Title
Data-minimizing authentication goes mobile
Abstract
Authentication is a prerequisite for proper access control to many eservices. Often, it is carried out by identifying the user, while generally, verification of certified attributes would suffice. Even worse, this kind of authentication makes all the user's transactions linkable and discloses an excessive amount of personal information, and thus erodes the user's privacy. This is in clear contradiction to the data minimization principle put forth in the European data protection legislation. In this paper, we present data-minimizing mobile authentication, which is a kind of attribute-based authentication through the use of anonymous credentials, thereby revealing substantially less personal information about the user. We describe two typical scenarios, design an architecture, and discuss a prototype implemented on a smart phone which minimizes the disclosure of personal data in a user-to-terminal authentication setting. The prototype uses the Identity Mixer anonymous credential system (Idemix) and realizes short-range communication between the smart phone and the terminal using visual channels over which QR codes are exchanged. Furthermore, the security has been improved and unauthorized sharing of credentials prevented by storing the credentials' secret key in a secure element hosted by the mobile phone. Our measurements show that the use of smart phones for data-minimizing authentication can be an actual "game changer" for a broad deployment of anonymous credential systems.
Year
DOI
Venue
2012
10.1007/978-3-642-32805-3_5
Communications and Multimedia Security
Keywords
Field
DocType
attribute-based authentication,anonymous credential,data-minimizing authentication,anonymous credential system,european data protection legislation,mobile authentication,personal information,smart phone,identity mixer anonymous credential,user-to-terminal authentication setting
Mobile computing,Authentication,Computer security,Computer science,Computer network,Data Authentication Algorithm,Authentication protocol,Access control,Mobile phone,Data Protection Act 1998,Multi-factor authentication
Conference
Citations 
PageRank 
References 
1
0.37
18
Authors
6
Name
Order
Citations
PageRank
Patrik Bichsel11316.60
Jan Camenisch26453366.63
Bart De Decker326539.11
Jorn Lapon4628.18
Vincent Naessens58619.70
Dieter Sommer6352.78