Projects per year
Abstract
Assurance in digital authentication means represents a fundamental requirement in the authentication process of digital identities. Different level-of-assurance (LoA) describe the trustworthiness of the authentication specified
by various standards. Some traditional governmental identity systems achieve a high LoA. Nevertheless, the recent self-sovereign identity (SSI) model, which utilizes identity wallets to ensure that the identity data
control remains with the related user, still lacks a high LoA, detaining the full potential of SSI such as using it for sensitive use-cases like for eGovernment or public administration services. This work tackles this problem
by starting with assessing related LoA standards. Based on this assessment are requirements defined to achieve
an LoA high. These requirements are utilized in the process of defining and evaluating our proposed concept.
Our generic serves as the foundation for other developers, aiming to elevate the LoA in their SSI systems.
The implementation of a proof-of-concept showcases the feasibility and practicability of our concept. In the
evaluation, we identify measures provided by our concept, used to meet the defined requirements, and discuss
the design decisions.
by various standards. Some traditional governmental identity systems achieve a high LoA. Nevertheless, the recent self-sovereign identity (SSI) model, which utilizes identity wallets to ensure that the identity data
control remains with the related user, still lacks a high LoA, detaining the full potential of SSI such as using it for sensitive use-cases like for eGovernment or public administration services. This work tackles this problem
by starting with assessing related LoA standards. Based on this assessment are requirements defined to achieve
an LoA high. These requirements are utilized in the process of defining and evaluating our proposed concept.
Our generic serves as the foundation for other developers, aiming to elevate the LoA in their SSI systems.
The implementation of a proof-of-concept showcases the feasibility and practicability of our concept. In the
evaluation, we identify measures provided by our concept, used to meet the defined requirements, and discuss
the design decisions.
Original language | English |
---|---|
Title of host publication | Proceedings of the 8th International Conference on Security and Cryptography (SECRYPT 2021) |
Publisher | SciTePress |
Pages | 137-148 |
Volume | 1: SECRYPT |
ISBN (Electronic) | 978-989-758-524-1 |
DOIs | |
Publication status | Published - 2021 |
Event | 18th International Conference on Security and Cryptography: SECRYPT 2021 - Online, Virtuell, Italy Duration: 6 Jul 2021 → 8 Jul 2021 Conference number: 18 http://www.secrypt.org |
Conference
Conference | 18th International Conference on Security and Cryptography |
---|---|
Country/Territory | Italy |
City | Virtuell |
Period | 6/07/21 → 8/07/21 |
Internet address |
Fingerprint
Dive into the research topics of 'SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance'. Together they form a unique fingerprint.Projects
- 1 Finished
-
EU - KRAKEN - Brokerage and market platform for personal data
1/12/19 → 30/11/22
Project: Research project