Optimally private access control

Markulf Kohlweiss, Alfredo Rial

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Abstract

Access control based on anonymous credentials allows users to prove to a service provider in a privacy-friendly manner that they possess the credentials required to access a resource. To achieve optimal privacy, the information that service providers can learn from the access control protocol should in principle be just a single event, namely that a user is granted access. However, existing anonymous credential schemes reveal additional information to the service provider such as the identity of the credential issuer, the credential type, and constraints on the attributes of the credential that reveal more than the access decision itself. In addition, the efficiency of selective attribute disclosure is not optimal.

Our contribution is both cryptographic and conceptual. First, we extend existing vector commitment schemes with efficient zero-knowledge protocols to prove correct generation of a new commitment, to prove that a secret value is committed at a secret position, and to prove that a secret position was updated to a new secret value. Second, we employ these protocols along with structure preserving signatures and conceptual techniques from logic-based access control to design a private access control protocol with efficient selective attribute disclosure that achieves our optimality criteria.
Original languageEnglish
Title of host publicationProceedings of the 12th annual ACM Workshop on Privacy in the Electronic Society, WPES 2013, Berlin, Germany, November 4, 2013
PublisherACM
Pages37-48
Number of pages12
ISBN (Electronic)978-1-4503-2485-4
DOIs
Publication statusPublished - 2013
Event12th ACM Workshop on Privacy in the Electronic Society - Berlin, Germany
Duration: 4 Nov 2013 → …
http://wpes2013.di.unimi.it/

Conference

Conference12th ACM Workshop on Privacy in the Electronic Society
Abbreviated titleWPES 2013
CountryGermany
CityBerlin
Period4/11/13 → …
Internet address

Fingerprint Dive into the research topics of 'Optimally private access control'. Together they form a unique fingerprint.

Cite this