> On Aug 23, 2023, at 12:33 PM, Watson Ladd <watsonbl...@gmail.com> wrote:
> 
> On Wed, Aug 23, 2023 at 10:02 AM David Waite
> <da...@alkaline-solutions.com <mailto:da...@alkaline-solutions.com>> wrote:
<snip>
>> For example, are you talking about properties for anonymous credentials from 
>> the academic space as set by [Chaum85] or perhaps [CL01]? Or maybe are you 
>> talking toward some existing requirements specified by a regulated space?
>> 
>> Assuming you are speaking primarily to multi-use unlinkability, there are 
>> efforts within the broader IETF ecosystem around that -  such as an effort 
>> to describe BBS usage within the CFRG, and proposals/efforts to leverage 
>> that within privacypass and jose. Those obviously will not have the benefit 
>> of being able to be implemented on top of broadly available and accepted 
>> cryptographic operations. I would refer to these as trade-offs rather than 
>> shortcomings.
> 
> Why should users accept worse privacy just because it means we can use
> "accepted" cryptographic operations? It's a tradeoff where the costs
> that are most salient to decision makers (the need for
> "acceptability", e.g. their own ability to make decisisons) are at
> odds with the privacy cost to users, and where it ultimately rests on
> an illusion that primitives matter most.

There are credentials where the user will always have an identifier, per policy 
of the type of credential/credential issuer. Not all credentials are anonymous 
credentials.

There are certainly privacy-centric protocols (such as privacypass) which 
support single-use unlinkability, which is what SD-JWTs are targetting.

Since you used U-Prove as an example - it also only provides unlinkability on 
single-use. Lysyanskaya (separately from [CL01]) describes a linkable anonymous 
credentials scheme in [BL13].

There are issuers who simply are not going to trust their reputation against 
risk of forgery (or other attacks) from using less-proven cryptographic 
algorithms. The issuers may also be operating under explicit guidance on what 
cryptography they are allowed to use (e.g. from NIST). Issuing a ’stack’ of 
credentials for single use unlinkability is worth reducing risks and meeting 
imposed requirements..

The need for more confidence on anonymous credential algorithms is also a 
strong motivator around the BBS efforts.

> As for availability it really
> doesn't take many implementations to have enough for almost all
> purposes, and those who aren't served can make their own.

I would discourage nearly everyone from writing their own cryptography 
implementations - it is a very distinct skill set and mistakes tend toward the 
highest levels of severity.

-DW
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to