Re(AC)t Reputation and Anonymous Credentials for Access Control (t=2)

Slides:



Advertisements
Similar presentations
PIS: Unit III Digital Signature & Authentication Sanjay Rawat PIS Unit 3 Digital Sign Auth Sanjay Rawat1 Based on the slides of Lawrie.
Advertisements

Securing Critical Unattended Systems with Identity Based Cryptography A Case Study Johannes Blömer, Peter Günther University of Paderborn Volker Krummel.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
PKE PP Mike Henry Jean Petty Entrust CygnaCom Santosh Chokhani.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
Recoverable and Untraceable E-Cash Dr. Joseph K. Liu The Chinese University of HongKong.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
7/11/2011Pomcor 1 Pros and Cons of U-Prove, Idemix and Other Privacy-Enhancing Technologies Francisco Corella Karen Lewison Pomcor.
Accumulators and U-Prove Revocation Tolga Acar, Intel Sherman S.M. Chow, The Chinese University of Hong Kong Lan Nguyen, XCG – Microsoft Research.
Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research.
VIS-À-VIS CRYPTOGRAPHY : PRIVATE AND TRUSTWORTHY IN-PERSON CERTIFICATIONS IAN MIERS*, MATTHEW GREEN* CHRISTOPH U. LEHMANN †, AVIEL D. RUBIN* *Johns Hopkins.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Chapter 4 Authentication Applications. Objectives: authentication functions developed to support application-level authentication & digital signatures.
Kerberos Jean-Anne Fitzpatrick Jennifer English. What is Kerberos? Network authentication protocol Developed at MIT in the mid 1980s Available as open.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Zero Knowledge Proofs By Subha Rajagopalan Jaisheela Kandagal.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Presented by Xiaoping Yu Cryptography and PKI Cosc 513 Operating System Presentation Presented to Dr. Mort Anvari.
CMSC 414 Computer and Network Security Lecture 19 Jonathan Katz.
C HAPTER 13 Asymmetric Key Cryptography Slides adapted from "Foundations of Security: What Every Programmer Needs To Know" by Neil Daswani, Christoph Kern,
Dan Boneh Introduction What is cryptography? Online Cryptography Course Dan Boneh.
1 CSE 5351: Introduction to Cryptography Ten H. Lai Spring 2015 MW 3:55-5:15 PM, CL133.
Public Key Infrastructure Ammar Hasayen ….
X.509 Certificate management in.Net By, Vishnu Kamisetty
SIP Authorization Framework Use Cases Rifaat Shekh-Yusef, Jon Peterson IETF 91, SIPCore WG Honolulu, Hawaii, USA November 13,
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.
LEVERAGING UICC WITH OPEN MOBILE API FOR SECURE APPLICATIONS AND SERVICES Ran Zhou 1 9/3/2015.
CIS 5371 Cryptography Introduction.
© GlobalSign. A GMO Internet Inc group company. Authentication. Security. Trust. Code Signing Distributing trustworthy software over the Internet.
PowerPoint Lesson 10 Sharing and Delivering Presentations Microsoft Office 2010 Advanced Cable / Morrison 1.
1 Using EMV cards for Single Sign-On 26 th June st European PKI Workshop Andreas Pashalidis and Chris J. Mitchell.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Chapter 9: Using and Managing Keys Security+ Guide to Network Security Fundamentals Second Edition.
Códigos y Criptografía Francisco Rodríguez Henríquez Security Attacks: Active and Passive Active Masquerade (impersonation) Replay Modification of message.
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Presented by: Sanketh Beerabbi University of Central Florida.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Washington System Center © 2005 IBM Corporation August 25, 2005 RDS Training Secure Socket Layer (SSL) Overview z/Series Security (Mary Sweat, Greg Boyd)
P ROTOCOL FOR COLLABORATING MOBILE AGENTS IN THE NETWORK INTRUSION DETECTION SYSTEMS. By Olumide Simeon Ogunnusi Shukor Abd Razak.
A Simple Traceable Pseudonym Certificate System for RSA-based PKI SCGroup Jinhae Kim.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Security Analysis of a Privacy-Preserving Decentralized Key-Policy Attribute-Based Encryption Scheme.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Identity-Based Signatures for MANET Routing Protocols draft-dearlove-manet-ibs-00 Christopher Dearlove Presented by Ulrich Herberg.
Authorized But Anonymous: Taking Charge of Your Personal Data Anna Lysyanskaya Brown University.
General Overview of Various SSO Systems: Active Directory, Google & Facebook Antti Pyykkö Mikko Malinen Oskari Miettinen.
1 CIS 5371 Cryptography 1.Introduction. 2 Prerequisites for this course  Basic Mathematics, in particular Number Theory  Basic Probability Theory 
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Public Key Infrastructure (PKI)
Transmission of IPv6 Packets over IEEE OCB Networks
Cryptography and Network Security
Information Security message M one-way hash fingerprint f = H(M)
Public Key Encryption Systems
B. R. Chandavarkar CSE Dept., NITK Surathkal
Authentication Applications
Identity-based deniable authentication protocol
IS3230 Access Security Unit 9 PKI and Encryption
Information Security message M one-way hash fingerprint f = H(M)
Public Key Infrastructure
Cryptography Lecture 27.
Information Security message M one-way hash fingerprint f = H(M)
X-Road as a Platform to Exchange MyData
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
Top Reasons to Choose Android Today. Over the years the Android OS has progressed largely by acquiring major percent of global market share. A number.
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Public Key Encryption Systems
How to Use Charm Crypto Lib
Presentation transcript:

Re(AC)t Reputation and Anonymous Credentials for Access Control (t=2) Project Group AG Codes & Cryptography Prof. Blömer

Authentication

Authentication (OpenID/OAuth) myTestAccount@google.com *******************

Authentication (OpenID/OAuth) Google vouches for our identity Service knows we have authorization Google shares specified data with the service (e.g., email address) User has control over what is shared Service is ensured validity of data ⇒ Authentication via trusted third party. … but has to be involved each time we authenticate … as long as we trust Google about this Goals: Decentralize authentication. Eliminate need for trust. Bonus: Enable user anonymity.

Authentication via Credentials ✔

Authentication via Credentials Properties: No third party involved in authentication. No trust required in credential issuer. No trust required in authenticator. User has option to stay anonymous. User chooses what information is revealed. Even if issuer and authenticator collaborate.

The Project Group

Our goals Anonymous Credential System Theory Implementation Efficient construction based on recent papers Want to add important features like revocation and identity escrow Techniques: Digital signatures, encryption, zero-knowledge proofs Implementation Java (preferably) We have Java implementation of elliptic curve groups etc. Need software support for interactive protocols Need API, GUI, and scheme implementation Reputation System (optional)

What we offer Meaningful project: Will be used (SFB 901 testbed implementation) Will be published (open source project) Challenges in both theory and practice Set your own focus Insights into modern crypto

Prerequisites For theory: basic probability theory, basic algebra For practice: Java Nice to have: Introduction to Cryptography All „advanced basics“ will be covered in the seminar phase.

Thanks!