Knowledge

Digital credential

Source ๐Ÿ“

324: 42:, a membership certificate or some kind of ticket to obtain some service, such as a cinema ticket or a public transport ticket, a digital credential is a proof of qualification, competence, or clearance that is attached to a person. Also, digital credentials prove something about their owner. Both types of credentials may contain personal information such as the person's name, birthplace, birthdate, and/or biometric information such as a picture or a finger print. 132:
credentials in the physical realm can be exemplified by forms of currency, bus and train tickets, and game-arcade tokens. These items lack personally identifiable information, allowing for their transfer between users without the issuers or relying parties being aware of such transactions. Organizations responsible for issuing credentials verify the authenticity of the information contained within them, which can be provided to verifying entities upon request.
213:
entity exists, capable of disclosing the actual identity of the signer and managing the addition or removal of users from the group, often through the issuance or revocation of group membership certificates. The anonymity, unlinkability, and anonymity revocation features provided by group signatures make them suitable for various privacy-sensitive applications, such as voting, bidding, anonymous payments, and anonymous credentials.
243:
that provides analogous functionality without sacrificing performance: an efficient batch issuing protocol capable of simultaneously issuing multiple unlinkable credentials. This mechanism can be combined with a privacy-preserving certificate refresh process, which generates a fresh unlinkable credential with the same attributes as a previously spent credential.
103:
only be utilised in transactions with authorised merchants. Anonymity is maintained for individuals as long as they ensure that a coin is spent only once. However, if an individual attempts to spend the same coin multiple times, their identity can be established, enabling the bank or relevant authority to take appropriate actions.
196:
further advanced digital credentials by introducing secret-key certificate-based credentials, enhancing Chaum's basic blind-signature system in both the discrete logarithm and strong RSA assumption settings. Brands credentials offer efficient algorithms and unconditional commercial security in terms
102:
Credentials, on the other hand, serve as tangible evidence of an individual's qualifications or attributes, acting as a validation of their capabilities. One notable example is the concept of E-Coins, which are exclusively assigned to individuals and are not transferable to others. These E-Coins can
212:
In a group signature scheme, members of a group can sign a message using their respective secret keys. The resulting signature can be verified by anyone possessing the common public key, without revealing any information about the signer other than their group membership. Typically, a group manager
139:
In contrast, the usage of credit cards, despite sharing a fundamental purpose with money, allows for the generation of detailed records pertaining to the cardholder. Consequently, credit cards are not considered protective of privacy. The primary advantage of money, in terms of privacy, is that its
242:
From an application perspective, the main advantage of Camenisch et al.'s multi-show unlinkable credentials over the more efficient Brands credentials is the property of multi-show unlinkability. However, this property is primarily relevant in offline settings. Brands credentials offer a mechanism
135:
To explore the specific privacy-related characteristics of credentials, it is instructive to examine two types of credentials: physical money and credit cards. Both facilitate payment transactions effectively, although the extent and quality of information disclosed differ significantly. Money is
208:
possibilities for multi-show unlinkable showing protocols. WWhile blind signatures are highly relevant for electronic cash and single-show credentials, the cryptographic primitive known as group signature introduced new avenues for constructing privacy-enhancing protocols. Group signatures share
216:
Efficient constructions for group signatures were presented by Ateniese, Camenisch, Joye, and Tsudik while the most efficient multi-show unlinkable anonymous credential systems]โ€”with the latter being a streamlined version of idemixโ€”are based on similar principles. This is particularly true for
136:
safeguarded against counterfeiting through its physical properties. Furthermore, it reveals minimal information, with coins featuring an inherent value and year of minting, while banknotes incorporate a unique serial number to comply with traceability requirements for law enforcement purposes.
164:
represent a valuable expansion of anonymity. They afford users the ability to adopt different names when interacting with each organization. While pseudonyms enable organizations to establish associations with user accounts, they are unable to ascertain the true identities of their customers.
131:
include documents like passports, driving licenses, credit cards, health insurance cards, and club membership cards. These credentials bear the owner's name and possess certain validating features, such as signatures, PINs, or photographs, to prevent unauthorised usage. In contrast, anonymous
45:
Because of the still evolving, and sometimes conflicting, terminologies used in the fields of computer science, computer security, and cryptography, the term "digital credential" is used quite confusingly in these fields. Sometimes passwords or other means of authentication are referred to as
115:
The concept of anonymous digital credentials centres around the provision of cryptographic tokens to users, enabling them to demonstrate specific statements about themselves and their associations with public and private organizations while maintaining anonymity. This approach is viewed as a
106:
The shared characteristic of being tied to an individual forms the basis for the numerous similarities between digital cash and digital credentials. This commonality explains why these two concepts often exhibit overlapping features. In fact, it is worth noting that a significant majority of
143:
Credentials utilised within a national identification system are particularly relevant to privacy considerations. Such identification documents, including passports, driver's licenses, or other types of cards, typically contain essential personal information. In certain scenarios, it may be
177:
protocols as a novel cryptographic primitive. In such protocols, the signer remains oblivious to the message being signed, while the recipient obtains a signature without any knowledge of the signed message. Blind signatures serve as a crucial building block for various privacy-sensitive
270:(MOOCs) have a very direct bearing on our understanding of learning, recognition and levels as they pose a direct challenge to the status quo. It is useful to distinguish between three forms of online credentials: Test-based credentials, online badges, and online certificates. 257:
Online credentials for learning are digital credentials that are offered in place of traditional paper credentials for a skill or educational achievement. Directly linked to the accelerated development of internet communication technologies, the development of
144:
advantageous to selectively disclose only specific portions of the information contained within the identification document. For example, it might be desirable to reveal only the minimum age of an individual or the fact that they are qualified to drive a car.
165:
Nonetheless, through the utilisation of an anonymous credential, specific assertions concerning a user's relationship with one organization, under a pseudonym, can be verified by another organization that only recognizes the user under a different pseudonym.
224:. Proofs of knowledge based on the discrete logarithm problem for groups of known order and the special RSA problem for groups of hidden order form the foundation for most modern group signature and anonymous credential systems. Moreover, the 156:
is sometimes referred to as a pseudonym system. This nomenclature arises from the nature of the credentials within this system, which are acquired and presented to organizations under distinct pseudonyms that cannot be linked together.
238:
can be considered the first commercial application of multi-show anonymous digital credentials, although in this case, the credentials are associated with chips and computer platforms rather than individuals.
178:
applications, including anonymous payments, voting systems, and credentials. The original notion of an anonymous credential system was derived from the concept of blind signatures but relied on a
95:, has introduced a new set of challenges due to their susceptibility to replication. Consequently, digital cash protocols have been developed with additional measures to mitigate the issue of 116:
privacy-conscious alternative to the storage and utilization of extensive centralized user records, which can be linked together. Anonymous digital credentials are thus related to
173:
Anonymous credential systems have a close connection to the concept of untraceable or anonymous payments. David Chaum made significant contributions to this field by introducing
787:
Ateniese, Giuseppe; Camenisch, Jan; Joye, Marc; Tsudik, Gene (2000). "A practical and provably secure coalition-resistant group signature scheme". In Bellare, Mihir (ed.).
140:
users can preserve their anonymity. However, real-world cash also possesses additional security and usability features that contribute to its widespread acceptance.
76:
are a form of digital credential that indicate an accomplishment, skill, quality or interest. Digital badges can be earned in a variety of learning environments.
528: 496: 464: 432: 400: 332: 1151: 1096: 1010: 968: 925: 856: 810: 768: 725: 653: 833:(2001). "An efficient system for non-transferable anonymous credentials with optional anonymity revocation". In Pfitzmann, Birgit (ed.). 1080: 994: 952: 899: 840: 794: 752: 637: 200:
Another form of credentials that adds a new feature to anonymous credentials is multi-show unlinkability, which is realized through
182:
for the transfer of credentials, involving the translation from one pseudonym to another. Chaum's blind signature scheme, based on
1172: 1073:
Camenisch, Jan; Michels, Markus (1998). "A Group Signature Scheme with Improved Efficiency". In Kazuo Ohta; Dingyi Pei (eds.).
252: 217:
credential systems that provide efficient means for implementing anonymous multi-show credentials with credential revocation.
631: 295: 87:, in general, is not regarded as a form of qualification that is inherently linked to a specific individual, as the value of 285: 235: 225: 894:(2003). "A Signature Scheme with Efficient Protocols". In Cimato, Stelvio; Galdi, Clemente; Persiano, Giuseppe (eds.). 945:(2002). "Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials". In Yung, Moti (ed.). 323: 338:
Level-setting and recognition of learning outcomes: The use of level descriptors in the twenty-first century​
267: 680:(1983). "Blind signatures for untraceable payments". In Chaum, David; Rivest, Ronald L.; Sherman, Alan T (eds.). 535: 503: 471: 439: 407: 1140:
Level-setting and recognition of learning outcomes: The use of level descriptors in the twenty-first century
229: 903: 579: 310: 59: 55: 1038: 570:(October 1985). "Security without identification: transaction systems to make big brother obsolete". 908: 584: 107:
implementations of anonymous digital credentials also incorporate elements of digital cash systems.
290: 263: 179: 51: 39: 1030: 1055: 659: 597: 221: 187: 357: 1147: 1092: 1006: 964: 921: 852: 806: 764: 721: 649: 1084: 1047: 1026: 998: 956: 942: 913: 891: 844: 830: 798: 756: 641: 615: 589: 47: 1138: 336: 987:; Goldreich, Oded (1993). "On Defining Proofs of Knowledge". In Brickell, Ernest F (ed.). 205: 201: 183: 174: 96: 375: 91:
is perceived to reside independently. However, the emergence of digital assets, such as
627: 300: 1166: 984: 742: 259: 197:
of privacy, along with additional features like a proof of non-membership blacklist.
193: 73: 1059: 601: 17: 328: 92: 663: 677: 623: 567: 305: 153: 88: 31: 1113: 619: 280: 128: 1088: 1002: 917: 872: 802: 760: 645: 1074: 960: 848: 834: 746: 121: 341:, 129-131, Keevey, James; Chakroun, Borhene, UNESCO. UNESCO. 35: 1051: 117: 1114:"Digital Credential Platform ๐Ÿฏ ๐—ณ๐—ฎ๐—ฐ๐˜๐˜€ about ๐—–๐—ฟ๐—ฒ๐—ฑ๐—ฒ๐—ป๐˜๐—ถ๐—ฎ๐—น" 593: 58:) that is used for determining its access rights. On other occasions, 988: 946: 788: 685: 152:
The original system of anonymous credentials, initially proposed by
190:
problem, enabled the construction of anonymous credential systems.
160:
The introduction of pseudonyms is a useful extension to anonymity.
84: 67: 63: 741:
Chaum, David; van Heyst, Eugene (1991). "Group signatures". In
127:
Analogous to the physical world, personalised or non-anonymous
876: 718:
Rethinking public key infrastructures and digital certificates
369: 367: 699: 622:; Sahai, Amit; Wolf, Stefan (2000). "Pseudonym systems". In 204:
related credentials of Camenisch et al. The introduction of
209:
similarities with Chaum's concept of credential systems.
529:"PRIME Whitepaper: privacy enhanced identity management" 497:"PRIME Whitepaper: privacy enhanced identity management" 465:"PRIME Whitepaper: privacy enhanced identity management" 433:"PRIME Whitepaper: privacy enhanced identity management" 401:"PRIME Whitepaper: privacy enhanced identity management" 99:, wherein a coin is used for multiple transactions. 62:
and associated key material such as those stored in
562: 560: 558: 556: 360:. The Chronicle of Higher Education. 8 April 2012. 824: 822: 782: 780: 1031:"Efficient signature generation by smart cards" 331:work. Licensed under CC-BY-SA IGO 3.0 ( 220:Both schemes are based on techniques for doing 1083:. Vol. 1514. Springer. pp. 160โ€“174. 955:. Vol. 2442. Springer. pp. 101โ€“120. 902:. Vol. 2576. Springer. pp. 268โ€“289. 797:. Vol. 1880. Springer. pp. 255โ€“270. 711: 709: 640:. Vol. 1758. Springer. pp. 184โ€“199. 34:. Just as a paper-based credential could be a 997:. Vol. 740. Springer. pp. 390โ€“420. 843:. Vol. 2045. Springer. pp. 93โ€“118. 755:. Vol. 547. Springer. pp. 257โ€“265. 8: 327: This article incorporates text from a 50:design, credentials are the properties of a 30:are the digital equivalent of paper-based 907: 873:"idemix- pseudonymity for e-transactions" 583: 1137:Keevy, James; Chakroun, Borhene (2015). 232:, is also based on the same techniques. 836:Advances in Cryptology โ€” EUROCRYPT 2001 349: 1076:Advances in Cryptology โ€“ ASIACRYPT '98 748:Advances in Cryptology โ€“ EUROCRYPT '91 374:Paolucci, Beatrice (9 December 2022). 534:. PRIME. 27 June 2007. Archived from 502:. PRIME. 27 June 2007. Archived from 470:. PRIME. 27 June 2007. Archived from 438:. PRIME. 27 June 2007. Archived from 406:. PRIME. 27 June 2007. Archived from 7: 948:Advances in Cryptology โ€” CRYPTO 2002 790:Advances in Cryptology โ€” CRYPTO 2000 688:'82. Plenum Press. pp. 199โ€“203. 70:#15 are referred to as credentials. 1146:. Paris, UNESCO. pp. 129โ€“131. 990:Advances in Cryptology โ€“ CRYPTO '92 896:Security in Communication Networks 25: 1081:Lecture Notes in Computer Science 995:Lecture Notes in Computer Science 953:Lecture Notes in Computer Science 900:Lecture Notes in Computer Science 841:Lecture Notes in Computer Science 795:Lecture Notes in Computer Science 753:Lecture Notes in Computer Science 638:Lecture Notes in Computer Science 322: 228:, a protocol for authenticating 253:Online credentials for learning 247:Online credentials for learning 633:Selected Areas in Cryptography 296:Privacy enhancing technologies 1: 376:"The Future of Digital Money" 333:license statement/permission 286:Direct anonymous attestation 236:Direct anonymous attestation 226:direct anonymous attestation 268:massive open online courses 1189: 716:Brands, Stefan A. (2000). 250: 572:Communications of the ACM 358:"A Future Full of Badges" 1089:10.1007/3-540-49649-1_14 1003:10.1007/3-540-48071-4_28 918:10.1007/3-540-36413-7_20 803:10.1007/3-540-44598-6_16 761:10.1007/3-540-46416-6_22 646:10.1007/3-540-46513-8_14 230:trusted platform modules 1173:Cryptographic protocols 961:10.1007/3-540-45708-9_5 849:10.1007/3-540-44987-6_7 335:). Text taken from 54:(such as its effective 682:Advances in Cryptology 311:Verifiable credentials 1039:Journal of Cryptology 1027:Schnorr, Claus-Peter 264:electronic passports 18:Anonymous credential 291:Electronic commerce 222:proofs of knowledge 186:signatures and the 28:Digital credentials 1112:certifyMe.online. 1052:10.1007/BF00196725 628:Adams, Carlisle M. 188:discrete logarithm 1153:978-92-3-100138-3 1098:978-3-540-65109-3 1012:978-3-540-57340-1 970:978-3-540-44050-5 943:Lysyanskaya, Anna 927:978-3-540-00420-2 892:Lysyanskaya, Anna 858:978-3-540-42070-5 831:Lysyanskaya, Anna 812:978-3-540-67907-3 770:978-3-540-54620-7 727:978-0-262-02491-4 655:978-3-540-67185-5 620:Rivest, Ronald L. 616:Lysyanskaya, Anna 594:10.1145/4372.4373 578:(10): 1030โ€“1044. 541:on 17 August 2007 509:on 17 August 2007 477:on 17 August 2007 445:on 17 August 2007 413:on 17 August 2007 16:(Redirected from 1180: 1158: 1157: 1145: 1134: 1128: 1127: 1125: 1124: 1118:certifyMe.online 1109: 1103: 1102: 1070: 1064: 1063: 1035: 1029:(January 1991). 1023: 1017: 1016: 981: 975: 974: 941:Camenisch, Jan; 938: 932: 931: 911: 890:Camenisch, Jan; 887: 881: 880: 869: 863: 862: 829:Camenisch, Jan; 826: 817: 816: 784: 775: 774: 743:Davies, Donald W 738: 732: 731: 713: 704: 703: 696: 690: 689: 674: 668: 667: 612: 606: 605: 587: 564: 551: 550: 548: 546: 540: 533: 525: 519: 518: 516: 514: 508: 501: 493: 487: 486: 484: 482: 476: 469: 461: 455: 454: 452: 450: 444: 437: 429: 423: 422: 420: 418: 412: 405: 397: 391: 390: 388: 386: 371: 362: 361: 354: 326: 206:Group signatures 48:operating system 46:credentials. In 40:driver's license 21: 1188: 1187: 1183: 1182: 1181: 1179: 1178: 1177: 1163: 1162: 1161: 1154: 1143: 1136: 1135: 1131: 1122: 1120: 1111: 1110: 1106: 1099: 1072: 1071: 1067: 1033: 1025: 1024: 1020: 1013: 983: 982: 978: 971: 940: 939: 935: 928: 909:10.1.1.186.5994 889: 888: 884: 871: 870: 866: 859: 828: 827: 820: 813: 786: 785: 778: 771: 740: 739: 735: 728: 715: 714: 707: 698: 697: 693: 676: 675: 671: 656: 624:Heys, Howard M. 614: 613: 609: 585:10.1.1.319.3690 566: 565: 554: 544: 542: 538: 531: 527: 526: 522: 512: 510: 506: 499: 495: 494: 490: 480: 478: 474: 467: 463: 462: 458: 448: 446: 442: 435: 431: 430: 426: 416: 414: 410: 403: 399: 398: 394: 384: 382: 373: 372: 365: 356: 355: 351: 347: 320: 315: 276: 255: 249: 202:group signature 175:blind signature 171: 150: 113: 97:double spending 82: 23: 22: 15: 12: 11: 5: 1186: 1184: 1176: 1175: 1165: 1164: 1160: 1159: 1152: 1129: 1104: 1097: 1065: 1046:(3): 161โ€“174. 1018: 1011: 985:Bellare, Mihir 976: 969: 933: 926: 882: 864: 857: 818: 811: 776: 769: 733: 726: 705: 691: 669: 654: 607: 552: 520: 488: 456: 424: 392: 363: 348: 346: 343: 319: 316: 314: 313: 308: 303: 301:Smart contract 298: 293: 288: 283: 277: 275: 272: 260:digital badges 251:Main article: 248: 245: 170: 167: 149: 146: 112: 109: 81: 78: 74:Digital badges 24: 14: 13: 10: 9: 6: 4: 3: 2: 1185: 1174: 1171: 1170: 1168: 1155: 1149: 1142: 1141: 1133: 1130: 1119: 1115: 1108: 1105: 1100: 1094: 1090: 1086: 1082: 1078: 1077: 1069: 1066: 1061: 1057: 1053: 1049: 1045: 1041: 1040: 1032: 1028: 1022: 1019: 1014: 1008: 1004: 1000: 996: 992: 991: 986: 980: 977: 972: 966: 962: 958: 954: 950: 949: 944: 937: 934: 929: 923: 919: 915: 910: 905: 901: 897: 893: 886: 883: 878: 874: 868: 865: 860: 854: 850: 846: 842: 838: 837: 832: 825: 823: 819: 814: 808: 804: 800: 796: 792: 791: 783: 781: 777: 772: 766: 762: 758: 754: 750: 749: 744: 737: 734: 729: 723: 720:. MIT Press. 719: 712: 710: 706: 701: 695: 692: 687: 683: 679: 673: 670: 665: 661: 657: 651: 647: 643: 639: 635: 634: 629: 625: 621: 617: 611: 608: 603: 599: 595: 591: 586: 581: 577: 573: 569: 563: 561: 559: 557: 553: 537: 530: 524: 521: 505: 498: 492: 489: 473: 466: 460: 457: 441: 434: 428: 425: 409: 402: 396: 393: 381: 377: 370: 368: 364: 359: 353: 350: 344: 342: 340: 339: 334: 330: 325: 317: 312: 309: 307: 304: 302: 299: 297: 294: 292: 289: 287: 284: 282: 279: 278: 273: 271: 269: 265: 261: 254: 246: 244: 240: 237: 233: 231: 227: 223: 218: 214: 210: 207: 203: 198: 195: 194:Stefan Brands 191: 189: 185: 181: 180:trusted party 176: 168: 166: 163: 158: 155: 147: 145: 141: 137: 133: 130: 125: 123: 119: 110: 108: 104: 100: 98: 94: 90: 86: 79: 77: 75: 71: 69: 65: 61: 57: 53: 49: 43: 41: 37: 33: 29: 19: 1139: 1132: 1121:. Retrieved 1117: 1107: 1075: 1068: 1043: 1037: 1021: 989: 979: 947: 936: 895: 885: 867: 835: 789: 747: 736: 717: 700:"Credentica" 694: 681: 678:Chaum, David 672: 632: 610: 575: 571: 568:Chaum, David 543:. Retrieved 536:the original 523: 511:. Retrieved 504:the original 491: 479:. Retrieved 472:the original 459: 447:. Retrieved 440:the original 427: 415:. Retrieved 408:the original 395: 383:. Retrieved 379: 352: 337: 329:free content 321: 256: 241: 234: 219: 215: 211: 199: 192: 172: 161: 159: 151: 142: 138: 134: 126: 114: 105: 101: 93:digital cash 83: 80:Digital cash 72: 60:certificates 44: 27: 26: 306:Token money 281:Cypherpunks 154:David Chaum 129:credentials 89:token money 32:credentials 1123:2021-11-01 345:References 162:Pseudonyms 148:Pseudonyms 904:CiteSeerX 580:CiteSeerX 122:anonymity 111:Anonymous 1167:Category 1060:10976365 630:(eds.). 602:15340054 380:IBM Blog 274:See also 66:#12 and 36:passport 745:(ed.). 545:28 June 513:28 June 481:28 June 449:28 June 417:28 June 318:Sources 169:History 118:privacy 52:process 1150:  1095:  1058:  1009:  967:  924:  906:  855:  809:  767:  724:  686:CRYPTO 662:  652:  600:  582:  385:24 May 1144:(PDF) 1056:S2CID 1034:(PDF) 664:77189 660:S2CID 598:S2CID 539:(PDF) 532:(PDF) 507:(PDF) 500:(PDF) 475:(PDF) 468:(PDF) 443:(PDF) 436:(PDF) 411:(PDF) 404:(PDF) 85:Money 1148:ISBN 1093:ISBN 1007:ISBN 965:ISBN 922:ISBN 853:ISBN 807:ISBN 765:ISBN 722:ISBN 650:ISBN 547:2007 515:2007 483:2007 451:2007 419:2007 387:2023 266:and 120:and 68:PKCS 64:PKCS 38:, a 1085:doi 1048:doi 999:doi 957:doi 914:doi 877:IBM 845:doi 799:doi 757:doi 642:doi 590:doi 184:RSA 56:UID 1169:: 1116:. 1091:. 1079:. 1054:. 1042:. 1036:. 1005:. 993:. 963:. 951:. 920:. 912:. 898:. 875:. 851:. 839:. 821:^ 805:. 793:. 779:^ 763:. 751:. 708:^ 684:. 658:. 648:. 636:. 626:; 618:; 596:. 588:. 576:28 574:. 555:^ 378:. 366:^ 262:, 124:. 1156:. 1126:. 1101:. 1087:: 1062:. 1050:: 1044:4 1015:. 1001:: 973:. 959:: 930:. 916:: 879:. 861:. 847:: 815:. 801:: 773:. 759:: 730:. 702:. 666:. 644:: 604:. 592:: 549:. 517:. 485:. 453:. 421:. 389:. 20:)

Index

Anonymous credential
credentials
passport
driver's license
operating system
process
UID
certificates
PKCS
PKCS
Digital badges
Money
token money
digital cash
double spending
privacy
anonymity
credentials
David Chaum
blind signature
trusted party
RSA
discrete logarithm
Stefan Brands
group signature
Group signatures
proofs of knowledge
direct anonymous attestation
trusted platform modules
Direct anonymous attestation

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

โ†‘