SlideShare a Scribd company logo
1 of 28
An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D-01062 Dresden Nöthnitzer Str. 46,  Room 3071  Phone: +49 351 463-38277, e-mail:  [email_address] . tu-dresden .de ,  http://dud. inf . tu-dresden .de/ Keynote presentation at OECD Workshop on Digital Identity Management Trondheim, Norway, May 8, 2007
An Introduction to Digital Identity Digital identity  of what? is set of attributes Partial Identities (pIDs)  for privacy how to use? Attributes:  Important kinds of Possible classifications Example: How to (not) use biometrics How to represent identity online? How to manage your identity online? Identity management framework needed
Digital identity of what? ,[object Object],[object Object],[object Object],[object Object]
Digital identity is ? ,[object Object],[object Object],[object Object],[object Object]
Digital identity is ... ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Partial Identities (pIDs) ,[object Object],[object Object],[object Object],[object Object]
Using pIDs requires ... ,[object Object],[object Object],[object Object],[object Object]
Important kinds of attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Possible classifications of attributes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How much protection for which attributes? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
An eternal core-identity attribute: Biometrics ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
How to represent identity online? ,[object Object],[object Object],[object Object],[object Object],[object Object]
Pseudonyms: Initial linking to holder Public pseudonym : The linking between pseudonym and its holder may be publicly known from the very beginning. Initially non-public pseudonym : The linking between pseudonym and its holder may be known by certain parties ( trustees for identity ), but is not public at least initially. Initially unlinked pseudonym : The linking between pseudonym and its holder is – at least initially – not known to anybody (except the holder). Phone number with its owner listed in public directories Bank account with bank as trustee for identity, Credit card number ... Biometric characteristics; DNA (as long as no registers)
Pseudonyms: Use in different contexts => partial order A    B stands for “B enables stronger anonymity than A” number of an identity card, social security number,  bank account pen name,  employee  identity card number customer number contract number one-time password, TAN
Trustee for values vs. Trustee for identities  ,[object Object],[object Object],[object Object],[object Object]
How to manage your identity online? ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Identity management framework needed  ,[object Object],[object Object],[object Object],[object Object]
Further reading ,[object Object],[object Object],[object Object]
Authenticated anonymous declarations between  business partners that can be de-anonymized ¬  trusted third party  A trusted third party  B identification user  X user  Y ¬  confirmation  know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation  know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for
Authenticated anonymous declarations between  business partners that can be de-anonymized ¬  trusted third party  A trusted third party  B identification user  X user  Y ¬  confirmation  know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation  know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for trustees for identities
Security for completely anonymous business partners  using active trustee who can check the goods  trustee  T p T [ 2 ] ¬  customer  X merchant  Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order merchant is „ money“ for merchant p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by  T
Security for completely anonymous business partners  using active trustee who can  not  check the goods  trustee  T p T [ 2 ] ¬  customer  X merchant  Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by  T [4.1] wait
Security for completely anonymous business partners  using active trustee who can  (not)  check the goods trustee for values  trustee  T p T [ 2 ] ¬  customer  X merchant  Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by  T ([4.1] wait)
Personal identifier 845 authorizes A: ___ A notifies 845: ___ 845 pays B  € B certifies 845: ___ C pays 845  €
Role-relationship and transaction pseudonyms 762 authorizes A: __ A notifies 762: ___ 451 pays B  € B certifies 451: ___ B certifies 314: ___ C pays 314  €
Encryption in layer models In the OSI model it holds:  Layer  n  doesn’t have to look at Data Units (DUs) of layer  n +1 to perform its service. So layer  n +1 can deliver  ( n +1)-DUs encrypted to layer  n . For packet-oriented services, the layer  n  typically furnishes the ( n +1)-DUs with a  n -header and possibly with an  n -trailer, too, and delivers this as  n -DU to layer  n -1. This can also be done encrypted again. and so on. All encryptions are independent with respect to both the encryption systems and the keys. layer  n +1 layer  n layer  n -1 ( n +1)-DU n -DU ( n -1)-DU n -header n - trailer encryption encryption
Arranging it into the OSI layers (1) link encryption link encryption user station user station exchange exchange 0 medium 1 physical 2 data link 3 network 4 transport 5 session 6 presentation 7 application OSI layers link encryption end-to-end encryption link encryption end-to-end encryption
Arranging it into the OSI layers (2) query and superpose addressing implicit query addressing channel selection ring 0 medium digital signal regeneration superpose keys and messages 1 physical anonymous access anonymous access 2 data link buffer and  re-encrypt broad-cast 3 network implicit 4 transport 5 session 6 presentation 7 application RING-network DC-network MIX-network broadcast OSI layers has to preserve anonymity against the communication partner has to preserve anonymity end-to-end encryption realizable without consideration of anonymity

More Related Content

Viewers also liked

Privacy and identity management for everyone
Privacy and identity management for everyonePrivacy and identity management for everyone
Privacy and identity management for everyoneAmir Neziri
 
Digital Marketing Platform
Digital Marketing PlatformDigital Marketing Platform
Digital Marketing PlatformAdCMO
 
Personalisation in the Open Marketing Cloud
Personalisation in the Open Marketing CloudPersonalisation in the Open Marketing Cloud
Personalisation in the Open Marketing CloudDavid Peterson
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeForgeRock
 
The Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital WorldThe Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital WorldArgyle Executive Forum
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoTPaul Fremantle
 

Viewers also liked (7)

Ganji-ID-5305
Ganji-ID-5305Ganji-ID-5305
Ganji-ID-5305
 
Privacy and identity management for everyone
Privacy and identity management for everyonePrivacy and identity management for everyone
Privacy and identity management for everyone
 
Digital Marketing Platform
Digital Marketing PlatformDigital Marketing Platform
Digital Marketing Platform
 
Personalisation in the Open Marketing Cloud
Personalisation in the Open Marketing CloudPersonalisation in the Open Marketing Cloud
Personalisation in the Open Marketing Cloud
 
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT ChallengeDigital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
Digital Trust: How Identity Tackles the Privacy, Security and IoT Challenge
 
The Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital WorldThe Rise of the Platform Marketer: Connected CRM in a Digital World
The Rise of the Platform Marketer: Connected CRM in a Digital World
 
Anonymous Individual Integration for IoT
Anonymous Individual Integration for IoTAnonymous Individual Integration for IoT
Anonymous Individual Integration for IoT
 

Similar to Trondheim20070508_OECDf

Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Market Engel SAS
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityOliver Pfaff
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy ExamLisa Olive
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxMuthuvasanSR
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx9jz8vgkshv
 
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfDemystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfProlitus Technologies
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221David Wood
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...IDES Editor
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...TransUnion
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company BrochureDictao
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspectiveFuture Agenda
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementMartijn Oostdijk
 
Digital Trust and the Identity of things
Digital Trust and the Identity of thingsDigital Trust and the Identity of things
Digital Trust and the Identity of thingsThomas Mueller
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Mohsin Ali
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6 WE-IT TUTORIALS
 

Similar to Trondheim20070508_OECDf (20)

Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
Digital signatures, paving the way to a digital Europe_Arthur D Little_2014
 
Trust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-SecurityTrust in E- and M-Business - Advances Through IT-Security
Trust in E- and M-Business - Advances Through IT-Security
 
Cryptograpy Exam
Cryptograpy ExamCryptograpy Exam
Cryptograpy Exam
 
Digital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptxDigital Signatdsbuisduifhudosffdosfure.pptx
Digital Signatdsbuisduifhudosffdosfure.pptx
 
Digital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptxDigital Signature in Indian Evidence act .pptx
Digital Signature in Indian Evidence act .pptx
 
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdfDemystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
Demystifying Zero-Knowledge Proofs A Primer for Business Leaders.pdf
 
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
apidays LIVE Paris 2021 - Identification & Authentication for Individuals wit...
 
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
Returning to Online Privacy - W3C/ANU Future of the Web Roadshow 20190221
 
Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...Generation of Anonymous Signature and Message using Identity Based Group Blin...
Generation of Anonymous Signature and Message using Identity Based Group Blin...
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
Feeding the Beast-How Fraud Tools Bring Context into Authentication (Gartner ...
 
Dictao Company Brochure
Dictao Company BrochureDictao Company Brochure
Dictao Company Brochure
 
The future of digital identity initial perspective
The future of digital identity   initial perspectiveThe future of digital identity   initial perspective
The future of digital identity initial perspective
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User ExperienceForgeRock and Trusona - Simplifying the Multi-factor User Experience
ForgeRock and Trusona - Simplifying the Multi-factor User Experience
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
Re-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity ManagementRe-using existing PKIs for online Identity Management
Re-using existing PKIs for online Identity Management
 
Digital Trust and the Identity of things
Digital Trust and the Identity of thingsDigital Trust and the Identity of things
Digital Trust and the Identity of things
 
Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar Digital signature by mohsin iftikhar
Digital signature by mohsin iftikhar
 
Network security unit 4,5,6
Network security unit 4,5,6 Network security unit 4,5,6
Network security unit 4,5,6
 

Recently uploaded

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...Zilliz
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Angeliki Cooney
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024The Digital Insurer
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Victor Rentea
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 

Recently uploaded (20)

DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 

Trondheim20070508_OECDf

  • 1. An Introduction to Digital Identity Andreas Pfitzmann Dresden University of Technology, Department of Computer Science, D-01062 Dresden Nöthnitzer Str. 46, Room 3071 Phone: +49 351 463-38277, e-mail: [email_address] . tu-dresden .de , http://dud. inf . tu-dresden .de/ Keynote presentation at OECD Workshop on Digital Identity Management Trondheim, Norway, May 8, 2007
  • 2. An Introduction to Digital Identity Digital identity of what? is set of attributes Partial Identities (pIDs) for privacy how to use? Attributes: Important kinds of Possible classifications Example: How to (not) use biometrics How to represent identity online? How to manage your identity online? Identity management framework needed
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13. Pseudonyms: Initial linking to holder Public pseudonym : The linking between pseudonym and its holder may be publicly known from the very beginning. Initially non-public pseudonym : The linking between pseudonym and its holder may be known by certain parties ( trustees for identity ), but is not public at least initially. Initially unlinked pseudonym : The linking between pseudonym and its holder is – at least initially – not known to anybody (except the holder). Phone number with its owner listed in public directories Bank account with bank as trustee for identity, Credit card number ... Biometric characteristics; DNA (as long as no registers)
  • 14. Pseudonyms: Use in different contexts => partial order A    B stands for “B enables stronger anonymity than A” number of an identity card, social security number, bank account pen name, employee identity card number customer number contract number one-time password, TAN
  • 15.
  • 16.
  • 17.
  • 18.
  • 19. Authenticated anonymous declarations between business partners that can be de-anonymized ¬  trusted third party A trusted third party B identification user X user Y ¬  confirmation know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for
  • 20. Authenticated anonymous declarations between business partners that can be de-anonymized ¬  trusted third party A trusted third party B identification user X user Y ¬  confirmation know document p A p G ( X , g )   p G ( X , g ) identification p G ‘ ( Y , g ) confirmation know document p G ‘ ( Y , g ) p G ‘ ( Y , g ) p G ( X , g ) p B for for trustees for identities
  • 21. Security for completely anonymous business partners using active trustee who can check the goods  trustee T p T [ 2 ] ¬  customer X merchant Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order merchant is „ money“ for merchant p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by T
  • 22. Security for completely anonymous business partners using active trustee who can not check the goods  trustee T p T [ 2 ] ¬  customer X merchant Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by T [4.1] wait
  • 23. Security for completely anonymous business partners using active trustee who can (not) check the goods trustee for values  trustee T p T [ 2 ] ¬  customer X merchant Y ¬  [ 5 ] [ 3 ] p L ( Y , g ) [ 4 ] [ 1 ] p T p T delivery to trustee delivery to customer order delivery is „ money“ for distributor p L ( Y , g ) + money p K ( X , g ) order of the customer (money is deposited) checked by T ([4.1] wait)
  • 24. Personal identifier 845 authorizes A: ___ A notifies 845: ___ 845 pays B € B certifies 845: ___ C pays 845 €
  • 25. Role-relationship and transaction pseudonyms 762 authorizes A: __ A notifies 762: ___ 451 pays B € B certifies 451: ___ B certifies 314: ___ C pays 314 €
  • 26. Encryption in layer models In the OSI model it holds: Layer n doesn’t have to look at Data Units (DUs) of layer n +1 to perform its service. So layer n +1 can deliver ( n +1)-DUs encrypted to layer n . For packet-oriented services, the layer n typically furnishes the ( n +1)-DUs with a n -header and possibly with an n -trailer, too, and delivers this as n -DU to layer n -1. This can also be done encrypted again. and so on. All encryptions are independent with respect to both the encryption systems and the keys. layer n +1 layer n layer n -1 ( n +1)-DU n -DU ( n -1)-DU n -header n - trailer encryption encryption
  • 27. Arranging it into the OSI layers (1) link encryption link encryption user station user station exchange exchange 0 medium 1 physical 2 data link 3 network 4 transport 5 session 6 presentation 7 application OSI layers link encryption end-to-end encryption link encryption end-to-end encryption
  • 28. Arranging it into the OSI layers (2) query and superpose addressing implicit query addressing channel selection ring 0 medium digital signal regeneration superpose keys and messages 1 physical anonymous access anonymous access 2 data link buffer and re-encrypt broad-cast 3 network implicit 4 transport 5 session 6 presentation 7 application RING-network DC-network MIX-network broadcast OSI layers has to preserve anonymity against the communication partner has to preserve anonymity end-to-end encryption realizable without consideration of anonymity