Improving Unlinkability of Attribute-based Authentication through Game Theory

Author:

Zolotavkin Yevhen1,Jeong Jongkil Jay1,Kuchta Veronika2ORCID,Slavnenko Maksym1ORCID,Doss Robin1ORCID

Affiliation:

1. Deakin University, Geelong, Australia

2. The University of Queensland, St Lucia, Australia

Abstract

This article first formalizes the problem of unlinkable attribute-based authentication in the system where each user possesses multiple assertions and uses them interchangeably. Currently, there are no recommendations for optimal usage of assertions in such authentication systems. To mitigate this issue, we use conditional entropy to measure the uncertainty for a Relying Party who attempts to link observed assertions with user labels. Conditional entropy is the function of usage statistics for all assertions in the system. Personal decisions made by the users about the usage of assertions contribute to these statistics. This collective effect from all the users impacts the unlinkability of authentication and must be studied using game theory. We specify several instances of the game where context information that is provided to the users differs. Through game theory and based on conditional entropy, we demonstrate how each user optimizes usage for the personal set of assertions. In the experiment, we substantiate the advantage of the proposed rational decision-making approaches: Unlinkability that we obtain under Nash equilibrium is higher than in the system where users authenticate using their assertions at random. We finally propose an algorithm that calculates equilibrium and assists users with the selection of assertions. This manifests that described techniques can be executed in realistic settings. This does not require modification of existing authentication protocols and can be implemented in platform-independent identity agents. As a use case, we describe how our technique can be used in Digital Credential Wallets: We suggest that unlinkability of authentication can be improved for Verifiable Credentials.

Funder

Australian Government’s Cooperative Research Centres Program

Publisher

Association for Computing Machinery (ACM)

Subject

Safety, Risk, Reliability and Quality,General Computer Science

Reference75 articles.

1. IRMA: Practical, decentralized and privacy-friendly identity management using smartphones;Alpár Gergely;Proceedings of the Hot Topics in Privacy Enhancing Technologies (HotPETs’17),2017

2. Sebastian Angel and Srinath Setty. 2016. Unobservable communication over fully untrusted infrastructure. In Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI’16). USENIX Association, 551–569. https://www.usenix.org/conference/osdi16/technical-sessions/presentation/angel.

3. A. Beduschi J. Cinnamon J. Langford C. Luo and D. Owen. 2017. Building digital identities: The challenges risks and opportunities of collecting behavioural attributes for new digital identity systems. 40 pages.

4. ATEMA: An attribute enablement module for attribute retrieval and transfer through the eIDAS Network

5. Trust, Reciprocity, and Social History

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3