Thanks for your thoughts Denis, I have answered inline. I only have a short
time to reply right now so apologies for the terse response, and I may
follow up if I have more thoughts.

On Mon, Dec 23, 2024 at 1:59 PM Denis <denis.i...@free.fr> wrote:

> Hi Wayne,
>
> I changed the title of this thread into: Issuer-Verifier unlinkability.
>
> Let us come back for a moment with real world example: the use of a mobile
> driving licence.
>
> A simple way to support the Issuer-Verifier unlinkability property would
> be for the Issuer, once a digital credential has been issued,
> to immediately delete the user account that has been created as well as
> the digital credential that it has issued.
>
> However, from a practical point of view, a major problem would arise: how
> can the Issuer manage the suspension or the revocation
> of the issued digital credential ?
>
Short-lived credentials. Alternatively, you could build a ZKP-based
revocation system that is non-PQC atop the existing P-256 ECDSA systems, as
I don't know that the TSA mDL final rulemaking has requirements on exactly
how revocation is handled--so perhaps the door is open for interpretation,
and this would require policy weigh-in.

>
> If the police, acting as a Verifier, wants to verify that the mobile
> driving licence is not suspended or revoked, how can it do it ?
>
Today, when LEOs bring your license to their car, they query their system
to see if the license is suspended or revoked. Pragmatically, I imagine
this system will continue to exist and be utilized across the 50 US states
at least, with mDL.

>
> This means that, one way or another, the Issuer shall remember that it has
> issued that digital credential to a user
> and that information can be used to establish a link between a digital
> credential issued by the Issuer and
> a presentation proof received by the Verifier.
>
> One additional remark: when the user will need to renew his digital
> credential, he would have to start again from zero.   :-(
>
> The slide 14 called " A Pragmatic Approach for Today: Provably Forgotten
> Signatures" is unable to solve the problem previously identified.
> Whatever kind of cryptographic technique will be used or TEE used by the
> Issuer, it cannot support Issuer-Verifier unlinkability property.
>
> The slide 18 states:
>
> "The future of digital identity lies in zero-knowledge proofs (ZKPs) that
> support post-quantum cryptography,
>   enabling enhanced privacy and selective disclosure".
>
> I don't believe so.
>
> ZKPs are computationally intensive and the size of the key pairs and of
> the digital signatures are big.
> ZKP schemes like BBS, BBS+ or BBS#, by their construction, cannot be
> post-quantum resistant.
>

>
> Without awaiting for the discovery of post-quantum ZKPs, today it is
> already possible to use post-quantum resistant algorithms.
>
I'm proposing that we await the discovery of post-quantum ZKPs that are
efficient, even though today's STARKs can support it but are big/slow. The
problem is that I don't think you'll be able to get the BBS/BLS/etc.
through NIST due to the reasons you mention above and their focus on PQC.

>
>
> One solution is straightforward: to use one-time use digital credentials
> and a key binding mechanism based on
> an OTS (One Time Signature) algorithm like the Winternitz OTS PLUS (WOTS+)
> scheme which is the current state of the art.
> By construction, "Constant-sum WOTS+" is guaranteed to be immune to timing
> attacks.
>
Thanks, interesting to consider this approach.

>
> A further major advantage is the fact that this type of algorithm can be
> supported using the current format of the SD-JWT,
> while this would not be the case for ZKPs.
>
> Denis
>
> Hi all, resurfacing this approach as it may provide issuer-verifier
> unlinkability for SD-JWTs and formats like it depending on your threat
> model.
>
> https://csrc.nist.gov/Presentations/2024/wpec2024-3b4
>
> Best,
> Wayne Chang
> Founder & CEO | SpruceID <https://spruceid.com/> | LinkedIn
> <https://www.linkedin.com/in/waynebuilds/>
>
>
> On Mon, Dec 23, 2024 at 09:07 Joseph Heenan <jos...@authlete.com> wrote:
>
>>
>>
>> On 23 Dec 2024, at 16:02, Denis <denis.i...@free.fr> wrote:
>>
>> Joseph wrote:
>>
>> I believe I've said that, including in your PR I linked above: there are
>> situations where SD-JWT is the best currently available deployable
>> technology
>> for a user disclosing their age to a verifier, and yes, it is absolutely
>> appropriate to use the best currently available deployable technology to
>> solve a real world problem.
>> Yes, in some situations it can’t achieve issuer-verifier unlinkability,
>> but in those situations it can still achieve better data minimisation than
>> alternative technologies.
>> Maybe in the future we will have better solutions available and at that
>> point it might be appropriate to start adding stronger text.
>>
>> A presentation where only a date of birth is disclosed is an example
>> explicitly mentioned in the specification too.
>>
>> I’m deliberately avoiding the term ‘age verification’ there as I think
>> you’re trying to use it to describe some fairly specific situation that
>> hasn’t been defined
>> - I’m not sure whether a stronger statement is possible about the
>> specific case of age verification you seem to be thinking of, as I’m not
>> clear on what that case is,
>> and as I said in my 1st August comment “age verification” is an overly
>> generic term that incorporates a large number of very disparate use cases.
>>
>> I think differently:
>>
>> SD-JWT *as currently described* is NOT "*the best currently available
>> deployable technology for a user disclosing their age to a verifier*".
>>
>>
>> That is not what I said - the ‘in some situations’ is a very important
>> qualifier. (And maybe I should have said ’format specification’ or
>> something rather than ’technology’.)
>>
>> Although I’m somewhat puzzled why you didn’t go on to name what is the
>> best technology, it seemed more like you were agreeing it is the best
>> technology and explaining how it can be extended using available extension
>> points to build a good solution for this use case.
>>
>>          The major problem is that SD-JWT is only a piece of a puzzle
>> that includes other entities - that have not yet been identified.
>> In order to secure the two exchanges described in this draft, other
>> protocols and other entities would need to be considered.
>>
>> As an example, *in its basic form*, OpenID4VCI is insecure.
>>
>> A Framework would be needed to identify all the pieces of the puzzle and
>> to describe how they interrelate.
>>
>> To close the loop, SD-JWT **as currently described** SHOULD NOT be
>> considered to be secure enough
>> for disclosing one or more age threshold values to a Verifier.
>>
>>
>> I don’t think anyone is arguing that the SD-JWT specification contains
>> all the information you need to implement a fully secure age verification
>> ecosystem, and the same applies to OpenID4VCI and SD-JWT VC as well. Nor
>> should they contain these things - they are flexible building blocks that
>> cover many uses cases and can be further profiled/constrained/extended, and
>> they are building blocks that people appear to be successfully building
>> secure solutions on top of. This seems close to complaining that the HTTP
>> RFC doesn’t tell you how you should use cookies when you’re implementing a
>> banking portal.
>>
>> Thanks
>>
>> Joseph
>>
>> _______________________________________________
>> OAuth mailing list -- oauth@ietf.org
>> To unsubscribe send an email to oauth-le...@ietf.org
>>
>
> _______________________________________________
> OAuth mailing list -- oauth@ietf.org
> To unsubscribe send an email to oauth-le...@ietf.org
>
>
>

-- 
Best,
Wayne Chang
Founder & CEO | SpruceID <https://spruceid.com/> | LinkedIn
<https://www.linkedin.com/in/waynebuilds/>
_______________________________________________
OAuth mailing list -- oauth@ietf.org
To unsubscribe send an email to oauth-le...@ietf.org

Reply via email to