Signing transactions anonymously with Identity Mixer in Hyperledger

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
1 Privacy Prof. Ravi Sandhu Executive Director and Endowed Chair March 8, © Ravi Sandhu World-Leading Research.
Claudia Diaz, Hannelore Dekeyser, Markulf Kohlweiss, Girma Nigusse K.U.Leuven IDIS Workshop 29/05/2008 [Work done in the context of the ADAPID project]
7/11/2011Pomcor 1 Pros and Cons of U-Prove, Idemix and Other Privacy-Enhancing Technologies Francisco Corella Karen Lewison Pomcor.
Grid Security Infrastructure Tutorial Von Welch Distributed Systems Laboratory U. Of Chicago and Argonne National Laboratory.
Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research.
PKI Implementation in the Real World
Report on Attribute Certificates By Ganesh Godavari.
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
Lecture 23 Internet Authentication Applications
AAI and universities Roles and functions. The Smart Card Architect Objectives zBuild a secure Authentication and Authorization Infrastructure between.
Figure 1: SDR / MExE Download Framework SDR Framework Network Server Gateway MExE Download + Verification Using MExE Repository (Java sandbox) MExE Applet.
Introduction to PKI Seminar What is PKI? Robert Brentrup July 13, 2004.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Anonymous Credentials Gergely Alpár Collis – November 24, 2011.
I DENTITY M ANAGEMENT Joe Braceland Mount Airey Group, Inc.
Public Key Infrastructure from the Most Trusted Name in e-Security.
X.509 Certificate management in.Net By, Vishnu Kamisetty
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Research at MSEC Vincent Naessens – Jorn Lapon – Jan Vossaert – Koen Decroix – Faysal Boukayoua – Laurens Lemaire.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
National Institute of Advanced Industrial Science and Technology Brief status report of AIST GRID CA APGridPMA Singapore September 16 Yoshio.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Harshavardhan Achrekar - Grad Student Umass Lowell presents 1 Scenarios Authentication Patterns Direct Authentication v/s Brokered Authentication Kerberos.
CSCE 522 Identification and Authentication. CSCE Farkas2Reading Reading for this lecture: Required: – Pfleeger: Ch. 4.5, Ch. 4.3 Kerberos – An Introduction.
WISTP’08 ©LAM /05/2008 A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup Christer Andersson Markulf Kohlweiss.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
Module 2: Introducing Windows 2000 Security. Overview Introducing Security Features in Active Directory Authenticating User Accounts Securing Access to.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
Manu Drijvers, Joint work with Jan Camenisch, Anja Lehmann. March 9 th, 2016 Universally Composable Direct Anonymous Attestation.
Secure, verifiable online voting 29 th June 2016.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
Key management issues in PGP
Trust Profiling for Adaptive Trust Negotiation
Hyperledger Fabric Making Blockchain Real for Business
Cryptography and Network Security
Authentication.
Radius, LDAP, Radius used in Authenticating Users
KrypC Technologies Accelerated Blockchain Adoption.
Authentication Applications
Introduction to Hyperledger Fabric
Blockchain beyond cryptocurrencies
Signing transactions anonymously with Identity Mixer in Hyperledger
کاربرد گواهی الکترونیکی در سیستمهای کاربردی (امضای دیجیتال)
Idemix: Identity Mixer
Security in ebXML Messaging
Pooja programmer,cse department
NAAS 2.0 Features and Enhancements
PLUG-N-HARVEST ID: H2020-EU
Public-Key Certificates
Jason cooper blockchain specialist Unlock blockchain 14 January 2018
APNIC Trial of Certification of IP Addresses and ASes
Block Chain Fundamentals and HyperLedger
Secure Electronic Transaction (SET) University of Windsor
Anonymous Credentials on a Standard Java Card
Public Key Infrastructure from the Most Trusted Name in e-Security
Technical Approach Chris Louden Enspier
O. Otenko PERMIS Project Salford University © 2002
Cryptographic Usage Mask
Re(AC)t Reputation and Anonymous Credentials for Access Control (t=2)
HIMSS National Conference New Orleans Convention Center
PKI (Public Key Infrastructure)
RSA Digital Certificate Solutions RSA Solutions for PKI David Mateju RSA Sales Consultant
Hyperledger Fabric 소개 및 튜토리얼
National Trust Platform
BUILDING A BLOCKCHAIN USING PYTHON
Presentation transcript:

Signing transactions anonymously with Identity Mixer in Hyperledger Idemix team: Jan Camenisch, Manu Drijvers, Maria Dubovitskaya Blockchain team: Elli Androulaki, Angelo De Caro, Andreas Kind, Alessandro Sorniotti IBM Research - Zurich

(prove Over 17 from ID issued by eGov) Identity Mixer Attribute-based credentials Strong authentication (signatures) Privacy-preserving Access Control Selective disclosure of attributes, predicates over attributes, full unlinkability Auditability Revocation Preserving privacy and unlinkability - Verification is done with the public key of the issuer only Presentation Policy (prove Over 17 from ID issued by eGov)

Identity Mixer vs. multiple X.509 TCerts Certificate Authority (CA) X.509 Identity Mixer Attr 1 Attr 2 Attr 1 Attr 2 secret key public key Attr 1 Attr 2 Attr 1 Attr 2 Attr 1 Attr 2 Attr 1 Attr 2 Attr 1 Attr 2 Attr 1 Attr 2 Attr 1 Attr 2 Attr 1 Attr 2 Presentation Policy 2 Presentation Policy 1 trust Attr 1 Attr 2 Attr 1 Attr 2 Presentation Policy 1 Transaction B Attr 1 Attr 2 Transaction A Attr 1 Attr 2 Attr 1 Attr 2 Transaction A Transaction C Transaction B Attr 1 Attr 2 Attr 1 Attr 2 Attr 1 Attr 2 CA’s public key Verifier

Membership management with Identity Mixer ECerts: (relatively) static enrollment certificates acquired via registration with an enrollment certificate authority (CA). TCerts: Identity Mixer presentation proofs derived from ECert, without interaction with CA Blockchain User B Certificate Authority (CA) Blockchain User A TkeyB shares public key U Application Membership uses uses Ecert U Requests certificates 1xEcert invokes SC txn (signed with TkeyA, encrypted with TkeyA, TkeyB…) Application (stored in wallet) TkeyA TkeyB Accesses ledger TkeyB … sc deployed on every validating peer Smart contract Consensus Network (signed with Ekey of origin, encrypted with validators’ key)

Contribution Overview: MVP for Java SDK User.java (extend with GetSigningIdentity() method) TransactionContext.java Sign Transactions Identity/SigningIdentity.java IdemixSampleStore.java Sign/Verify (Generate/Verify Presentation Tokens) User Certificates Idemixgen tool KeyGen Issuance Revocation Identity Mixer crypto package Generate CA keys Issue ECert Presentation Verification Audit