The Holder can put such information into the KB-JWT, if required.

-Daniel

Am 20.10.23 um 16:28 schrieb Orie Steele:
In some ways this is related to the question about disclosures.

On Fri, Oct 20, 2023 at 9:03 AM Daniel Fett <fett=40danielfett...@dmarc.ietf.org> wrote:

    At least at the moment I don't think that there is a huge need for
    such a feature. I don't think that we should clutter the existing
    SD-JWT data structures with such information.

I tend to agree with the latter.

There is substantial security / privacy risk, making disclosures carry ANY information other than what the issuer committed to.

    If required, it could go into a separate data structure in the
    SD-JWT, for example a list of JSON pointers with a mapping to the
    respective redaction reasons.


This assumes the issuer knows why the holder chose not to disclose a field.... For some use cases that's probably a knowable thing... it also prevents the holder from using the disclosures as an unsecured channel to communicate with the verifier.

    -Daniel

    Am 18.10.23 um 05:03 schrieb Tom Jones:
    That's leaking the existence of PII. That requires permission of
    the subject. I think it's way more complicated than you think.

    thx ..Tom (mobile)

    On Tue, Oct 17, 2023, 6:20 AM Orie Steele
    <orie@transmute.industries> <mailto:orie@transmute.industries> wrote:

        Hello,

        In government documents that feature redaction, it's common
        for the redaction to be given a reason.

        For example, in the Mueller report, we can see "Harm to
        Ongoing Matter", "Personal Privacy", "Investigative
        Technique", as well as "IT" and "HOM".

        In SD-JWT we see the following:

        Case 1

        "_sd": [
              "IjCRF...znc", // disclosure hash
              "Qdpt9pL...lhU9UDo" // disclosure hash
        ]

        and

        Case 2

        { "...": "Qdpt9pLE2-MjCr...IzhZlhU9UDo" // disclosure hash  }

        After verification and applying disclosures these annotations
        are no longer present.

        I wonder if it would be worth allowing a reason for why a
        holder might have retained a redaction (or chose not to
        disclose for a reason).

        Since the payload is committed to by the issuer, this
        information would have to be present in the disclosures
        collection for the SD-JWT.

        Here is an example disclosure:

        [
          "8UbQ9NZ6xseoDqMW_Bd50A", // salt
          "type", // json object key (always a string)
          [ // json object value
            "VerifiableCredential",
            "ExampleAlumniCredential"
          ]
        ]

        Consider the following strawman syntax for disclosing a
        redaction reason:

        {
          "disclosure hash" : "Personal Privacy" || "Harm to Ongoing
        Matter"
        }

        This allows a UI to map the redaction reason into a
        presentation (ui) layer for the issuer secured payload.

        Since it's an unsecured object, it can be extended with other
        fields at the discretion of the holder or issuer.

        However it might be secured by nesting it inside another JWT
        or SD-JWT.

        It would only slightly complicate the verification logic, you
        would need to filter any encoded disclosures by the `ey`
        prefix, since they will never be found in the payload, as we
        know they will hash differently than array encoded
        disclosures, which will be found in the payload.

        I'll be giving a presentation on this topic to the W3C
        Credentials community group later today, happy to shuttle
        their reactions back to this list.

        Apologies if this has been discussed previously.

        Regards,

        OS


--

        ORIE STEELEChief Technology Officerwww.transmute.industries
        <http://www.transmute.industries>

        <https://transmute.industries>

        _______________________________________________
        OAuth mailing list
        OAuth@ietf.org
        https://www.ietf.org/mailman/listinfo/oauth


    _______________________________________________
    OAuth mailing list
    OAuth@ietf.org
    https://www.ietf.org/mailman/listinfo/oauth

-- Please use my new email address:m...@danielfett.de

    _______________________________________________
    OAuth mailing list
    OAuth@ietf.org
    https://www.ietf.org/mailman/listinfo/oauth



--


ORIE STEELEChief Technology Officerwww.transmute.industries

<https://transmute.industries>
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to