|
|
1 | (10) |
|
|
|
|
1.1 Identity Management and its Privacy Issues |
|
|
1 | (2) |
|
1.2 Privacy-ABCs for Privacy Enhanced Identity Management |
|
|
3 | (1) |
|
1.3 The ABC4Trust Project Goals |
|
|
4 | (2) |
|
1.4 Overview of the Pilots |
|
|
6 | (5) |
|
1.4.1 Online Course Evaluation |
|
|
6 | (1) |
|
1.4.2 School Community Interaction Platform |
|
|
7 | (2) |
|
|
9 | (2) |
|
2 An Architecture for Privacy-ABCs |
|
|
11 | (68) |
|
|
|
|
|
|
|
|
|
|
|
|
|
2.1 Concepts and Features of Privacy-ABCs |
|
|
12 | (16) |
|
|
12 | (2) |
|
|
14 | (1) |
|
2.1.3 Basic Concepts of Privacy-ABCs |
|
|
14 | (10) |
|
2.1.4 Security and Privacy Features |
|
|
24 | (4) |
|
2.2 Architecture Highlights |
|
|
28 | (1) |
|
|
29 | (4) |
|
2.3.1 Overview of the Components |
|
|
30 | (3) |
|
2.4 Deployment of the Architecture |
|
|
33 | (9) |
|
|
33 | (3) |
|
2.4.2 Presentation of a Token |
|
|
36 | (2) |
|
2.4.3 Issuance of a Credential |
|
|
38 | (3) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
42 | (12) |
|
|
43 | (1) |
|
2.5.2 Credential Specification |
|
|
43 | (1) |
|
2.5.3 Issuer, Revocation, and System Parameters |
|
|
44 | (1) |
|
2.5.4 Presentation Policy with Basic Features |
|
|
45 | (3) |
|
2.5.5 Presentation and Issuance Token |
|
|
48 | (1) |
|
2.5.6 Presentation Policy with Extended Features |
|
|
49 | (2) |
|
2.5.7 Interaction with the User Interface |
|
|
51 | (3) |
|
2.6 Applicability to Existing Identity Infrastructures |
|
|
54 | (12) |
|
|
54 | (2) |
|
|
56 | (2) |
|
|
58 | (1) |
|
|
59 | (3) |
|
|
62 | (3) |
|
2.6.6 Integration Summary |
|
|
65 | (1) |
|
2.7 Trust Relationships in the Ecosystem of Privacy-ABCs |
|
|
66 | (8) |
|
2.7.1 The Meaning of Trust |
|
|
66 | (1) |
|
|
67 | (1) |
|
2.7.3 Trust Relationships |
|
|
67 | (7) |
|
2.8 Policy-based View of the Architecture |
|
|
74 | (5) |
|
|
75 | (4) |
|
3 Cryptographic Protocols Underlying Privacy-ABCs |
|
|
79 | (30) |
|
|
|
|
|
|
|
|
|
3.1 Overview of Cryptographic Architecture |
|
|
80 | (13) |
|
3.1.1 Key Generation Orchestration |
|
|
81 | (1) |
|
3.1.2 Presentation Orchestration |
|
|
82 | (1) |
|
3.1.3 Verification Orchestration |
|
|
83 | (1) |
|
3.1.4 Issuance Orchestration |
|
|
84 | (4) |
|
|
88 | (2) |
|
|
90 | (3) |
|
3.2 Cryptographic Primitives |
|
|
93 | (16) |
|
3.2.1 Algebraic Background |
|
|
93 | (2) |
|
3.2.2 Zero-Knowledge Proofs of Knowledge |
|
|
95 | (2) |
|
|
97 | (2) |
|
3.2.4 Blind Signature Schemes |
|
|
99 | (4) |
|
3.2.5 Verifiable Encryption |
|
|
103 | (1) |
|
3.2.6 Scope-Exclusive Pseudonyms |
|
|
104 | (1) |
|
|
105 | (2) |
|
|
107 | (2) |
|
4 Comparison of Mechanisms |
|
|
109 | (34) |
|
Michael Østergaard Pedersen |
|
|
|
|
|
Tsvetoslava Vateva-Gurova |
|
|
4.1 Theoretical Comparison -- Security Properties and Claims |
|
|
110 | (6) |
|
4.1.1 Computational Assumptions |
|
|
111 | (1) |
|
4.1.2 Security Aspects of Privacy-ABC Schemes |
|
|
112 | (2) |
|
4.1.3 Key Sizes in Practice |
|
|
114 | (2) |
|
|
116 | (27) |
|
4.2.1 Comparison Criteria for Privacy-ABC Technologies |
|
|
117 | (7) |
|
4.2.2 Functionality Comparison |
|
|
124 | (4) |
|
4.2.3 Efficiency Comparison |
|
|
128 | (8) |
|
4.2.4 Security Assurance Comparison |
|
|
136 | (3) |
|
|
139 | (4) |
|
5 Legal Data Protection Considerations |
|
|
143 | (20) |
|
|
|
|
|
|
|
|
143 | (9) |
|
5.1.1 Concepts of Anonymity and Pseudonymity |
|
|
144 | (1) |
|
|
145 | (1) |
|
5.1.3 General Principles and Protection Goals |
|
|
145 | (3) |
|
|
148 | (1) |
|
|
149 | (2) |
|
5.1.6 Data Security Measures |
|
|
151 | (1) |
|
5.2 Applying Legal Requirements to Privacy-ABCs |
|
|
152 | (11) |
|
5.2.1 Transparency and Intervenability for Privacy-ABCs |
|
|
152 | (2) |
|
5.2.2 Contractual Fixation of Processing on Behalf of the Controller |
|
|
154 | (1) |
|
5.2.3 Modelling the Inspection Process |
|
|
155 | (3) |
|
5.2.4 Considerations Concerning the Revocation Process |
|
|
158 | (2) |
|
|
160 | (3) |
|
6 School Community Interaction Platform: the Soderhamn Pilot of ABC4Trust |
|
|
163 | (34) |
|
|
|
|
|
|
6.1 Application Description |
|
|
164 | (9) |
|
6.1.1 Pilot Key Scenarios |
|
|
164 | (3) |
|
|
167 | (1) |
|
6.1.3 The Key Design Elements |
|
|
168 | (4) |
|
6.1.4 Security and Privacy Highlights |
|
|
172 | (1) |
|
6.2 Deployment and Operation of the Pilot |
|
|
173 | (9) |
|
6.2.1 The Deployment Architecture |
|
|
173 | (4) |
|
6.2.2 Initialization and the Roll-out Process |
|
|
177 | (1) |
|
6.2.3 Specification of the Key Use Cases |
|
|
178 | (4) |
|
6.3 Evaluation of the School Pilot |
|
|
182 | (15) |
|
6.3.1 Evaluation of the Deployment |
|
|
182 | (4) |
|
6.3.2 Evaluation of User Experience |
|
|
186 | (7) |
|
|
193 | (1) |
|
|
194 | (3) |
|
7 Course Evaluation in Higher Education: the Patras Pilot of ABC4Trust |
|
|
197 | (44) |
|
|
|
|
|
|
|
|
7.1 Application Description |
|
|
198 | (6) |
|
7.1.1 The Basic Requirements and Functionalities of the Pilot |
|
|
200 | (2) |
|
7.1.2 Advanced Features and Functionalities |
|
|
202 | (2) |
|
7.2 Deployment and Operation of the Pilot |
|
|
204 | (11) |
|
7.2.1 The Deployment Architecture |
|
|
205 | (6) |
|
7.2.2 Policy Specifications for the Main Use Cases |
|
|
211 | (4) |
|
7.3 Evaluation of Usability and User Acceptance of Privacy-ABCs |
|
|
215 | (20) |
|
7.3.1 Research Questions: Usability and User Acceptance |
|
|
216 | (1) |
|
7.3.2 Conceptual Development of a User Acceptance Model |
|
|
217 | (4) |
|
7.3.3 Additional Factors of User Acceptance |
|
|
221 | (2) |
|
7.3.4 Research Methodology |
|
|
223 | (4) |
|
7.3.5 Results of User Feedback and Usability Evaluation |
|
|
227 | (2) |
|
7.3.6 Results on User Acceptance Factors |
|
|
229 | (3) |
|
7.3.7 Insights into the Understanding of Privacy-ABCs |
|
|
232 | (2) |
|
7.3.8 Discussion of the Evaluation Results |
|
|
234 | (1) |
|
7.3.9 Limitations and Future Work |
|
|
235 | (1) |
|
|
235 | (6) |
|
|
236 | (5) |
|
8 Experiences and Feedback from the Pilots |
|
|
241 | (14) |
|
|
|
|
|
242 | (3) |
|
8.1.1 Development and Operational Work-Split |
|
|
242 | (1) |
|
8.1.2 Processing Contracts between Developers and Operators |
|
|
242 | (1) |
|
|
243 | (2) |
|
8.2 Lessons Learned from the Pilots |
|
|
245 | (10) |
|
|
245 | (2) |
|
8.2.2 Strategy for Adopting Privacy-ABC Technologies |
|
|
247 | (1) |
|
|
248 | (1) |
|
|
248 | (1) |
|
8.2.5 Bootstrapping the System |
|
|
249 | (1) |
|
|
250 | (1) |
|
8.2.7 Inspector Application Enhancements |
|
|
251 | (1) |
|
|
251 | (2) |
|
|
253 | (1) |
|
|
254 | (1) |
|
9 Technical Implementation and Feasibility |
|
|
255 | (64) |
|
|
|
|
|
|
|
|
|
|
|
|
9.1 The Reference Implementation |
|
|
256 | (26) |
|
9.1.1 Obtaining and Compiling the Source Code |
|
|
257 | (4) |
|
9.1.2 Deployment of the ABCE as Web Services |
|
|
261 | (5) |
|
9.1.3 Integrating the ABCE in Custom Solutions |
|
|
266 | (2) |
|
9.1.4 Generating Parameters |
|
|
268 | (1) |
|
9.1.5 Example Applications |
|
|
269 | (1) |
|
9.1.6 The Hotel Booking Demo Scenario |
|
|
269 | (9) |
|
9.1.7 Access Control Based on Birthdate |
|
|
278 | (2) |
|
9.1.8 Handling Revocation |
|
|
280 | (1) |
|
9.1.9 Setting Up Your Own Test Privacy-ABC System |
|
|
281 | (1) |
|
9.1.10 Implementation Considerations |
|
|
281 | (1) |
|
9.1.11 Obtaining the ABC4Trust Demo Applications |
|
|
282 | (1) |
|
9.2 ABC4Trust in Smart Cards |
|
|
282 | (17) |
|
9.2.1 Privacy-ABCs on Smart Cards: Prior Art |
|
|
282 | (1) |
|
9.2.2 Introducing ABC4Trust Lite |
|
|
283 | (3) |
|
9.2.3 Functional Model for Privacy-ABC Systems |
|
|
286 | (9) |
|
9.2.4 Instantiating U-Prove, Idemix and other Privacy-ABC Systems |
|
|
295 | (1) |
|
9.2.5 The "Counter" Mechanism |
|
|
295 | (3) |
|
9.2.6 Summary of the APDU Command Set |
|
|
298 | (1) |
|
9.2.7 Potential Extensions |
|
|
299 | (1) |
|
9.3 ABC4Trust on Smartphones |
|
|
299 | (6) |
|
|
300 | (2) |
|
9.3.2 Privacy ABCs in JavaScript |
|
|
302 | (3) |
|
9.3.3 Smart Card Emulation |
|
|
305 | (1) |
|
9.4 Perturbation Analysis |
|
|
305 | (14) |
|
|
306 | (1) |
|
9.4.2 Overview of the PA Methodology |
|
|
307 | (4) |
|
9.4.3 Detailed Methodology |
|
|
311 | (2) |
|
9.4.4 Detailed Overview of the Results |
|
|
313 | (2) |
|
|
315 | (4) |
|
10 Privacy-ABC Usage Scenarios |
|
|
319 | (26) |
|
|
|
|
|
|
|
|
10.1 Review of the Main Actors from a Business Perspective |
|
|
320 | (6) |
|
|
321 | (1) |
|
|
322 | (1) |
|
10.1.3 Issuer (with or without IdM) |
|
|
323 | (3) |
|
10.2 Some Typical Privacy-ABC Scenarios |
|
|
326 | (19) |
|
|
326 | (4) |
|
10.2.2 Scenario: Anonymous Participation in Decisions and Polls |
|
|
330 | (3) |
|
10.2.3 Use of Cloud Service within Enterprises |
|
|
333 | (4) |
|
10.2.4 Scenario: Bank as Identity Service Provider |
|
|
337 | (2) |
|
10.2.5 Scenario: Do not Track Relying Parties |
|
|
339 | (3) |
|
|
342 | (3) |
|
11 Establishment and Prospects of Privacy-ABCs |
|
|
345 | (16) |
|
|
|
|
|
11.1 eIDAS Regulation and ABC4Trust |
|
|
345 | (5) |
|
11.1.1 Suggestion "Emphasise the Concept of Authentication instead of Identification" |
|
|
346 | (2) |
|
11.1.2 Suggestion "Remove Barriers for Privacy-preserving eID Solutions" |
|
|
348 | (1) |
|
11.1.3 Suggestion "Clarify Applicability of Data Protection Requirements also for eID Services" |
|
|
348 | (1) |
|
11.1.4 Privacy-ABCs in the eIDAS Landscape |
|
|
349 | (1) |
|
11.2 How Stakeholders Can Support Privacy-ABCs |
|
|
350 | (4) |
|
11.2.1 "State of the Art" and "Best Practice" |
|
|
350 | (2) |
|
11.2.2 Support of Stakeholders |
|
|
352 | (2) |
|
11.3 Standardization and Certification |
|
|
354 | (7) |
|
11.3.1 Framework Standardizations |
|
|
354 | (2) |
|
11.3.2 Certification of Presentation Policies |
|
|
356 | (2) |
|
|
358 | (3) |
|
|
361 | (8) |
|
|
|
|
|
12.1 Enabling Users to Manage Their Identities and the Identity Management Process |
|
|
362 | (3) |
|
12.1.1 Devices Suitable for Managing Identities |
|
|
362 | (1) |
|
12.1.2 Interfaces for Identity Management |
|
|
363 | (1) |
|
12.1.3 Minimizing the Installation Effort |
|
|
364 | (1) |
|
12.1.4 Additional Services that Help the Users to Manage Their Data and Protect Their Privacy |
|
|
364 | (1) |
|
12.2 Usage of Privacy-ABCs by Relying Parties and Service Providers |
|
|
365 | (4) |
|
12.2.1 Boundaries between Different Domains |
|
|
365 | (1) |
|
12.2.2 Interoperability and Compatibility with Existing Technologies |
|
|
366 | (1) |
|
12.2.3 Enabling Prototypes and Trials |
|
|
366 | (1) |
|
|
367 | (2) |
|
A ABC4Trust Workpackages and Deliverables |
|
|
369 | (4) |
|
|
369 | (1) |
|
|
370 | (3) |
|
|
373 | (8) |
Contributors |
|
381 | |