Digital Credentials Offer Enhanced Privacy 49
John Q Random writes "Stefan Brands's company credentica.com announced their U-Prove library and SDK implementing ID tokens — also known as digital credentials or private credentials. (Private Credentials are a cool PKI replacement and anonymous e-cash tech that allows you to prove certified attributes like age, credit rating, group membership, etc. without revealing who you are; to allow you to have a digital life without the digital dossier effect inherent in a central databases.) Following this announcement, Adam Back announced credlib, an open source implementation of Brands credentials (and the older more basic Chaum certificates). These developments relate to recent news from IBM's Zurich labs on their identity-mixer project (previously discussed on Slashdot) that is based on the less efficient Jan Camenisch and Anna Lysyanskaya credentials."
Identity Theft (Score:4, Insightful)
I guess it'll just get added to the to-do list of phishers and ID thieves.
And the fact that (real) sensitive data has to be included to prevent 'leading/sharing' just begs for hacking.
Re: (Score:1, Insightful)
The fact that Adam Back is involved lends serious credibility to this effort. There may well be weaknesses, as with any scheme. But at least it's been looked at and implemented in part by one of the best in the biz.
Of course, some wit might point out how do we know it's the real Adam Back? Clearly that's possible to determine, but with our previous techn
Re: (Score:2)
This is about the world as it has been made by the corporate masters, and their "interesting" repurposing of words.
Re: (Score:3, Interesting)
Stefan is not exactly in need of credibility. We all know he can do the business on the technology side.
The main concerns here are first Stephan has a tendency to prioritize certain political attachments over practical issues. So the question is not whether the system will be as private as cl
Re: (Score:2)
Well blow me down! (Score:3, Funny)
"Me SmartCard an' Biometrics allow en' more booty to be plundered, yarhhh!"
Hah! (Score:1)
Digital creds = "certs or keys" (Score:1, Insightful)
I don't know why people keep trying to reinvent the wheel here.
RTFA (Score:4, Interesting)
The problem with regular certs is that they are all-or-nothing, so if you disclose your cert to a party, they now have all the information in the cert. For example, consider using a "digital drivers license" to prove your age or using a "digital student ID" to get a student discount; it's totall overkill.
The summary explains why Brands credentials are an improvement:
Private Credentials are a cool PKI replacement and anonymous e-cash tech that allows you to prove certified attributes like age, credit rating, group membership, etc. without revealing who you are (emphasis added)
I don't think you understand the tech... (Score:3, Insightful)
You don't put things like "age" or "student ID" on a cert, and you certainly wouldn't put them on a key. Instead, you could use the verified IDs from certs/keys to look up information from a master DB, muc
Um, what the ACs said.... (Score:2)
Re: (Score:3, Informative)
That is the exact opposite of what Dr. Brands is proposing, and the existence of a central database full of sensitive information is precisely the problem he's trying to prevent. How anyone could read his PhD thesis without understanding that is beyond my imagination.
>you're still trusting a third party to only give out a piece
Re: (Score:1)
When I read "digital credentials" I immediately thought "(SSL/SMIME) certs and (SSH/PGP) keys". Those are two standard and widely implemented forms of "strong" digital authentication. SSL certs are also already available in hardware tokens, etc, if you like the FOB route. (Just ask the DoD about CAC cards...)
I don't know why people keep trying to reinvent the wheel here.
Well, if you'd read the summary, you'd have noticed that these add more privacy over traditional certs, while still allowing you to prove credentials. That is, you can prove that you're over 18 without giving any more information about yourself. Compare that with a cert, where at the very least your information can be linked together by cert id.
Ah...this is tech for the porn industry, then. (Score:2)
TFA is for wussies... (Score:2)
That's right; I'm a true tech through and through. If manuals are for wimps then TFA is for wussies too. C'mon - Slashdot editors: you need to shorten up those summaries for those of us with post-MTV-era attention spans!
Re: (Score:2)
yep (Score:2)
That certainly sounds like a credlib-able solution to the problem.
Technolgy can't fix legal/economic problems (Score:3, Insightful)
Re: (Score:3, Insightful)
Much better when there is a well understood solution to the problem. The technology is a necessary not a sufficient condition for fixing these problems. No it won't magically solve our problems but that doesn't negate the use of developing the technology.
Re: (Score:2)
Pretty high, but only if they are on the hook legally for privacy breaches, or if their customer start swinging business based on privacy concerns. Otherwise nil.
All these identity providers listed... (Score:1)
Oh, thats right, I'm reading /. ;)
How? (Score:3, Interesting)
anti-lending feature (Re:How?) (Score:4, Informative)
The CA or credential issuer, he sees secrets when the credential is issued, however you trust him not to abuse those secrets (and maybe you paid him with the same credit card number eg). However due to the crypto magic the CA cant observe nor trace your uses of the credential back to you even with full collusion with relying parties.
In fact the privacy is unconditionally secure and the user has full control and doesnt have to trust anyone (not CA, not relying parties, etc) only that the software of his credential wallet software is correctly implemented. This software would typically be open source and peer reviewed.
Re: (Score:2)
So someone with nothing to lose (a bum?) can't get to verify he's 40?
Apart from a credit card number (can't you get one-off credit cards or cancel them or report it stolen?) I don't know what kind of information you absolutely can't share.
Re: (Score:1, Informative)
Well even that just means the minimum price of the credential resale is set by the issuer.
There is also something called credential pooling, which means an issuer could make a unified credential which is simultaneously your authentication and credential for many important things,
Re: (Score:2)
Well not really. If the ecash coin has $1000 in it and I want to sell my identify for $100 then the price to the buyer is $1100 and he gets $1000 back straight away.
Re: (Score:1)
False security (Score:2)
Either the information is kept by someone and can be obtained from the issuer (whether through legitimate legal means or theft. This is valuable information. Unscrupulous people will steal, trade and sell it). You're basically trusting the issuer to keep you safe. SSL certs are kinda like this but there's no pretense of private data being stored encrypted in the cert.
OR
Once the certificate is issued there is no way to identify who it is issued to,
Re: (Score:2)
If you kept your library lending record on such a token you'd be smoking wacky weed! You might keep some summary information like a trust rating. Or you might just keep it to basics like age, country of residency etc. The reason that anon payments would be useful is in case you didn't trust the vendor to keep your information secret. You already trust the public library not to publish your lending record. However you might not trust a porn retailer not to put you
Re: (Score:2)
Efficiency is an open question (Score:2)
Sigh...PKI REPLACEMENT? (Score:1)
Re: (Score:2)
Now maybe when I get it all set up right, it'll run OK. But so far getting it set up has proven to be a massive time sink for me, and I'm still not there yet.
dave
But will it work in the marketplace? (Score:1)
There are 2 hurdles to this product:
1. Digital certificates of any kind are hard to get Joe average user to understand and adopt. How many people use PGP style email encryption, let alone user SSL certificates?
2. More seriously, how many online business are willing, not only not to collect customer data, but to go to sigif