Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Highly dynamic information should have short expiry times #18

Closed
msporny opened this issue Nov 28, 2016 · 6 comments
Closed

Highly dynamic information should have short expiry times #18

msporny opened this issue Nov 28, 2016 · 6 comments
Labels
privacy-tracker Group bringing to attention of Privacy, or tracked by the Privacy Group but not needing response. security-tracker Group bringing to attention of security, or tracked by the security Group but not needing response.

Comments

@msporny
Copy link
Member

msporny commented Nov 28, 2016

The specification should note that validity time periods should be shorter for highly dynamic information. We should also mention that shorter expiry periods may result in less privacy due to frequency of issuance/use.

@msporny msporny added editorial Purely editorial changes to the specification. privacy-tracker Group bringing to attention of Privacy, or tracked by the Privacy Group but not needing response. security-tracker Group bringing to attention of security, or tracked by the security Group but not needing response. labels Nov 28, 2016
@msporny msporny removed the editorial Purely editorial changes to the specification. label Dec 7, 2016
@David-Chadwick
Copy link
Contributor

On the contrary, short lived non-revocable claims can be more privacy preserving than long lived revocable ones, since the inspector does not have to contact the issuer to retrieve revocation information.

@msporny
Copy link
Member Author

msporny commented Feb 13, 2017

On the contrary, short lived non-revocable claims can be more privacy preserving than long lived revocable ones

The frequency of use is related to #14, so it's still an issue.

does not have to contact the issuer to retrieve revocation information

Doesn't this assume centralized revocation lists? This isn't an issue for decentralized/TTP revocation lists, right?

@David-Chadwick
Copy link
Contributor

Correct, providing the user community is large enough. It each issuer only has a couple of users, and the dozen issuers issue very different types of credential, then it would still be possible to infer which user contacted which inspector.

@agropper
Copy link

Expiry times need to be considered in context and based on privacy engineering principles. Here's a sequence that illustrates the design and use of a highly dynamic claim:

  1. Issuer public key is posted securely (DNS-CERT, DID)
  2. Dynamic claim example is a prescription
  3. Claim expires in minutes or has revocation method (anyone can spend coin)
  4. Subject ID may be single-origin (DID)
  5. Issuer verifies subject identity and stores it locally for records retention purposes
  6. IFF surveillance is required, issuer reports index property (License #) to auditor
  7. IFF verified ID is required, a subject index property is included (License #)
  8. Subject presents dynamic claim to inspector (pharmacy)
  9. IFF verified ID is required, inspector verifies identity and index property (License #)
  10. Inspector checks claim expiry and revocation method
  11. IFF surveillance is required, inspector reports index property (License #) to auditor
  12. Inspector delivers prescription to subject.

The sequence above illustrates the privacy engineering considerations around verifiable claims. Privacy is enhanced when:

  • the issuer uses a convenient and secure signature verification method
  • the issuer is willing to provide a claim on-demand (via an API)
  • the subject can specify the expiration time (within limits set by law or inspector))
  • the subject can conveniently provide any DID
  • the issuer is willing to take responsibility for subject identity verification so the inspector doesn’t need to do that
  • the claim uses a globally unique index property rather than probabilistic matching
  • the issuer supports a privacy-preserving revocation method
  • the inspector offers to not store subject identity even if they verify it
  • if surveillance is required, it is done transparently to the subject so they can see errors

@msporny
Copy link
Member Author

msporny commented Mar 18, 2017

@agropper This is useful, but we need to focus on item number 3 in your list, along with bullet item 2 and 3 in the list that is bulleted.

In short, we need 2-3 paragraphs only talking about highly dynamic claims and when it's a good idea to use them. We may not want to explain a full use case, as you've done above. Can you take what you've written above and write something that is more of the form here: #6 (comment)

@agropper
Copy link

Highly dynamic information is subject to either short expiry or revocation lists. To avoid traffic analysis that would reveal to the issuer when or how a claim is being used, the issuer’s API could allow the subject to request the expiry time, within whatever parameters the issuer supports. Alternatively, the issuer could support a revocation mechanism that does not leak information when the revocation list is checked by an inspector.

For example, if an insurance company or employer benefits manager system offers an API for a prescription rebate coupon to a subject, the subject may not want that issuer to know which pharmacy dispensed the prescription and at what time. The coupon revocation list would be maintained by the prescriber who could also aggregate rebate payments to avoid analysis of coupon use by the issuer.

In another example, the subject might not want the prescriber to know if a rebate coupon was used at the pharmacy as inspector. In that case, the prescription claim issued by the prescriber would be presented together with a separate rebate claim issued by the benefits manager. The rebate claim would have a short expiry time and the decision to use a rebate or not would be entirely with the subject who might prefer to pay cash to avoid leakage of insurance information to the prescriber.

@msporny msporny modified the milestone: VCM2: Issuer, Expiration, and Revocation Checks Aug 9, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
privacy-tracker Group bringing to attention of Privacy, or tracked by the Privacy Group but not needing response. security-tracker Group bringing to attention of security, or tracked by the security Group but not needing response.
Projects
None yet
Development

No branches or pull requests

3 participants