The strengths of weaker identities: opportunistic personas

  • Authors:
  • Mark Allman;Christian Kreibich;Vern Paxson;Robin Sommer;Nicholas Weaver

  • Affiliations:
  • International Computer Science Institute;International Computer Science Institute;International Computer Science Institute;International Computer Science Institute;International Computer Science Institute

  • Venue:
  • HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Cryptographic security mechanisms often assume that keys or certificates are strongly tied to a party's identity. This requirement can in practice impose a high bar on making effective use of the cryptographic protections, because securing the coupling between credentials and actual identity can prove to be an arduous process. We frame a more relaxed form of identity, termed opportunistic personas, that works by (i) generating cryptographic credentials on an as-needed basis, (ii) associating credentials not with a user per se but instead as a link to past behavior by the same actor, as a means to inform future interactions, and (iii) managing these credentials implicitly in an opportunistic fashion. Using three real-world examples, we illustrate the benefits this unorthodox approach to identity management can yield.