You are on page 1of 16

c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

Available online at www.sciencedirect.com

ScienceDirect

journal homepage: www.elsevier.com/locate/cose

Design strategies for a privacy-friendly


Austrian eID system in the public cloud*

Bernd Zwattendorfer*, Daniel Slamanig


Institute for Applied Information Processing and Communications (IAIK), Graz University of Technology (TUG),
Inffeldgasse 16a, 8010 Graz, Austria

article info abstract

Article history: Secure identification and authentication are essential processes in sensitive areas of
Received 10 November 2014 application such as e-Government or e-Health. In Austria, the official eID is the so called
Received in revised form the Austrian citizen card and a means of choice for secure citizen identification and
20 February 2015 authentication. To facilitate the adoption of citizen card authentication at service providers
Accepted 9 March 2015 within the Austrian e-Government strategy, the open source module MOA-ID has been
Available online 20 March 2015 developed. It acts as identity provider for different service providers and manages identi-
fication and authentication based on the Austrian citizen card. Currently, MOA-ID is
Keywords: deployed locally in every service provider's domain and is assumed to be fully trusted. With
Identity management the increasing use of eIDs, however, a move into a public cloud might be advantageous due
Cloud computing to benefits provided cloud computing, e.g., cost savings or scalability. Nevertheless, the
Electronic identity (eID) move of a trusted service into the public cloud brings up new obstacles, in particular with
Privacy respect to security and privacy. Therefore, in this paper we introduce and evaluate three
Cryptography different approaches on how the Austrian eID system based on MOA-ID could be securely
Identification moved into the cloud without violating any privacy or data protection aspects. To achieve
Authentication this, we rely on various cryptographic methods and focus on minimum changes of the
Austrian citizen card current identification and authentication process flow. Based on an evaluation of these
three different approaches, we propose a model which can be generically used for eID
identification and authentication in privacy-invasive environments such as the public
cloud.
© 2015 Elsevier Ltd. All rights reserved.

2008) as national law. Secure authentication and unique


1. Introduction identification of Austrian citizens e by still preserving citizens'
privacy e are the main functions of the Austrian eID system.
The Austrian eID system constitutes one major building block The basic building block for secure authentication and unique
within the Austrian e-Government strategy, which is laid identification in the Austrian eID system is the Austrian citi-
down in the Austrian e-Government Act (Federal Chancellery, zen card (Leitold et al., 2002), the official eID in Austria.

*
A preliminary version of this paper appeared under the title “On Privacy-Preserving Ways to Porting the Austrian eID System to the
Public Cloud” in Proc. of SEC 2013, Auckland, New Zealand, July 2013 (Zwattendorfer and Slamanig, 2013a).
* Corresponding author.
E-mail address: bernd.zwattendorfer@iaik.tugraz.at (B. Zwattendorfer).
http://dx.doi.org/10.1016/j.cose.2015.03.002
0167-4048/© 2015 Elsevier Ltd. All rights reserved.
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 179

To facilitate the adoption of this eID concept at online 2.1. The Austrian citizen card concept
applications, the open source module MOA-ID has been
developed. Basically, MOA-ID manages the identification and Unique identification and secure authentication are essen-
authentication process based on the Austrian citizen card tial processes in e-Government. In particular, unique iden-
for service providers. Currently, the Austrian eID concept tification is essential when a large amount of users comes
treats MOA-ID as a trusted entity, which is deployed locally into play, such as the population of a whole country. In
in every service provider's domain. While this model has such a huge population, identification of citizens based on
indeed some benefits, in some situations a centralized first name, last name, and date of birth may be ambiguous.
deployment approach of MOA-ID may be preferable. For To mitigate this problem, each Austrian citizen is registered
instance, a centralized MOA-ID can save service providers a in a central register and is assigned a unique identification
lot of operational and maintenance costs. However, in terms number. Furthermore, another unique identifier is
of scalability e theoretically the whole Austrian population computed from this number and stored on each citizen
could use this central service for identification and authen- card. This so-called sourcePIN is created by a trusted entity,
tication at service providers e the existing approach is the so-called SourcePIN Register Authority (SRA), and can be
advantageous. used for unique citizen identification at online applications.
To bypass the issue of scalability, in this paper, we propose However, the sourcePIN requires special protection as it is
a centralized deployment approach of MOA-ID in the public forbidden by law to permanently store the sourcePIN outside
cloud. The public cloud is able to provide nearly unlimited the citizen card. Therefore, the Austrian eID concept uses a
computing resources and hence the scalability problem can sector-specific model for identification at online applica-
easily be compensated. However, the move of a trusted ser- tions. In this sector-specific model, the sourcePIN is used to
vice into the public cloud brings up new obstacles. In partic- derive unique sector-specific identifiers, so called sector-
ular, MOA-ID, since now running in the public cloud, can no specific PINs (ssPINs) for every different governmental
longer be considered a fully trusted entity. We encounter sector, e.g., tax, finance, etc. Thereby, citizens' privacy is
these obstacles by introducing three different approaches assured as the sourcePIN cannot be derived from a given
relying on different cryptographic mechanisms, each ssPIN and different ssPIN s of one citizen cannot be linked
describing how the current Austrian eID system can be together.
securely migrated into the public cloud. All approaches retain The key element of the Austrian eID concept constitutes
the workflow of the current Austrian eID system and preserve the Austrian citizen card (Leitold et al., 2002), which is basi-
citizens' privacy when assuming that MOA-ID acts honest but cally an abstract definition of a secure eID token possessed by
curious, i.e., operates correctly but is not trusted with respect every Austrian citizen. Due to this abstract definition, the
to (data) privacy. Our first approach relies on the use of proxy Austrian citizen card is a technology-neutral concept, which
re-encryption and redactable signatures, the second is based allows for different implementations. Currently, imple-
upon anonymous credentials, and the third one sets up on mentations based on smart cards and mobile phones are in
fully homomorphic encryption. Based on an evaluation of use. In general, the main functions of the Austrian citizen card
these three different approaches, we propose a model which are.
can be generically used for eID identification and authenti-
cation in privacy-invasive environments such as the public 1. identification and authentication of citizens and
cloud. 2. secure and qualified electronic signature creation.
Our paper is structured as follows. In Section 2 we briefly
introduce the current Austrian eID system and the architec- Citizen identification is based on a special data structure
ture using MOA-ID for identification and authentication at (the Identity Link), which is solely stored on the Austrian citizen
online services. In Section 3 we present the cryptographic card. This special data structure contains the citizen's first
building blocks that are underlying our approaches. Subse- name, last name, date of birth, a unique identifier (sourcePIN),
quently, our approaches are discussed in detail in Section 4. In and the citizen's qualified signature certificate. To guarantee
Section 5 we thoroughly evaluate the proposed approaches its integrity and authenticity, the Identity Link is digitally
based on selected criteria. Based on the results of the evalu- signed by the SRA at issuance.
ation we propose a generic model in Section 6, which is called Citizen authentication is carried out by creating a qualified
Privacy-Preserving Identity as a Service-Model for eIDs. Related electronic signature according to the EU Signature Directive
work is discussed in Section 7. Finally, we draw conclusions in (European Union, 1999). Referring to this directive, qualified
Section 8. electronic signatures created by the Austrian citizen card are
equivalent to handwritten signatures.

2. The current Austrian eID system 2.2. Identification and authentication at online services

In the following subsections we discuss the basic ideas of the To integrate the citizen card's identification and authentica-
Austrian eID concept by presenting involved components and tion functionality into online services, the open source mod-
processes. ule MOA-ID is used. The current Austrian eID system relies on
180 c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

and Protocol 2.2 illustrates the detailed process. Below, we


firstly discuss the involved entities.
Service Provider: The service provider usually provides
web-based services, which require unique identification and
secure authentication by means of the Austrian citizen card.
This organization can be either a public authority or a private
sector company. In our further descriptions, we focus on
governmental applications only. As an example, typical e-
Fig. 1 e Simplified illustration of MOA-ID based Government applications may include tax or electronic de-
authentication. livery services.
Client-Side Middleware: To facilitate the integration of
citizen card functionality into applications, the Austrian eID
concept foresees an abstract and generic access layer (Hollosi
a local deployment model, where MOA-ID is deployed and et al., 2008) to the citizen card, irrespective of its imple-
operated in basically every service provider's domain. Due to mentation. The client-side middleware implements this
that fact, MOA-ID is assumed to be trusted, i.e., it will not leak interface, which provides online applications easy access to
sensitive information such as the citizen's sourcePIN. Fig. 1 il- citizen card functionality without the need of knowing any
lustrates in an abstract way the typical identification and citizen card specifics. The identity provider MOA-ID uses this
authentication scenario of Austrian citizens using MOA-ID interface for accessing diverse citizen card functions.
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 181

Currently, different implementations of this client-side mid- a security parameter k and outputs a private and public key
dleware exist. Some require local software installations in the pair ðsk; pkÞ. The probabilistic encryption algorithm PKE:Enc
user's domain such as a piece of software on the user's PC or a takes as input a public key pk and a message m2f0; 1g and
Java Applet (Centner et al., 2009). These middleware ap- returns a ciphertext c ¼ PKE:Encðpk; mÞ. The decryption algo-
proaches are used to access citizen card implementations rithm PKE:Dec takes as input a private key sk and a cipher-
which are based on smart cards. Other citizen card imple- text c and returns a message m ¼ PKE:Decðsk; cÞ or ⊥ in the
mentations can also be server-based such as the mobile case of failure. A PKE scheme needs to be correct, i.e.,
phone-based alternative of Orthacker et al. (2010), which in decrypting a ciphertext yields the encrypted message, and at
fact require no local software installations on the client. The least indistinguishable under chosen plaintext attacks (IND-
approach of Orthacker et al. (2010) uses short messages (SMS) CPA).
to transfer transaction codes to the citizen's mobile phone. Abstractly, we can define private key (or symmetric)
Hence, no additional software needs to be installed on the encryption schemes (SE) analogously. SE:KG generates only a
mobile phone. single key k which is used as input to the encryption and
Identity Provider (MOA-ID): MOA-ID represents an identity decryption algorithms. For the security of a private key
provider for governmental or private sector service providers. encryption scheme (SE) one also requires at least IND-CPA
On the one hand, MOA-ID manages the communication with security. Note that when we speak of applying PKE to a mes-
the citizen and her citizen card through the client-side mid- sage m, then we implicitly mean applying hybrid encryption,
dleware. The client-side middleware e irrespective of its i.e., generating a random key k of an SE scheme and sending/
implementation e is accessed by MOA-ID through a generic storing the tuple ðc1 ¼ PKE:Encðk; pkÞ; c2 ¼ SE:Encðm; kÞÞ.
national interface (Hollosi et al., 2008), which is common for
all middleware implementations. On the other hand, MOA-ID
provides specific and authentic citizen card attributes to the 3.3. Redactable signatures
service provider for further processing.
In the following we briefly explain an authentication pro- A conventional DSS scheme does not allow for alterations of a
cess flow at online services (cf. Protocol 1). Steps 1 and 2 signed message without invalidating the signature. So called
represent the identification and steps 3 and 4 the authenti- malleable signatures allow to modify (specified) parts of a
cation process of the Austrian citizen (Stranacher et al., 2013). signed message without invalidating the signature. Malleable
signature schemes which allow removal of parts (replacement
by some special symbol ⊥) by any party are called redactable
3. Cryptographic building blocks signature (RS) schemes (Steinfeld et al., 2001; Johnson et al.,
2002). Basically, they can be constructed from any secure
In the following we briefly review all required cryptographic DSS relying on the hash-then-sign paradigm by virtue of
building blocks. For the sake of completeness we also include modifying the construction of the hash value (typically using
conventional (public key) encryption and digital signature randomized Merkle-Hash trees instead of a plain crypto-
schemes. graphic hash of the entire message). Besides RS constructions
for linear documents, there are also approaches for tree-
3.1. Digital signatures structured documents, e.g., XML documents (Brzuska et al.,
2010; Slamanig and Rass, 2010). Below, we present an ab-
A digital signature scheme (DSS) is a triple stract definition of redactable signature schemes. Henceforth
ðDSS:KG; DSS:Sign; DSS:VerifyÞ of efficient algorithms, where we assume that a secure scheme for linear documents is used
DSS:KG is a probabilistic key generation algorithm that takes a and refer the reader to (Steinfeld et al., 2001) for required se-
security parameter k and outputs a private and public key pair curity properties.
ðsk; pkÞ. The (probabilistic) signing algorithm DSS:Sign takes as
input a message m2f0; 1g and a private (signing) key sk, and RS.KG: This probabilistic key generation algorithm takes a
outputs a signature s. The verification algorithm DSS:Verify security parameter k and produces and outputs a private
takes as input a public (verification) key pk, a message and public key pair ðsk; pkÞ.
m2f0; 1g and a signature s, and outputs a single bit RS.Sign: This (probabilistic) signing algorithm gets as input
b2ftrue; falseg indicating whether s is a valid signature for m the signing key sk and a message m ¼ ðm½1; …; m½[Þ, split
under pk. One requires a DSS to be correct, i.e., all honestly into blocks m½i2f0; 1g , and outputs a signature
generated signatures verify, and existentially unforgeable s ¼ RS:Signðsk; mÞ.
under adaptively chosen-message attacks (EUF-CMA). In RS.Verify: This deterministic signature verification algo-
practice one typically employs the hash-then-sign paradigm, rithm gets as input a public key pk, a message
i.e., instead of inputting m into DSS:Sign and DSS:Verify, one m ¼ ðm½1; …; m½[Þ, m½i2f0; 1g , and a signature s and out-
inputs HðmÞ where H is a suitable cryptographic hash function. puts a single bit b ¼ RS:Verifyðpk; m; sÞ, b2ftrue; falseg,
indicating whether s is a valid signature for m under pk.
3.2. (Public key) encryption RS.Redact: This (probabilistic) redaction algorithm takes as
input a message m ¼ ðm½1; …; m½[Þ, m½i2f0; 1g , a public
A public key encryption (PKE) scheme is a triple key pk, a signature s, and a list MOD of indices of blocks to
ðPKE:KG; PKE:Enc; PKE:DecÞ of efficient algorithms, where be redacted. It returns a modified message and signature
PKE:KG is a probabilistic key generation algorithm that takes b b
pair ð m; s Þ ¼ RS:Redactðm; pk; s; MODÞ or an error.
182 c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

b s
Note that for any redacted signature ð m; b Þ, we have that operation, such schemes can be classified into bidirectional,
b b
RS:Verifyðpk; m; s Þ ¼ true holds. i.e., the proxy can transform from A to B and vice versa, and
unidirectional, i.e., the proxy can convert in one direction
3.4. Anonymous signatures only, schemes. Furthermore, one can distinguish between
multi-use schemes, i.e., the ciphertext can be transformed
Anonymous signature schemes allow members of some group from A to B to C etc., and single-use schemes, i.e., the
to issue signatures on behalf of a group in a way that a ciphertext can be transformed only once. Moreover, it is
signature does not reveal which group member actually pro- desirable that an RE scheme is non-interactive, i.e., a trans-
duced it. There are several flavors of anonymous signatures: formation key from A to B can be locally computed by A, where
Group signatures (Chaum and van Heyst, 1991; Ateniese only the public key of B is required. In our approach we
et al., 2000) involve a dedicated entity (the group manager), exemplarily use the unidirectional single-use identity-based
who runs a setup and an explicit join protocol for every group proxy re-encryption scheme of Green and Ateniese (Green and
member to create the signing key ski of the respective member Ateniese, 2007), as in our setting we have a master authority
i. Furthermore, the group manager is able to open signatures (SRA) which can take care of the key generation.
issued by group members to identify the respective signer and
thus the anonymity provided by group signatures is RE.Setup: This probabilistic algorithm gets a security
conditional. parameter k. It outputs the master public parameters
List signatures (Canard et al., 2006) further allow to limit the params, which are distributed to users, and the master
number of issued group signatures per user and thus allow private key msk, which is kept private.
linkability of group signatures, i.e., group signatures issued by RE.KG: This probabilistic key generation algorithm gets
the same group member can be (publicly) linked (if a certain params, the master private key msk, and an identity
threshold is reached). id2f0; 1g and outputs a private key skid corresponding to
Ring signatures (Rivest et al., 2001; Abe et al., 2002) are identity id.
conceptually similar to group signatures, but there is no group RE.Enc: This probabilistic encryption algorithm gets
manager and the anonymity provided is unconditional. They params, an identity id2f0; 1g , and a plaintext m and out-
are “ad-hoc”, meaning that a user may take an arbitrary set puts cid ¼ RE:Encðparams; id; mÞ.
(ring) R of valid public keys to construct a ring signature and R RE.RKGen: This probabilistic re-encryption key generation
represents the anonymity set. algorithm gets params, a private key skid1 (derived via
We choose to use ring signatures for two of our approaches RE:KG), and two identities ðid1 ; id2 Þ2ðf0; 1g Þ2 and outputs a
and present an abstract definition of ring signatures below. re-encryption key
We assume that the used scheme is secure and refer the
reader to (Rivest et al., 2001; Abe et al., 2002) for the required  
rkid1 /id2 ¼ RE:RKGen params; skid1 ; id1 ; id2 :
security properties.

AS.KG: This probabilistic key generation algorithm takes a RE.ReEnc: This (probabilistic) re-encryption algorithm gets
security parameter and outputs a private and public key as input a ciphertext cid1 under identity id1 and a re-
pair (sk.pk). encryption key rkid1 /id2 (generated by RE:RKGen) and out-
AS.Sign: This (probabilistic) signing algorithm gets as input puts a re-encrypted ciphertext
a signing key ski s.t. pki 2R, a ring of public keys
R ¼ ðpk1 ; …; pkn Þ, a message m and outputs a signature  
cid2 ¼ RE:ReEnc cid1 ; rkid1 /id2 :
s ¼ AS:Signðski ; R; mÞ.
AS.Verify: This deterministic signature verification algo-
rithm gets as input a ring of public keys R ¼ ðpk1 ; …; pkn Þ, a RE.Dec: This decryption algorithm gets params, a private
message m, and a signature s and outputs a single bit key skid , and a ciphertext cid and outputs
b ¼ AS:VerifyðR; m; sÞ, b2ftrue; falseg, indicating whether s m ¼ RE:Decðparams; skid ; cid Þ or an error ⊥.
is a valid signature for m under R.
We note that as with PKE schemes one requries at least
IND-CPA security and one could as well use other secure
3.5. Proxy re-encryption unidirectional single-use schemes (Ateniese et al., 2005; Chow
et al., 2010; Libert and Vergnaud, 2011) instead of the one
Proxy re-encryption (RE) (Blaze et al., 1998) is a public key mentioned above.
encryption paradigm where a semi-trusted proxy, given a
transformation key, can transform a message encrypted 3.6. Anonymous credentials
under the key of party A into another ciphertext to the same
message such that another party B can decrypt with its private Anonymous credential systems (Brands, 2000; Camenisch and
key. Although the proxy can perform this re-encryption Lysyanskaya, 2001, 2002, 2004; Baldimtsi and Lysyanskaya,
operation, it does not learn anything about the encrypted 2013; Hanser and Slamanig, 2014) enable anonymous
message. According to the direction of this re-encryption attribute-based authentication, i.e., they allow to selectively
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 183

reveal attributes while hiding the identity of the credential's FHE.KG: This probabilistic key generation algorithm takes a
owner as well as undisclosed attributes. Multi-show ap- security parameter and produces and outputs a public-key
proaches support unlinkability, i.e., different showings of a pk, a public evaluation key evk, and a private key sk.
credential remain unlinkable and are unlinkable to the FHE.Enc: This probabilistic encryption algorithm takes a
issuing (Camenisch and Lysyanskaya, 2001, 2002, 2004; message m2f0; 1g and a public-key pk and outputs a
Hanser and Slamanig, 2014), while others are one-show ciphertext c ¼ FHE:Encðm; pkÞ.
(Brands, 2000; Baldimtsi and Lysyanskaya, 2013), i.e., multi- FHE.Dec: This deterministic algorithm takes a ciphertext c
ple showings of the same credential can be linked together and a private key sk and outputs m ¼ FHE:Decðc; skÞ.
while issuing and showing cannot be linked. Anonymous FHE.Eval: This homomorphic evaluation algorithm
credentials are typically very expressive meaning that takes an evaluation key evk, a function f : f0; 1gn /f0; 1g
credential holders can not only selectively reveal values of and k ciphertexts and outputs a ciphertext
attributes, but also prove that certain relations among attri- cf ¼ FHE:Evalðf ; c1 ; …; ck ; evkÞ.
butes hold, without revealing the attribute values, e.g.,
proving that for attribute age encoded into the credential it In this definition messages are bits, but this can easily be
holds that age > 18 without revealing anything beyond. We generalized to larger spaces. Let us consider arbitrary message
use a very simple abstract definition of an anonymous spaces in the following. For one of our approaches we need to
credential system following (Akagi et al., 2008): assume that FHE schemes exists which support homomorphic
function evaluation and proxy re-encryption. Loosely
AC.KG: This probabilistic key generation algorithm is run speaking, after (or prior to) evaluating some arbitrary function
by an authority and takes a security parameter k and pro- on a ciphertext we additionally require that for each pair of
duces and outputs a private and public key pair ðski ; pki Þ. public keys pk1 and pk2 one can derive f1;2 and evk1;2 such that
AC.Issue: This interactive algorithm is run between a user    
U and an authority A. U has as input a list of attributes with m ¼ FHE:Dec FHE:Eval f1;2 ; FHE:Encðm; pk1 Þ; evk1;2 ; sk2 :
corresponding values attr and wants to obtain a credential
This means that by using f1;2 one performs a “re-encryp-
for attr (U may also have as input a long term secret). U
tion” of m encrypted under pk1 to another ciphertext under
executes the credential issuing protocol for attr with A by
pk2 , which can then be decrypted using sk2 . Such a scheme can
using U's input attr and A has as input it's private key sk.
trivially be realized using any FHE scheme by letting f1;2
Both algorithms have as input pk and at the end of this
represent the circuit, which firstly decrypts the ciphertext c
interaction U obtains a credential Cred corresponding to
using sk1 obtaining m and then encrypts m using pk2 and
attr.
evk1;2 ¼ evk1 . Gentry (Gentry, 2009) has shown that this feature
AC.Prove: This interactive algorithm is run between a user
can be realized by encrypting the ciphertext under the re-
U and a verifier V. U proves the possession of Cred for attr',
ceivers public key and then homomorphically apply the
which represents some subset of attr, to a verifier V. At the
decryption function (using an encryption of the private key) to
end of the protocol, V outputs accept if U has a valid
the result.
credential Cred for attr', otherwise V outputs reject.

We note that the Prove algorithm may also be non-


interactive, i.e., the credential holder produces a signature of 4. Porting the Austrian eID system to the
knowledge which can then be given to the verifier to check the public cloud
validity of the proof locally and that attr' may also include
predicates about attributes in attr. The current Austrian eID system relies on a local deploy-
ment model, where MOA-ID is deployed and operated in
3.7. Fully homomorphic encryption basically every service provider's domain. Due to that fact,
MOA-ID is assumed to be trusted, i.e., it will not leak sen-
Fully homomorphic encryption (FHE) schemes are semanti- sitive information such as the citizen's sourcePIN. The cur-
cally secure (public-key) encryption schemes which allow rent local deployment model of MOA-ID has some benefits
arbitrary functions to be evaluated on ciphertexts without in terms of end-to-end security or scalability, but still some
having access to the secret key and without learning neither issues can be identified compared to a centralized deploy-
the inputs nor the result in plain. Gentry (Gentry, 2009) pro- ment model of MOA-ID. The adoption of a centralized
vided the first construction along with a general blue-print to model may have the following advantages and
construct (bootstrap) such schemes from less powerful ones. disadvantages:
Since then lots of improvements and alternate approaches On the one hand, the use of one single and central instance
have been proposed (cf. (Vaikuntanathan, 2011)), although it of MOA-ID has a clear advantage for citizens as they only need
can be assumed to require some more years of research to to trust one specific identity provider. In addition, users could
make FHE practical in general (Gentry et al., 2012; Halevi and benefit from a comfortable single sign-on (SSO). On the other
Shoup, 2014, 2015). A fully homomorphic public-key hand, especially service providers can save a lot of costs
encryption scheme is defined by the following efficient because they do not need to operate and maintain a separate
algorithms. MOA-ID installation. In addition, several different identity
184 c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

protocols can be supported and hence the service provider 4.1. Using proxy re-encryption and redactable
could select its favorite protocol. signatures
Nevertheless, still some disadvantages can be identified.
For instance, a single instance of MOA-ID constitutes a single Here, the Identity Link I ' is modified in a way that it does no
point of failure or attack. Additionally, a centralized MOA-ID longer include the sourcePIN, but additionally all ssPINs ac-
relies on a brokered trust model and the service provider has cording to all possible governmental sectors. In this
no direct trust relationship with the citizen anymore as it is in augmented Identity Link I ', every attribute ai is encrypted
the local deployment model. Finally, scalability may be an using an uni-directional single-use proxy re-encryption
issue as all citizen authentications will run through this scheme under a public key (the identity of MOA-ID) such
centralized system. This is probably the main issue, as theo- that the corresponding private key is not available to MOA-ID
retically the whole Austrian population could use this service and is only known to the SRA. Furthermore, instead of using
for identification and authentication at service providers. a conventional digital signature scheme, I' is signed by the
However, the issue on scalability can be tackled by moving SRA using a redactable signature scheme such that every ai
MOA-ID into a public cloud, which is able to theoretically from I ' can be redacted. The public verification key is available
provide unlimited computing resources. Needless to say, a to MOA-ID. Every service provider Sj obtains a key pair for the
move of a trusted service into the public cloud brings up some proxy re-encryption scheme when registering at the SRA. The
new obstacles. For instance, assuming that MOA-ID in the latter entity produces a re-encryption key, which allows to re-
cloud works correctly, it still has to be ensured that the cloud encrypt ciphertexts intended for MOA-ID to Sj , and gives it to
provider has no access to private citizen data during the MOA-ID. In Protocol 2 we present the detailed workflow.
authentication process. In general, MOA-ID in the cloud must We note that neither step 1 nor step 2 reveal anything aside
still work equivalent to the current Austrian eID system and from encrypted data to MOA-ID and thus any of the two steps
must still be compliant to the Austrian national law. may be implemented. Furthermore, observe that in step 3 we
In order to make a migration of the Austrian eID system provide three distinct ways to realize the protocol. Thereby,
and MOA-ID into the public cloud possible, we have identified the second choice (3.2) is identical to the state-of-the-art (cf.
three approaches to adapt the existing Austrian eID system Protocol 1) with the drawback that it would allow unique
for running it in the public cloud. The adapted Austrian eID identification of the citizen. In order to overcome this issue,
system of the respective solution will provide all functions of one could omit an additional signature (3.1), when assuming
MOA-ID (identification, ssPIN generation, and authentication) that I' is only available on the respective citizen card and thus
as in the current settings, but protects citizen's privacy with can be already seen as a proof that MOA-ID is interacting with
respect to the cloud provider. For providing compact de- an authorized citizen. Additionally, one could use anonymous
scriptions, we denote the SourcePIN Register Authority by SRA signature schemes for this purpose. As already noted
and the Identity Link by I ¼ ððA1 ; a1 Þ; …; ðAk ; ak ÞÞ as a sequence in Section 3.4, we propose the use of ring signatures due to
of attribute labels and attribute values. Let the set of citizens their characteristics. Thereby, the ring R a citizen should use
be C ¼ fC1 ; …; Cn g and the set of service providers be could be fixed by some party, e.g., the SRA, or could be
S ¼ fS1 ; …; S[ g as well as the citizen's client-side middleware assembled on the fly by the citizen (Persiano and Visconti,
be denoted as M. Moreover, let us assume that Citizen Ci wants 2000; Lindell) and be of a size such that it provides the
to authenticate at service provider Sj who requires the set of desired level of anonymity. We, however, note that if citizens
attributes A j from I and exactly one ”pseudonym”, i.e., the assemble the rings on the fly, the choice of the ring has to be
ssPIN for the sector s the service provider Sj is associated to. done with care (Slamanig and Stingl, 2008). For example,
Additionally, recall that every citizen Ci has a signing key skCi randomly sampling two distinct rings R and R' which both
stored on the card and the public key pkCi is publicly available. include Ci and presented along with the same I ' will almost
For simplicity, we use a single security parameter k for all certainly identify Ci uniquely. For a suitable choice of the
schemes, although depending on the instantiation of the rings, however, MOA-ID only learns that the citizen perform-
respective scheme different ones may be required. Table 1 ing the authentication is someone within the set S, but there is
summarizes the abbreviations used in the remaining no unique identification.
subsections. Finally, we want to note that the use of multi-use instead of
single-use PRE schemes in our setting (i.e., where a ciphertext
could be re-encrypted multiple times successively) would
merely make a conceptual difference. Therefore note that
Table 1 e Abbreviations used within the protocol intercepting a ciphertext re-encrypted for some service pro-
descriptions. vider would require another re-encryption key from the ser-
vice provider to some other party. Computing this re-
A[ Attribute label
a[ Attribute value encryption key, however, requires access to the private key
Aj Set of required attributes of the service provider. Hence, when loosing the private key,
Ci Citizen the service provider gives anybody who has access to the
I Identity Link private key access to all encrypted data anyways. Neverthe-
M Client-side middleware less, since multi-use functionality is not required it makes
Sj Service provider
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 185
186 c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

sense to restrict ourselves to the use of single-use schemes the following: The Identity Link I of a citizen holds the same
though. attributes as it is in the currently deployed system (and in
particular the sourcePIN), but every attribute ai is encrypted
4.2. Using anonymous credentials using an FHE scheme with the above described property under
MOA-ID's public key, for which MOA-ID does not hold the
As above, the Identity Link I is augmented to I' in a way that it private key. Furthermore, this resulting I ' is conventionally
does no longer include the sourcePIN, but additionally all signed by the SRA. Then, for authentication at Sj , the resulting
ssPIN’s. Now, the SRA issues an anonymous credential Cred to I ' and the signature s are sent to MOA-ID who checks the
every citizen for attr being all attributes in I'. Essentially, a signature and homomorphically computes the respective
citizen then authenticates to a service provider by proving to ssPIN from the encrypted sourcePIN (without learning neither
MOA-ID the possession of a valid credential, i.e., MOA-ID sourcePIN nor ssPIN). Then, for all encrypted attributes
checks whether the credential has been revoked or not. Note required by Sj (including the afore computed encrypted ssPIN),
that for one-show credentials, if the entire credential Cred is MOA-ID performs the “FHE re-encryption” to Sj's public key.
shown to MOA-ID, this amounts to a simple lookup in a
blacklist. If the credential is not revoked, MOA-ID signs the
credential to confirm that it is not revoked and the citizen
Table 2 e Evaluation of the various approaches. We use ✓
performs via M a non-interactive proof by revealing the to indicate that a criterion is fully applicable, z if it is
necessary attributes A j including the required ssPIN to Sj , who partly applicable, and  if it is not applicable. For
can then in turn verify the proof(s) as well as MOA-ID's quantitative criteria we use L (low), M (medium), and H
signature. In Protocol 3 we present the detailed workflow, (high).
where we emphasize that the ratio behind the distinct choices Approach1 Approach2 Approach3
in step 3 is identical to the first approach.
Re-use of existing z z z
Note that in this approach Cred is shown to MOA-ID, which infrastructure
however does not reveal the attribute values but makes Conformance to current ✓ z ✓
revocation easier, since it only requires blacklist lookups. One workflow
could also use multi-show credentials, where M would then Scalability ✓ ✓, z ✓
have to perform a proof with MOA-ID which convinces MOA- Practicability ✓ ✓, z 
Extensibility  z ✓
ID that the credentials are not revoked (Lapon et al., 2011),
Middleware complexity L L, H L
which provides stronger privacy guarantees.
Service provider effort L M H
Trust in MOA-ID L L L
4.3. Using fully homomorphic encryption Anonymity , ✓ ✓ , ✓
Unlinkability  , ✓ 
This approach is a rather theoretic one and requires an FHE Auth. without prior ✓ ✓ ✓
registration
scheme as discussed before. The idea behind this approach is
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 187

On receiving the respective information from MOA-ID, the Scalability: Is the approach applicable in a large scale?
service provider can decrypt all attribute values. In Protocol 4 Practicability: Can the authentication process be carried
we present the detailed workflow. out within a reasonable time frame?
Extensibility: Is the applied infrastructure of the approach
easily extensible to new requirements, e.g., adding new
5. Evaluation sectors and thus requiring new ssPINs.
Middleware complexity: Does the approach require high
In this section we evaluate the three different approaches complexity or computational power from the client-side
based on selected criteria targeting several aspects, e.g., middleware?
evaluating the overall architecture or aspects regarding the Service provider effort: How much effort is required by the
individual entities. We briefly describe the selected criteria for service provider adopting a particular approach?
evaluation below and in Table 2 we present a compact com- Trust in MOA-ID: Does the approach require MOA-ID being
parison of the approaches. trusted?
Anonymity: Does the approach support citizens to be
Re-use of existing infrastructure: How much of the existing anonymous with respect to MOA-ID?
infrastructure of the Austrian eID system can be re-used or Unlinkability: Are users unlinkable to MOA-ID, i.e., can
do a lot of parts need to be exchanged or modified? different authentications of one citizen be linked together?
Conformance to current workflow: Is the authentication Authentication without prior registration: The current
process flow of the approach conformable to the existing Austrian eID system allows registration-less authentica-
citizen card authentication process flow? tions. Hence, is this feature still possible?
188 c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

In the following, we give some explanations why specific Extensibility: For adding new sectors, approach 1 would
criteria could be fulfilled, partly fulfilled, or not-fulfilled by the require a full exchange of the Identity Link, as it must be re-
respective approach. signed when adding a new encrypted ssPIN. The same issue
holds for approach 2, since a new credential incorporating
Re-use of existing infrastructure: This criterion can only be the new ssPIN must be stored on the citzen card (with the
partly fulfilled by all approaches, since they require some exception when using scope-exclusive pseudonyms as
modification of the existing Austrian eID infrastructure. proposed in the ABC4Trust project).1 In approach 3, ssPIN’s
For instance, the attribute values of the existing Identity are computed from the encrypted version of the sourcePIN
Link structure must be exchanged by encrypted values and and no modifications of the Identity Link are required.
the Identity Link needs to be augmented. For approach 1, Middleware complexity: In approach 1, client-side mid-
the conventional signature of the Identity Link must also dleware complexity is low as only redaction of the Identity
be exchanged by a redactable signature. In contrast to that, Link is required. Middleware complexity in approach 2
Approach 2 using anonymous credentials requires a com- depends on the type of anonymous credentials used.
plete re-structuring of the Identity Link. However, all ap- Depending on the used revocation mechanism, the use of
proaches can still rely on the same basic architectural multi-show credentials can be very expensive for M (Lapon
concept of the Austrian eID infrastructure, using MOA-ID et al., 2010, 2011), when taking into account that the system
as identity provider. covers all citizens of Austria. For approach 3, middleware
Conformance to current workflow: Approach 1 and 3 fully complexity is low again as its functionality is equal to
comply with the current citizen card authentication pro- current middleware implementations.
cess flow as they follow the steps identification, ssPIN Service provider effort: The effort for service providers
provision, and authentication. Approach 2 is slightly adopting approach 1 is low. Service providers just need to
different, as MOA-ID just checks if a provided credential is verify the data received by MOA-ID and do some decryp-
not valid. The actual verification of the credential is carried tion operations. For approach 2, the effort is slightly higher
out directly at the service provider. because service providers need to set up appropriate veri-
Scalability: Basically, all approaches can be adopted in a fication mechanisms for the claims provided by the user.
large scale. Approach 1 and 3 are similar to the existing The effort for service providers in approach 3 is can be
Austrian eID system, as only a few attributes need to be considered highest with the use of current FHE systems.
exchanged within the Identity Link and the computational Trust in MOA-ID: Since no sensitive citizen data such as
requirements for the middleware remain low. For approach the sourcePIN or any ssPIN are revealed to MOA-ID, no trust
2, it must be distinguished whether one-show or multi- is required. In approach 1 and 3 MOA-ID only sees
show anonymous credentials will be used. For one-show encrypted citizen data. In approach 2 MOA-ID does only see
credentials, revocation checking is a very light-weight pro- the credential but none of its attribute values. However, in
cess (Baldimtsi and Lysyanskaya, 2013) and hence easy any case we assume that MOA-ID works correctly.
adoptable. In contrast to that, revocation for multi-show Anonymity: For approach 2, anonymity is obvious as the
credentials is much more complex (Lapon et al., 2010, whole approach sets up on anonymous credentials.
2011) and not easily applicable for a large amount of users Achieving anonymity in approach 1 and 3 depends on the
such as the Austrian population. Finally, any scalability sub-processes to be chosen for citizen authentication
doubts concerning MOA-ID can be neglected as it is running (signature creation). Both approaches 1 and 3 rely on three
in a public cloud providing nearly unlimited resources. similar alternative sub-processes. Sub-process 1 does not
Practicability: Approach 1 and 2 can be considered to be the request a citizen signature and fully relies on the Identity
most promising practical approaches to date. All the Link's signature for citizen authentication, as the Identity
cryptographic primitives required by approach 1 can Link is only available to the citizen. In this case, the citizen
already be implemented efficiently, i.e., redactable signa- stays fully anonymous in the face of MOA-ID. In sub-
tures typically only have a negligible overhead over con- process 2, citizen signature creation is requested by MOA-
ventional digital signature schemes, and (Nunez et al., ID for citizen authentication. In this case, citizens are
2012; Zwattendorfer et al., 2014) already demonstrate the uniquely identifiable by MOA-ID due to pkCi . Finally, within
practical use of proxy re-encryption. For approach 2, again sub-process 3 ring signatures are created and enable citi-
we must distinguish between one-show and multi-show zen anonymity with respect to the defined ring.
credentials. For one-show credentials, proof generation Unlinkability: For our approaches, it is very hard to achieve
requires moderate effort and can be considered entirely unlinkability with respect to MOA-ID. In approach 1 and 3
practical (Baldimtsi and Lysyanskaya, 2013; Hinterwa € lder citizens are linkable because they always present the same
et al., 2013). For multi-show credentials, revocation is still Identity Link and corresponding signature. Citizens could
complex and computational expensive on a very large only be unlinkable in approach 2, where one-show cre-
scale as it is the case within eID scenarios (Lapon et al., dentials allow linking, but multi-show credentials provide
2010, 2011). This makes approach 2 when using multi- unlinkability.
show credentials quite impracticable. For approach 3, Authentication without prior registration: This criterion
FHE still requires extensive further research to make it can still be fulfilled by all of our approaches.
entirely practical, even when relying on high computa-
tional power in public clouds (Halevi and Shoup, 2014,
1
2015). https://abc4trust.eu.
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 189

5.1. Discussion The following entities or stakeholders, respectively, are


involved in this generic model:
After discussing our evaluation, we can conclude that all ap-
proaches might be feasible but not all of are entirely practical Registration authority (RA): The registration authority is a
when considering an implementation of a cloud-based fully trusted entity that issues secure tokens including
approach instead of the current Austrian eID system. In our authentic and qualified attributes to users. The novelty in
opinion, approach 1 seems to be the best solution for a current this issuance process is that the issued tokens contain the
deployment, as it could be quickly realized and requires less user attributes in encrypted form using a proxy re-
effort for the client-side middleware and the service provider. encryption scheme.
However, linkability and higher efforts for extensions are the Service provider (SP): The service provider holds protected
drawbacks of this approach. Depending on the type of anony- resources or services, which require proper identification
mous credential system, approach 2 might also be practicable and authentication for gaining access.
and possible to implement. However, it introduces more Identity provider (IdP): The identity provider manages the
complexity and efforts for the client-side middleware identification and authentication process for the service
compared to approach 1, while having the benefit of full ano- provider and provides the service provider the user's
nymity and unlinkability. Finally, although approach 3 has its identity and authentication information in a structured
advantages, e.g., in terms of extensibility, and would be form. In this scenario, the identity provider is deployed in a
promising for the future, it is currently not practicable. privacy-invasive environment such as the public cloud.
Implementations of FHE schemes are currently still in the early Client-Side middleware (M): The client-side middleware
stages which definitely hinder a fast adoption of this approach. acts as intermediary between the secure token storing
The results of this evaluation lead us to enhance and refine encrypted attributes and the identity provider who verifies
approach 1 to build a generic model for the use of eIDs in the them.
public cloud. This generic model can be applied to any eID
system and thus is not restricted to the Austrian eID system. In the following we present the registration and authenti-
In the following section we present this generic model, which cation process within the generic model.
we call Privacy-Preserving Identity as a Service-Model for eIDs.
6.1. Registration process

6. Privacy-preserving identity as a service- The registration and issuance of an eID (secure token) in this
model for eIDs model is carried out by a trusted entity, the so-called regis-
tration authority (RA). Users need to register at the RA and
Fig. 2 illustrates the generic Identity as a Service-Model for prove their attributes to the RA to get a secure token issued.
eIDs, which can be used for secure identification and Details of this registration and proving process are out of
authentication in privacy-invasive environments such as a scope of this model as they are dependent on the underlying
public cloud. respective eID approach. However, the secure token (eID)

Fig. 2 e Privacy-Preserving Identity as a Service-Model for eIDs.


190 c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

issued to the user contains approved attributes in encrypted encrypted attributes are stored at an OpenID provider
format only. User's attributes and identity data are encrypted deployed in a public cloud and only if the user provides an
for the user using a proxy re-encryption scheme and signed by appropriate re-encryption key, the encrypted attributes can be
the registration authority using a redactable signature decrypted by a service provider. They also did a prototypical
scheme. On the one hand, this ensures that the user stays in implementation to make a quantitative evaluation of their
full control of her data because only the user is able to decrypt proposal. The evaluation provides reasonable figures in terms
her data. On the other hand, a redactable signature scheme of performance (computations can be done in the range of a
ensures authenticity and integrity of the encrypted data while few milliseconds) and economic aspects, which lets the
still being able to redact data which is not required during an approach to conclude as practical. Nunez and Agudo (Nun ~ ez
authentication process. and Agudo, 2014) amended their first OpenID-based
approach to a more general privacy-preserving cloud iden-
6.2. Identification and authentication process tity management model, which they call BlindIdM. In fact, the
BlindIdM model is protocol agnostic but they illustrate its
The identification and authentication process in this generic functionality by using SAML. Regarding performance, similar
model is also illustrated in Fig. 2. In the following, we briefly practical figures are provided in Nun ~ ez and Agudo (2014) as in
describe the individual process steps. Nunez et al. (2012), where cryptographic operations can be
computed in several milliseconds.
1. The user wants to access a protected resource or service at A similar architectural approach e but particularly
the service provider, which required proper identification focusing on eIDs e has been introduced in Slamanig et al.
and authentication for gaining access. For identification (2014). The authors propose a user-centric Identity as a
and authentication, the service provider forwards the user Service-Architecture for eIDs with selective attribute disclo-
to the identity provider. sure to be especially applicable in semi-trusted environments
2. The identity provider requests required identity and such as the public cloud. This architecture also relies on proxy
authentication data from the client-side middleware. By re-encryption and a signature variant (blank digital signatures
interacting with the client-middleware and the underlying (Hanser and Slamanig, 2013)) which allows to emulate
eID, the user redacts all the data she does not want to redactable signatures. A privacy-preserving identity man-
disclose to the service provider. Additionally, the user also agement model using proxy re-encryption in a federated ar-
generates a re-encryption key for the service provider. Re- chitecture has been introduced in Zwattendorfer et al. (2014).
encryption key generation is based on the user's private In this model, different cloud identity brokers are federated
key and the service provider's public key. enabling secure and privacy-preserving identification and
3. The redacted identity and attribute data as well as the re- authentication across multiple identity providers in the cloud.
encryption key are transferred to the identity provider. Finally, this privacy-preserving federated cloud identity bro-
4. The identity provider verifies the signature of the redacted ker model has been applied to the STORK framework (http://
identity data and re-encrypts the data for the service pro- eid-stork.eu) to illustrate its applicability also in existing in-
vider using the received re-encryption key. The re- frastructures (Zwattendorfer and Slamanig, 2013b).
encrypted data is also re-structured according to a com-
mon identity and authentication protocol such as SAML. 7.2. Anonymous credentials
5. The identity provider transfers the re-encrypted data to the
service provider. To ensure authenticity and integrity of The use of anonymous credentials for eIDs is not new. In 2009,
the transferred data, the identity provider also signs the Bichsel et al. (Bichsel et al., 2009) showed on of the first
data. implementations of an anonymous credential system (Idemix
6. The service provider verifies the received data and decrypts (Camenisch and Herreweghen, 2002)) on Java Card 2.2.1.
it. Based on the decrypted attributes received, the service Hence, due to that the realization of secure identity tokens
provider is able to either allow or deny access to the pro- relying on anonymous credentials became possible. However,
tected resource. this application of anonymous credentials is strongly tight-
ened to smart cards. Additionally, the transaction time figures
provided by Bichsel et al. (2009) are still in the range of a few
7. Related work seconds, which makes the approach more practical but still
inconvenient for users. A different architectural approach of
In following we discuss related work with respect to electronic using anonymous credentials in the German eID system was
identity covering cryptographic technologies we relied on in shown in Bjones et al. (2014). There, the anonymous credential
our approach. system U-Prove (Paquin and Zaverucha, 2013) has been inte-
grated with the German eID architecture. This integration has
7.1. Proxy Re-Encryption been further demonstrated in a typical e-Participation sce-
nario. The performance figures provided by Bjones et al. (2014)
Nunez et al. (Nunez et al., 2012) were one of the first who are faster than the ones provided by Bichsel et al. (2009),
started to integrate proxy re-encryption for enhancing privacy because Bjones et al. (2014) relied on one-show credentials (U-
in cloud-based identity services. In Nunez et al. (2012) they Prove) whereas Bichsel et al. (2009) used multi-show creden-
showed how proxy re-encryption can be successfully inte- tials (Idemix). Nevertheless, computations are still approxi-
grated into the OpenID protocol (http://openid.net). Thereby, mately 10 times slower than when using proxy re-encryption.
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 191

7.3. Homomorphic encryption define which data to disclose to the identity provider and
subsequently the service provider, respectively. Future work
To the best of our knowledge, at the current time there is no will include an implementation of the proposed approach for
related work dealing with fully homomorphic encryption and different eIDs to further illustrate its applicability.
eIDs. Somewhat related, Barni et al. (Barni et al., 2010) use well
known paritally homomorphic encryption schemes for a
privacy-compliant fingerprint recognition system. Although
Acknowledgements
not even requiring FHE, figures provided in there paper indi-
cate problems with the practicality (approximately 50s per
We would like to thank the anonymous reviewers for their
transaction).
valuable suggestions. The second author has been supported
by the European Commission through project FP7-FutureID,
grant agreement number 318424.

8. Conclusions
references
Unique identification and secure authentication are essential
processes in e-Government. In Austria, for these processes the
Austrian citizen card is the means of choice. Currently, the Abe M, Ohkubo M, Suzuki K. 1-out-of-n signatures from a variety
Austrian eID system relies on a local deployment approach, of keys. In: Advances in cryptology e ASIACRYPT ’02. Vol. 2501
where the identity provider MOA-ID is directly installed in the of LNCS. Springer; 2002. p. 415e32.
service provider's domain. While this local approach has some Akagi N, Manabe Y, Okamoto T. An efficient anonymous credential
benefits in terms of end-to-end security and scalability, a system. In: FC 2008. Vol. 5143 of LNCS. Springer; 2008. p. 272e86.
Ateniese G, Camenisch J, Joye M, Tsudik G. A practical and
centralized approach would be more advantageous to users and
provably secure coalition-resistant group signature scheme.
service providers. Users could benefit from comfortable single In: Advances in cryptology e CRYPTO ’00. Vol. 1880 of LNCS.
sign-on authentications and service providers could benefit by Springer; 2000. p. 255e70.
saving operational and maintenance costs. However, the set up Ateniese G, Fu K, Green M, Hohenberger S. Improved proxy re-
of a centralized identification and authentication service for a encryption schemes with applications to secure distributed
whole country is not trivial due to scalability reasons. To bypass storage. In: NDSS; 2005. p. 29e43.
this problem, we proposed to operate such a central service in a Baldimtsi F, Lysyanskaya A. Anonymous credentials light. In:
2013 ACM SIGSAC Conference on Computer and
public cloud, which is able to provide nearly unlimited re-
Communications Security, CCS’13. ACM; 2013. p. 1087e98.
sources. Nevertheless, although assuming the cloud service Barni M, Bianchi T, Catalano D, Di Raimondo M, Labati R, Failla P,
works trustworthy, porting the current Austrian eID system et al. A privacy-compliant fingerprint recognition system
directly to the public cloud would allow the cloud service pro- based on homomorphic encryption and fingercode templates.
vider to inspect or link sensitive citizen data. To overcome these In: Biometrics: theory applications and systems (BTAS), 2010
issues, we proposed three approaches for the cloud transfer Fourth IEEE International Conference on; 2010. p. 1e7.
Bichsel P, Camenisch J, Groß T, Shoup V. Anonymous credentials
allowing similar and equal functionality of the current eID
on a standard java card. In: ACM Conference on Computer and
system but still preserving citizen's privacy with respect to the
Communications Security, CCS 2009, CCS ’09. New York, NY,
public cloud provider at the same time. The three approaches USA: ACM; 2009. p. 600e10.
are based on different cryptographic primitives, one using Bjones R, Krontiris I, Paillier P, Rannenberg K. Integrating
proxy re-encryption and redactable signatures, one anony- anonymous credentials with eIDs for privacy-respecting online
mous credentials, and one fully homomorphic encryption. authentication. In: Preneel B, Ikonomou D, editors. Privacy
All of the proposed approaches have their benefits and technologies and policy. Vol. 8319 of Lecture Notes in Computer
Science. Heidelberg: Springer Berlin; 2014. p. 111e24.
drawbacks. However, based on the results of the evaluation in
Blaze M, Bleumer G, Strauss M. Divertible protocols and atomic
Section 5 we could conclude that approach 1 using proxy re- proxy cryptography. In: Advances in cryptology e
encryption and redactable signatures seems to be the most EUROCRYPT’98. Vol. 1403 of LNCS. Springer; 1998. p. 127e44.
promising one in terms of a practical implementation. Based Brands S. Rethinking public key infrastructures and digital
on these findings, we enhanced and refined approach 1, which certificates: building in privacy. MIT Press; 2000.
Brzuska C, Busch H, Dagdelen O, € Fischlin M, Franz M,
was actually tailored to the Austrian eID system, to a generic
model applicable for arbitrary eIDs in privacy-invasive envi- Katzenbeisser S, et al. Redactable signatures for tree-
structured data: definitions and constructions. In: Applied
ronments such as the public cloud. The generic model allows
cryptography and network security, ACNS 2010. Vol. 6123 of
the application of eID identification and authentication in a LNCS. Springer; 2010. p. 87e104.
privacy-preserving manner even if the identity provider is Camenisch J, Herreweghen EV. Design and implementation of the
deployed in a public cloud. This generic model also relies on idemix anonymous credential system. In: ACM CCS. ACM;
proxy re-encryption and redactable signatures for ensuring 2002. p. 21e30.
privacy with respect to the cloud provider. The proposed Camenisch J, Lysyanskaya A. An efficient system for non-
transferable anonymous credentials with optional anonymity
model has the following advantages. First, since the identity
revocation. In: Advances in Cryptology e EUROCRYPT 2001.
data are encrypted for the user and the user herself generates
Vol. 2045 of LNCS. Springer; 2001. p. 93e118.
the re-encryption key for the proxy re-encryption, the user Camenisch J, Lysyanskaya A. A signature scheme with efficient
always stays under maximum control of her data. Second, due protocols. In: Security and cryptography for networks. Vol.
to the use of redactable signature schemes the user is able to 2576 of LNCS. Springer; 2002. p. 268e89.
192 c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3

Camenisch J, Lysyanskaya A. Signature schemes and anonymous In: 4th IEEE International Conference on Cloud Computing
credentials from bilinear maps. In: CRYPTO. Vol. 3152 of LNCS. Technology and Science proceedings. IEEE; 2012. p. 241e8.
Springer; 2004. p. 56e72. Orthacker C, Centner M, Kittl C. Qualified Mobile server signature.
Canard S, Schoenmakers B, Stam M, Traor J. List signature In: SEC 2010. Vol. 330 of AICT. Springer; 2010. p. 103e11.
schemes. Discrete Appl Math 2006;154(2):189e201. coding and Paquin C, Zaverucha G. U-prove cryptographic specification v1.1,
Cryptography. revision 3. Tech. rep. Microsoft Corporation; 2013.
Centner M, Orthacker C, Bauer W. Minimal-footprint middleware Persiano P, Visconti I. User privacy issues regarding certificates
for the creation of qualified signatures. In: WEBIST 2010; 2009. and the TLS protocol: the design and implementation of the
p. 64e9. SPSL protocol. In: ACM Conference on Computer and
Chaum D, van Heyst E. Group signatures. In: Advances in Communications Security, CCS 2000. ACM; 2000. p. 53e62.
cryptology e EUROCRYPT ’91. Vol. 547 of Lecture Notes in Rivest RL, Shamir A, Tauman Y. How to leak a secret: theory and
Computer Science. Springer; 1991. p. 257e65. applications of ring signatures. In: ASIACRYPT 2001. Vol. 2248
Chow SSM, Weng J, Yang Y, Deng RH. Efficient unidirectional proxy of LNCS. Springer; 2001. p. 552e65.
re-encryption. In: Progress in Cryptology - AFRICACRYPT 2010. Slamanig D, Rass S. Generalizations and extensions of redactable
Vol. 6055 of LNCS. Springer; 2010. p. 316e32. signatures with applications to electronic healthcare. In:
European Union. Directive 1999/93/EC of the European Parliament Communications and multimedia security, CMS 2010. Vol.
and of the Council of 13. December 1999 on a community 6109 of LNCS. Springer; 2010. p. 201e13.
framework for electronic signatures. 1999. Slamanig D, Stingl C. Investigating anonymity in group based
Federal Chancellery. The Austrian e-Government act, Austrian anonymous authentication. In: The future of identity in the
Federal Law Gazette I 7. 2008. p. 1e11. URL, https://www.ris. information society. Vol. 298 of AICT. Springer; 2008. p. 268e81.
bka.gv.at/GeltendeFassung.wxe? Slamanig D, Stranacher K, Zwattendorfer B. User-centric identity
Abfrage¼Bundesnormen&Gesetzesnummer¼20003230. as a service-architecture for eIDs with selective attribute
Gentry C. Fully homomorphic encryption using ideal lattices. In: disclosure. In: 19th ACM Symposium on access control models
ACM STOC 2009, ACM; 2009. p. 169e78. and technologies (SACMAT 2014), ACM; 2014. p. 153e63.
Gentry C, Halevi S, Smart NP. Homomorphic evaluation of the Steinfeld R, Bull L, Zheng Y. Content extraction signatures. In:
AES circuit. In: Advances in cryptology - CRYPTO 2012; 2012. ICISC 2001. vol. 2288 of LNCS. Springer; 2001. p. 285e304.
p. 850e67. Stranacher K, Tauber A, Zefferer T, Zwattendorfer B. The Austrian
Green M, Ateniese G. Identity-based proxy re-encryption. In: identity ecosystem: an e-Government experience. In:
ACNS 2007. Vol. 4521 of LNCS. Springer; 2007. p. 288e306. Martı́nez AR, Marin-Lopez R, Pereniguez-Garcia F, editors.
Halevi S, Shoup V. Algorithms in HElib. In: Advances in cryptology Architectures and protocols for secure information technology
e CRYPTO 2014. Vol. 8616 of LNCS. Springer; 2014. p. 554e71. infrastructures. IGI Global; 2013. p. 288e309.
Halevi S, Shoup V. Bootstrapping for HElib. In: Advances in Vaikuntanathan V. Computing blindfolded: new developments in
cryptology e EUROCRYPT 2015, LNCS. Springer; 2015. p. 873. fully homomorphic encryption. In: IEEE FOCS 2011; 2011. p. 5e16.
Hanser C, Slamanig D. Blank digital signatures. In: ACM Zwattendorfer B, Slamanig D. On privacy-preserving ways to
ASIACCS’13, ACM; 2013. p. 95e106. ext.: IACR ePrint 2013/130. porting the Austrian eID system to the public cloud. In:
Hanser C, Slamanig D. Structure-preserving signatures on International Information Security Conference, SEC 2013. Vol.
equivalence classes and their application to anonymous 405 of IFIP AICT. Springer; 2013. p. 300e14.
credentials. In: ASIACRYPT. Vol. 8873 of LNCS. Springer; 2014. Zwattendorfer B, Slamanig D. Privacy-preserving realization of
p. 491e511. Full version: Cryptology ePrint Archive, Report the STORK framework in the public cloud. In: International
2014/705. Conference on Security and Cryptography (SECRYPT 2013);
Hinterwa € lder G, Zenger CT, Baldimtsi F, Lysyanskaya A, Paar C, 2013. p. 419e26.
Burleson WP. Efficient e-cash in practice: NFC-based Zwattendorfer B, Slamanig D, Stranacher K, Ho € randner F. A
payments for public transportation systems. In: Privacy federated cloud identity broker-model for enhanced privacy
enhancing technologies, PETS 2013. Vol. 7981 of LNCS. via proxy re-encryption. In: International Conference on
Springer; 2013. p. 40e59. Communications and Multimedia Security, CMS’2014; 2014.
Hollosi A, Karlinger G, Ro€ ssler T, Centner M. The Austrian citizen p. 92e103.
card. 2008. http://www.buergerkarte.at/konzept/securitylayer/
spezifikation/aktuell/. Bernd Zwattendorfer has studied Telematics and received his
Johnson R, Molnar D, Song DX, Wagner D. Homomorphic master’s degree from Graz University of Technology. Additionally,
signature schemes. In: CT-RSA ’02. Vol. 2271 of LNCS. he holds a master’s degree in International Business received
Springer; 2002. p. 244e62. from University of Graz. He has finished his PhD degree in Tele-
Lapon J, Kohlweiss M, Decker BD, Naessens V. Performance matics in 2014. In 2007 he joined the eGovernment Innovation
analysis of accumulator-based revocation mechanisms. In: Center (EGIZ) in Graz, which supports the Austrian Federal
International Information Security Conference, SEC 2010; Chancellery in further developing the Austrian ICT-Strategy by
2010. p. 289e301. research and innovation. He is currently working on several topics
Lapon J, Kohlweiss M, Decker BD, Naessens V. Analysis of related to IT security and eGovernment, focusing on electronic
revocation strategies for anonymous idemix credentials. In: identity and cloud computing. During his work he participated in
CMS 2011. Vol. 7025 of LNCS. Springer; 2011. p. 3e17. the following EU projects: FP6 project eGov-Bus (Cross-Border
Leitold H, Hollosi A, Posch R. Security architecture of the Austrian eGovernment Services), LSP project STORK (Cross-Border eID
citizen card concept. In: ACSAC 2002; 2002. p. 391e402. Federation), GINI-SA (Vision of Personal Identity Management
Libert B, Vergnaud D. Unidirectional chosen-ciphertext secure Environment).
proxy re-encryption. IEEE Trans Inf Theory 2011;57(3):1786e802.
Y. Lindell, Anonymous authentication, J Priv Confid 2(2). Daniel Slamanig is a postdoctoral researcher at IAIK, Graz Uni-
Nun~ ez D, Agudo I. BlindIdM: A privacy-preserving approach for versity of Technology (TUG). He received his PhD degree
identity management as a service. Int J Inf Secur April (Dr.techn.) in computer science from Alpen-Adria-Universita €t
2014;13(2):199e215. Klagenfurt in 2011 with distinction, where he was working in the
Nunez D, Agudo I, Lopez J. Integrating OpenID with proxy re- area of public key cryptography focusing on privacy-preserving
encryption to enhance privacy in cloud-based identity services. cryptography. From 2011 to 2012 he was a postdoctoral
c o m p u t e r s & s e c u r i t y 5 2 ( 2 0 1 5 ) 1 7 8 e1 9 3 193

researcher at the Carinthia University of Applied Sciences (CUAS) security. Currently he is particularly interested in privacy-
where he led a project on privacy-preserving cloud computing and enhancing cryptographic primitives and cryptographic protocols
taught introductory and advanced courses and seminars on for cloud computing. Daniel is a member of the International
cryptography, IT-security and computer science. His main Association for Cryptologic Research (IACR) and the Austrian
research interests include cryptography, privacy and information Computer Society (OCG).

You might also like