SlideShare a Scribd company logo
Privacy Preserving Identity Attribute
Verification in Windows CardSpace

            Kevin Steuer Jr
           Ruchith Fernando
             Elisa Bertino

               October 8, 2010
Windows CardSpace
Identity Manager




Identity Selector                      Relying Party
Identity Manager
● Information card issuer
● Security Token Service
Identity Selector
Source : http://en.wikipedia.org/wiki/File:Cardspace_identity_selector.png
Information Card
XML Descriptor
Issued by an identity manager

           Managed
               &
          Self Issued
Relying Parties/Service Providers
       ● Specifies the required claims
● Expects an XML token containing the values
Privacy Preserving Identity Attribute Verification in Windows CardSpace
Problems
    ?
Identity Manager is trusted in
 securely storing user's identity
          attribute values
Identity Manager holds the attribute values in plain
Proposed Approach
Semi-Trusted Identity Manager
Relying Party → User :
Do you have a Social Security Number?
Just proving that the user does is sufficient!
No need to give away the SSN to the
           Relying Party!
Let the Identity Manager store only a
     COMMITMENT of the SSN

We use the Pedersen commitment
Pedersen Commitment

                                    c=gxhr



●G : Finite cyclic group of large prime order p so that the
Computational Diffie-Hellman (CDH) problem is hard in G

●   A generator g ∊ G

●   x, r ∊ {0, 1, ... , p-1} = Fp
The user obtains a signed identity attribute value
           from an identity provider

Sets up the commitment with the identity manager
How is it used with at a Service Provider?
Zero Knowledge Proof Of
      Knowledge
Schnorr protocol

1. U randomly chooses y, s ∊ F*p , and sends V the

element d = gyhs ∊ G

2. V picks a random value e ∊ F*p , and sends e as a
challenge to U.

3. U sends u = y + ex, v = s + er, both in Fp, to V.

                                       u v     e
4. V accepts the proof if and only if g h = d c in G.
Privacy Preserving Identity Attribute Verification in Windows CardSpace
VeryIDX Managed Card
<ic:SupportedClaimType
Uri="http://veryidx...strongclaims/ssn">
   <ic:DisplayTag>Strong Claim SSN</ic:DisplayTag>
   <ic:Description>Strong Claim ...</ic:Description>
</ic:SupportedClaimType>




<vi:SupportedStrongClaimValues xmlns:vi="http://veryi...">
   <vi:StrongClaimValue
         Uri="http://veryidx...strongclaims/ssn">
      <vi:Commitment>743872676989=</vi:Commitment>
      <vi:R>329839797987493827983=</vi:R>
   </vi:StrongClaimValue>
</vi:SupportedStrongClaimValues>
User is prompted to enter the value of the
               strong claim
           to carryout the proof
But ....
What about the 2nd and 3rd attempts?
Linkability
Consistent attribute values to the relying parties
The identity selector will prove the
     same commitment value
       to the relying party!
Make sure we don't present the same
commitment twice to the relying party!
Original Commitment :
          c1 = gxhr

Commitment in the token to RP :
          ci = gc1hri
Request Security Token Response

<wst:RequestSecurityTokenResponse>
   ...
   <vi:SupportedStrongClaimValues>
      <vi:ClaimValue Uri="http://veryidx...strongclaims/xyz">
         <vi:Commitment>77666876989=</vi:Commitment>
         <vi:R>329839797987493827983=</vi:R>
      </vi:ClaimValue>
   </vi:SupportedStrongClaimValues>
</wst:RequestSecurityTokenResponse>



 Used by the identity selector to retrieve the
 new commitment and random values
Identity Manager : WSO2 Identity Server (IS)

         Identity Selector : Higgins

     Relying Party : WSO2 IS Java RP

      ZKPK implementation : VeryIDX
Thank You !

More Related Content

PPSX
Cleaning activity
PDF
When it's more than just the baby blues _ Local News _ Humboldt Journal, Humb...
PDF
Day 5 mult poly by mono
PPT
Blues Music.It Does Not Get Any Better Than This
PDF
Egs value sver4
PDF
Deciphering 'Claims-based Identity'
PDF
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
PPTX
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff
Cleaning activity
When it's more than just the baby blues _ Local News _ Humboldt Journal, Humb...
Day 5 mult poly by mono
Blues Music.It Does Not Get Any Better Than This
Egs value sver4
Deciphering 'Claims-based Identity'
Windows Server 2008 R2 Active Directory ADFS Claims Base Identity for Windows...
api-security-Jan23.pptxsdfffffffffffffffffffffffffffff

Similar to Privacy Preserving Identity Attribute Verification in Windows CardSpace (20)

PDF
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
PPTX
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
PDF
Claim based authentaication
PPTX
The Road to Identity 2.0
PDF
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
PDF
Verifiable credentials explained by CCI
PDF
OpenID Connect 4 Identity Assurance at IIW #32
PDF
Claims based identity for windows
PDF
Resilience as a new Enforcement Model for IT Security based on Usage Control
PPT
Mature Digital Trust Infrastructure - Are we there yet?
PDF
Digital Identity
PDF
Twg 04-04
PPTX
NIC 2014 Modern Authentication for the Cloud Era
PPTX
Chapter 5 - Identity Management
DOC
Authentication Models
PDF
(Preview) NEC Digital Platform for State and Local Governments
PDF
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
PDF
BlockchainHub Graz Meetup #24 - Self-Sovereign Identity - Andreas Abraham
PDF
CISSP Domain 05 Identity and Access Management (IAM).pdf
PDF
Layer 7: Fine Grained Authorization for Web Services
FOSSASIA 2018 Self-Sovereign Identity with Hyperledger Indy/Sovrin
Privacy Preserving Biometrics-Based and User Centric Authentication Protocol
Claim based authentaication
The Road to Identity 2.0
IRJET - Blockchain-based Public Integrity Verification for Cloud Storage Agai...
Verifiable credentials explained by CCI
OpenID Connect 4 Identity Assurance at IIW #32
Claims based identity for windows
Resilience as a new Enforcement Model for IT Security based on Usage Control
Mature Digital Trust Infrastructure - Are we there yet?
Digital Identity
Twg 04-04
NIC 2014 Modern Authentication for the Cloud Era
Chapter 5 - Identity Management
Authentication Models
(Preview) NEC Digital Platform for State and Local Governments
Identity, Security, and XML Web Services -- The Importance of Interoperable S...
BlockchainHub Graz Meetup #24 - Self-Sovereign Identity - Andreas Abraham
CISSP Domain 05 Identity and Access Management (IAM).pdf
Layer 7: Fine Grained Authorization for Web Services
Ad

Recently uploaded (20)

PDF
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
project resource management chapter-09.pdf
PDF
STKI Israel Market Study 2025 version august
PDF
DP Operators-handbook-extract for the Mautical Institute
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PDF
Getting Started with Data Integration: FME Form 101
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
Chapter 5: Probability Theory and Statistics
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPTX
OMC Textile Division Presentation 2021.pptx
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Tartificialntelligence_presentation.pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
Modernising the Digital Integration Hub
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
DASA ADMISSION 2024_FirstRound_FirstRank_LastRank.pdf
WOOl fibre morphology and structure.pdf for textiles
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1. Introduction to Computer Programming.pptx
project resource management chapter-09.pdf
STKI Israel Market Study 2025 version august
DP Operators-handbook-extract for the Mautical Institute
observCloud-Native Containerability and monitoring.pptx
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
Getting Started with Data Integration: FME Form 101
A contest of sentiment analysis: k-nearest neighbor versus neural network
Chapter 5: Probability Theory and Statistics
A comparative study of natural language inference in Swahili using monolingua...
OMC Textile Division Presentation 2021.pptx
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Assigned Numbers - 2025 - Bluetooth® Document
Tartificialntelligence_presentation.pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Modernising the Digital Integration Hub
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
Ad

Privacy Preserving Identity Attribute Verification in Windows CardSpace