversary wins ifsignatures σ0, σ1 verify correctly with respect to(m0,nym0) and (m1,nym1), respectively,uRT revokes both nym0 and nym1.

13 / 25

Page 37: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Pseudonym Uniqueness

1 The adversary obtains the Issuer’s secret key.

2 His goal is to return a revocation token uRT , a domaindom, and tuples (m0,nym0, σ0) and (m1,nym1, σ1).

3 The adversary wins ifsignatures σ0, σ1 verify correctly with respect to(m0,nym0) and (m1,nym1), respectively,

uRT revokes both nym0 and nym1.

13 / 25

Page 38: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Pseudonym Uniqueness

1 The adversary obtains the Issuer’s secret key.

2 His goal is to return a revocation token uRT , a domaindom, and tuples (m0,nym0, σ0) and (m1,nym1, σ1).

3 The adversary wins ifsignatures σ0, σ1 verify correctly with respect to(m0,nym0) and (m1,nym1), respectively,uRT revokes both nym0 and nym1.

13 / 25

Page 39: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Note - Identification of a User

Note that in each experiment, the challengeridentifies the signer (or may identify that no suchsigner exist).

In Direct Anonymous Attestation the challenger cannotidentify the signer...In DAA challenger does not even know, whether theadversary broke unforgeability or seclusiveness.In the security proofs for DAA, establishing the originof the signature is done by an artificial procedure (e.g.knowledge extractor in ROM).

14 / 25

Page 40: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Note - Identification of a User

Note that in each experiment, the challengeridentifies the signer (or may identify that no suchsigner exist).In Direct Anonymous Attestation the challenger cannotidentify the signer...

In DAA challenger does not even know, whether theadversary broke unforgeability or seclusiveness.In the security proofs for DAA, establishing the originof the signature is done by an artificial procedure (e.g.knowledge extractor in ROM).

14 / 25

Page 41: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Note - Identification of a User

Note that in each experiment, the challengeridentifies the signer (or may identify that no suchsigner exist).In Direct Anonymous Attestation the challenger cannotidentify the signer...In DAA challenger does not even know, whether theadversary broke unforgeability or seclusiveness.

In the security proofs for DAA, establishing the originof the signature is done by an artificial procedure (e.g.knowledge extractor in ROM).

14 / 25

Page 42: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Note - Identification of a User

Note that in each experiment, the challengeridentifies the signer (or may identify that no suchsigner exist).In Direct Anonymous Attestation the challenger cannotidentify the signer...In DAA challenger does not even know, whether theadversary broke unforgeability or seclusiveness.In the security proofs for DAA, establishing the originof the signature is done by an artificial procedure (e.g.knowledge extractor in ROM).

14 / 25

Page 43: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unlinkability - Game Based Definition

We may assign an index to every user in the system.

The adversary may ask for,pseudonyms signatures and private keys of the i th user,

If the adversary gives as input user indexes, he knowsexactly which pseudonyms belong to which users.

ExamplePseudonym of the i-th user in domain dom1 → nym1

Pseudonym of the i-th user in domain dom2 → nym2

15 / 25

Page 44: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unlinkability - Game Based Definition

We may assign an index to every user in the system.The adversary may ask for,

pseudonyms signatures and private keys of the i th user,

If the adversary gives as input user indexes, he knowsexactly which pseudonyms belong to which users.

ExamplePseudonym of the i-th user in domain dom1 → nym1

Pseudonym of the i-th user in domain dom2 → nym2

15 / 25

Page 45: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unlinkability - Game Based Definition

We may assign an index to every user in the system.The adversary may ask for,

pseudonyms signatures and private keys of the i th user,

If the adversary gives as input user indexes, he knowsexactly which pseudonyms belong to which users.

ExamplePseudonym of the i-th user in domain dom1 → nym1

Pseudonym of the i-th user in domain dom2 → nym2

15 / 25

Page 46: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unlinkability - Game Based Definition

We may assign an index to every user in the system.The adversary may ask for,

pseudonyms signatures and private keys of the i th user,

If the adversary gives as input user indexes, he knowsexactly which pseudonyms belong to which users.

ExamplePseudonym of the i-th user in domain dom1 → nym1

Pseudonym of the i-th user in domain dom2 → nym2

15 / 25

Page 47: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unlinkability - Previous work

Game based definitions

Bender, Dagdelen, Fischlin, Kugler: ISC 2012[BDFK12]- a mistake, every adversary can win the game.

Bringer, Chabanne, Lescuyer, Patey: FinancialCryptography 2014 [BCLP14]

attempt to cover the problem with “uncertainty sets”obscure and hard to understandrestricts the adversary to some narrow strategies anddoes not cover some real world cases

Brickell, Chen, Li: International Journal of InformationSecurity [BCL09]- considers just two users in one domain.

16 / 25

Page 48: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unlinkability - Previous work

Game based definitions

Bender, Dagdelen, Fischlin, Kugler: ISC 2012[BDFK12]- a mistake, every adversary can win the game.

Bringer, Chabanne, Lescuyer, Patey: FinancialCryptography 2014 [BCLP14]

attempt to cover the problem with “uncertainty sets”obscure and hard to understandrestricts the adversary to some narrow strategies anddoes not cover some real world cases

Brickell, Chen, Li: International Journal of InformationSecurity [BCL09]- considers just two users in one domain.

16 / 25

Page 49: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Unlinkability - Previous work

Game based definitions

Bender, Dagdelen, Fischlin, Kugler: ISC 2012[BDFK12]- a mistake, every adversary can win the game.

Bringer, Chabanne, Lescuyer, Patey: FinancialCryptography 2014 [BCLP14]

attempt to cover the problem with “uncertainty sets”obscure and hard to understandrestricts the adversary to some narrow strategies anddoes not cover some real world cases

Brickell, Chen, Li: International Journal of InformationSecurity [BCL09]- considers just two users in one domain.

16 / 25

Page 50: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Change of concept for Defining Unlinkability

Ideal World

17 / 25

Page 51: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Change of concept for Defining Unlinkability

Ideal World

Real World

18 / 25

Page 52: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Defining unlinkabilitylong story of problems with a formal treatment

Two approaches

Game Based definitions - huge problems for pseudonymunlinkability

Simulation based approaches - static corruptions only

New approaches

this work - game based definitions, except for anonymity which issimulation based:how much new knowledge for the adversary is brought by theparticular crypto algorithm instead of independent keys for eachdomain

Camenisch, Drijver, Lehmann: “Universally Composable DirectAnonymous Attestation” - via UC Framework.

19 / 25

Page 53: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Defining unlinkabilitylong story of problems with a formal treatment

Two approaches

Game Based definitions - huge problems for pseudonymunlinkability

Simulation based approaches - static corruptions only

New approaches

this work - game based definitions, except for anonymity which issimulation based:how much new knowledge for the adversary is brought by theparticular crypto algorithm instead of independent keys for eachdomain

Camenisch, Drijver, Lehmann: “Universally Composable DirectAnonymous Attestation” - via UC Framework.

19 / 25

Page 54: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Defining unlinkabilitylong story of problems with a formal treatment

Two approaches

Game Based definitions - huge problems for pseudonymunlinkability

Simulation based approaches - static corruptions only

New approaches

this work - game based definitions, except for anonymity which issimulation based:how much new knowledge for the adversary is brought by theparticular crypto algorithm instead of independent keys for eachdomain

Camenisch, Drijver, Lehmann: “Universally Composable DirectAnonymous Attestation” - via UC Framework.

19 / 25

Page 55: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Designs related to Pseudonymous Signature

1 prototype of PS: [BDFK12] Bender, Dagdelen, Fischlin,Kugler: ISC 2012

No seclusiveness. If the adversary gets two secret key,then he might compute the Issuer’s secret key

2 a solution from pairings but no group key problem:[BCLP14] Bringer, Chabanne, Lescuyer, Patey:Financial Cryptography 2014

Minor problems (proofs do not work).Pairing delegation procedure leaks partially the user’ssecret key.

3 solution from pairings, model issues fixed: this work

20 / 25

Page 56: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Designs related to Pseudonymous Signature

1 prototype of PS: [BDFK12] Bender, Dagdelen, Fischlin,Kugler: ISC 2012

No seclusiveness. If the adversary gets two secret key,then he might compute the Issuer’s secret key

2 a solution from pairings but no group key problem:[BCLP14] Bringer, Chabanne, Lescuyer, Patey:Financial Cryptography 2014

Minor problems (proofs do not work).Pairing delegation procedure leaks partially the user’ssecret key.

3 solution from pairings, model issues fixed: this work

20 / 25

Page 57: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Designs related to Pseudonymous Signature

1 prototype of PS: [BDFK12] Bender, Dagdelen, Fischlin,Kugler: ISC 2012

No seclusiveness. If the adversary gets two secret key,then he might compute the Issuer’s secret key

2 a solution from pairings but no group key problem:[BCLP14] Bringer, Chabanne, Lescuyer, Patey:Financial Cryptography 2014

Minor problems (proofs do not work).Pairing delegation procedure leaks partially the user’ssecret key.

3 solution from pairings, model issues fixed: this work

20 / 25

Page 58: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Ad hoc Domain Signatures

Solution OverviewBoneh-Boyen like signature based on user’s secret key:

(u, x ,A = (g · hx)1/(z+u))

deriving a pseudonym of a user in a domainnym = Hash(domain-name)u · gx

Signing via a Sigma Protocol and Fiat-Shamirtransformation:

ZKPoK{(α, β, γ) :nym = H(domain-name)α · gβ ∧ γz+α · h−β = g1}

21 / 25

Page 59: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Ad hoc Domain Signatures

Solution OverviewBoneh-Boyen like signature based on user’s secret key:

(u, x ,A = (g · hx)1/(z+u))

deriving a pseudonym of a user in a domainnym = Hash(domain-name)u · gx

Signing via a Sigma Protocol and Fiat-Shamirtransformation:

ZKPoK{(α, β, γ) :nym = H(domain-name)α · gβ ∧ γz+α · h−β = g1}

21 / 25

Page 60: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Ad hoc Domain Signatures

Solution OverviewBoneh-Boyen like signature based on user’s secret key:

(u, x ,A = (g · hx)1/(z+u))

deriving a pseudonym of a user in a domainnym = Hash(domain-name)u · gx

Signing via a Sigma Protocol and Fiat-Shamirtransformation:

ZKPoK{(α, β, γ) :nym = H(domain-name)α · gβ ∧ γz+α · h−β = g1}

21 / 25

Page 61: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Efficiency comparison

Signature SizeScheme G1 G2 GT Zq Bit Size1

Our scheme 1 0 0 6 1792[BDFK12] 0 0 0 3 768[BCLP14] 1 0 0 6 1792

Signature CreationScheme Multiplications Exponentiations

Our Scheme 3 · G1 + 2 · GT 6 · G1 + 3 · GT[BDFK12] 1 · G1 3 · G1[BCLP14] 4 · G1 + 2 · GT 6 · G1 + 3 · GT

Signature VerificationScheme Multiplications Exponentiations Inv. Pairing

Our Scheme 4 · G1 + 1 · G2 + 2 · GT 6 · G1 + 2 · G2 + 2 · GT 0 1[BDFK12] 1 · G1 3 · G1 0 0[BCLP14] 4 · G1 + 2 · GT 6 · G1 + 3 · GT 1 · GT 2

1Counted according to RFC3766 for 256-bit representation Zp, G1

and 512-bit G2. (3707-bit RSA modulus)22 / 25

Page 62: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Open Problems - Revocation

The current state-of-the-art:we may:

request a signer to update his state (download newcredentials/certificates), oruse blacklists like in VRL Group Signatures.

If there are blacklists, then a the party which createsblacklists (issuer) may trace users.

For Ad Hoc Domain Signatures: we may not be awareabout every domain used, thus it is hard to blacklist.

23 / 25

Page 63: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Open Problems - Revocation

The current state-of-the-art:we may:

request a signer to update his state (download newcredentials/certificates), oruse blacklists like in VRL Group Signatures.

If there are blacklists, then a the party which createsblacklists (issuer) may trace users.

For Ad Hoc Domain Signatures: we may not be awareabout every domain used, thus it is hard to blacklist.

23 / 25

Page 64: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Open Problems - Revocation

The current state-of-the-art:we may:

request a signer to update his state (download newcredentials/certificates), oruse blacklists like in VRL Group Signatures.

If there are blacklists, then a the party which createsblacklists (issuer) may trace users.

For Ad Hoc Domain Signatures: we may not be awareabout every domain used, thus it is hard to blacklist.

23 / 25

Page 65: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Conclusions

We gave a new and presumably correct definition forAd Hoc Domain Signatures.At least some issues from previous works are solved.

It may prove useful for giving a sound definition forDirect Anonymous Attestation.We designed an “efficient” (?) scheme from BilinearMaps.Revocation may still be a problem.

24 / 25

Page 66: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Conclusions

We gave a new and presumably correct definition forAd Hoc Domain Signatures.At least some issues from previous works are solved.It may prove useful for giving a sound definition forDirect Anonymous Attestation.

We designed an “efficient” (?) scheme from BilinearMaps.Revocation may still be a problem.

24 / 25

Page 67: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Conclusions

We gave a new and presumably correct definition forAd Hoc Domain Signatures.At least some issues from previous works are solved.It may prove useful for giving a sound definition forDirect Anonymous Attestation.We designed an “efficient” (?) scheme from BilinearMaps.

Revocation may still be a problem.

24 / 25

Page 68: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Conclusions

We gave a new and presumably correct definition forAd Hoc Domain Signatures.At least some issues from previous works are solved.It may prove useful for giving a sound definition forDirect Anonymous Attestation.We designed an “efficient” (?) scheme from BilinearMaps.Revocation may still be a problem.

24 / 25

Page 69: Ad-Hoc-Domain Signatures for Personal eID Documents · Ad-Hoc-Domain Signatures Kluczniak, Hanzlik, Kutyłowski Domain Signatures Models Scheme Problems Ad-Hoc-Domain Signatures for

Ad-Hoc-Domain

Signatures

Kluczniak,Hanzlik,

Kutyłowski

DomainSignatures

Models

Scheme

Problems

Thank You

25 / 25