Towards Practical Attribute-Based Identity Management: The IRMA Trajectory

نویسندگان

  • Gergely Alpár
  • Bart Jacobs
چکیده

IRMA is an abbreviation for “I Reveal My Attributes”, and at the same time it is the name of a project run by the Digital Security group of the University of Nijmegen and its partners to get attribute-based identity management up and running. This hands-on approach forces us to elaborate many unexplored issues, leading to a better understanding of attributes and their possibilities and challenges. Cryptographic techniques that enable secure and privacy-friendly attribute-based authentication have been around for more than a decade, see [4, 6, 7, 9]. But what is new is that the latest generation of smart cards is powerful enough to perform the required (non-trivial) cryptographic operations in an adequately efficient manner [10]. Hence only now we see efforts to actually deploy attributes in practice, like the IRMA project at Nijmegen. Two other pilot projects should be mentioned, both of which are carried out by the EU-sponsored ABC4Trust consortium [5]. The Swedish pilot [3] gives anonymous access for elementary school pupils to on-line resources (e.g., chat room), while the Greek pilot [1] enables university students to evaluate lectures anonymously. In both cases eligibility and privacy are of primary importance. Although the IRMA pilot uses the same underlying technology, the objective of our research is more general as we investigate a broad variety of attributes and applications. The associated kind of challenges does not appear in these ABC4Trust pilots since each focusses on a single context. This document gives a brief overview of some of the more salient aspects of the IRMA project. First of all, attributes are used in a very broad sense as describing some property of a person. This property may be anonymous (non-identifying), such as your gender, or whether or not you are over 18, but in the IRMA context it may also identify you, for example when the attribute is your bank account or social security number. While the underlying technology provides full unlinkability, the attribute values may provide linkability. This usage of identifying attributes may go against the original intention that attributes should be anonymous, but extending their interpretation to (partial) identification greatly extends the application scenarios. For instance, we foresee registration and status attributes for medical personnel (giving access to medical files), for employees ∗In: S. Fischer-Hübner, E. de Leeuw and C. Mitchell (eds), Policies and Research in Identity Management: Third IFIP WG 11.6 Working Conference, IFIP Adv. in Inf. and Comm. Techn., Vol. 396, Springer, 2013, p.1-3. For the extended version, see [2]. 1See www.irmacard.org for up-to-date information and developments.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Towards Practical Attribute-Based Signatures

An attribute-based signature (ABS) is a special digital signature created using a dynamic set of issued attributes. For instance, a doctor can sign a medical statement with his name, medical license number and medical speciality. These attributes can be verified along with the signature by any verifier with the correct public keys of the respective attribute issuers. This functionality not only...

متن کامل

Secure & privacy-preserving eID systems with Attribute-based credentials

National electronic identification (eID) systems aim to provide universal, unique and reliable identification and authentication mechanisms to the citizens. Many countries in Europe have already introduced or are about to introduce electronic ID cards to their citizens. The increasing number of eID infrastructures and initiatives have been taken to scale the eID systems to support both eGovernm...

متن کامل

Towards a Full-Featured Implementation of Attribute Based Credentials on Smart Cards

Attribute-based Credentials (ABCs) allow citizens to prove certain properties about themselves without necessarily revealing their full identity. Smart cards are an attractive container for such credentials, for security and privacy reasons. But their limited processing power and random access storage capacity pose a severe challenge. Recently, we, the IRMA team, managed to fully implement a li...

متن کامل

Practical Step towards Sampling in Qualitative Research; Focused on Grounded Theory

Today, there is a growing trend towards qualitative research in different areas of academic investigations. However, students face difficulties in deciding on qualitative methods of research, because most of the literature on qualitative research focuses on the philosophical and theoretical aspects, and they hardly offer any practical guidelines. This problem is rooted in the essence of qualita...

متن کامل

A New multi attribute Decision making Reliability Centered Maintenance in Power Transmission Systems

The present context of the electric industry, characterized by competitive markets, privatization, and regulatory of technical requirements forces the power utilities to optimize their asset management practices and develop the requisite decision plans techno-economically. Practically approaching, this paper devises a new support tool based on a multiattribute decision making (MADM) framework i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013