Data-minimizing authentication goes mobile

  • Authors:
  • Patrik Bichsel;Jan Camenisch;Bart De Decker;Jorn Lapon;Vincent Naessens;Dieter Sommer

  • Affiliations:
  • IBM Research --- Zurich, Switzerland;IBM Research --- Zurich, Switzerland;IBBT - Distrinet --- KU Leuven, Belgium;MSEC --- KaHo Sint Lieven, Belgium;MSEC --- KaHo Sint Lieven, Belgium;IBM Research --- Zurich, Switzerland

  • Venue:
  • CMS'12 Proceedings of the 13th IFIP TC 6/TC 11 international conference on Communications and Multimedia Security
  • Year:
  • 2012

Quantified Score

Hi-index 0.00

Visualization

Abstract

Authentication is a prerequisite for proper access control to many eservices. Often, it is carried out by identifying the user, while generally, verification of certified attributes would suffice. Even worse, this kind of authentication makes all the user's transactions linkable and discloses an excessive amount of personal information, and thus erodes the user's privacy. This is in clear contradiction to the data minimization principle put forth in the European data protection legislation. In this paper, we present data-minimizing mobile authentication, which is a kind of attribute-based authentication through the use of anonymous credentials, thereby revealing substantially less personal information about the user. We describe two typical scenarios, design an architecture, and discuss a prototype implemented on a smart phone which minimizes the disclosure of personal data in a user-to-terminal authentication setting. The prototype uses the Identity Mixer anonymous credential system (Idemix) and realizes short-range communication between the smart phone and the terminal using visual channels over which QR codes are exchanged. Furthermore, the security has been improved and unauthorized sharing of credentials prevented by storing the credentials' secret key in a secure element hosted by the mobile phone. Our measurements show that the use of smart phones for data-minimizing authentication can be an actual "game changer" for a broad deployment of anonymous credential systems.