Changes in the Client Middleware. For using
anonymous credentials the complete functionality
of the client middleware needs to be changed.
On the one hand, the client middleware needs
to deal with anonymous credentials stored on
an underlying token and, on the other hand,
needs to implement the ABC4Trust protocol for
communication.
Trust in MOA-ID. Applying the proposed architec-
ture, MOA-ID requires no full trust. MOA-ID
never sees any personal citizen data in plain. The
only data MOA-ID sees is the citizen’s credential
but not its included attributes. Hence, MOA-ID
can be easily deployed in a public cloud. How-
ever, our assumption is based on the honest but
curious cloud attacker model, which means that
the cloud provider works correctly but may want
to inspect processed data.
6 CONCLUSIONS
Anonymous credentials are a valuable technology to
protect citizen’s privacy. One of the main features is
unlinkability, avoiding user tracking during multiple
different identification and authentication processes.
In addition, anonymous credentials allow the disclo-
sure of only a subset of a complete identity still in an
authentic fashion. Moreover, even derived attributes
can be used for authentication (e.g. age instead of
date of birth). This makes anonymous credentials also
interesting in the eID context.
In this paper we proposed an architecture show-
ing how anonymous credentials can be integrated into
the Austrian eID system. Thereby, anonymous cre-
dentials can be used for identification and authentica-
tion at service providers, still following the existing
privacy concept based on sector-specific identifiers.
Moreover, the proposed architecture even allows a
deployment of MOA-ID in a public cloud, enabling
higher scalability end elasticity features. In addition,
concrete technologies were identified for a possible
upcoming implementation. The implementation can
be considered as future work.
An implementation of the proposed architecture
can clearly show its practicability. The main bottle-
neck for that might be the client middleware, which
needs to run complex and power intensive compu-
tations for credential proof generation. A detailed
analysis of an implementation would deliver deeper
insight if citizens loose usability in terms of perfor-
mance when using anonymous credentials. Neverthe-
less, for the near future anonymous credentials are a
valuable and promising means for ensuring data pro-
tection and privacy when applied in an eID context.
REFERENCES
Alford, T. (2009). The Economics of cloud computing.
Booz Allen Hamilton.
Arora, S. (2008). National e-ID card schemes: A Euro-
pean overview. Information Security Technical Re-
port, 13(2):46–53.
Brands, S. A. (2000). Rethinking Public Key Infrastructures
and Digital Certificates - Building in Privacy. PhD
thesis, MIT.
Camenisch, J., Krontiris, I., Lehmann, A., Neven, G.,
Paquin, C., and Rannenberg, K. (2012). H2.1-
ABC4Trust Architecture for Developers.
Camenisch, J., Krontiris, I., Lehmann, A., Neven, G.,
Paquin, C., Rannenberg, K., and Zwingelberg, H.
(2011). D2.1 Architecture for Attribute-based Creden-
tial Technologies Version 1.
Camenisch, J. and Lysyanskaya, A. (2001). An efficient
system for non-transferable anonymous credentials
with optional anonymity revocation. In Pfitzmann, B.,
editor, EUROCRYPT, pages 93–118.
Cantor, S., Kemp, J., Philpott, R., and Maler, E. (2009).
Assertions and Protocols for the OASIS Security As-
sertion Markup Language (SAML) V2 .0.
European Parliament and Council (1999). DIRECTIVE
1999/93/EC on a Community framework for elec-
tronic signatures.
Federal Chancellery (2008). The Austrian E-Government
Act. Austrian Federal Law Gazette I, 7:1–11.
Hollosi, A., Karlinger, G., R
¨
ossler, T., and Centner, M.
(2014). Die
¨
osterreichische B
¨
urgerkarte.
ISO/IEC JTC 1 (2011). ISO/IEC 24760-1:2011 - A frame-
work for identity management - Part 1: Terminology
and concepts.
Lapon, J., Kohlweiss, M., Decker, B. D., and Naessens, V.
(2011). Analysis of Revocation Strategies for Anony-
mous Idemix Credentials. In CMS, pages 3–17.
Leitold, H., Hollosi, A., and Posch, R. (2002). Security
architecture of the Austrian citizen card concept. In
ACSAC, pages 391–400.
Lenz, T., Zwattendorfer, B., Stranacher, K., and Tauber,
A. (2014). Identit
¨
atsmanagement in
¨
Osterreich mit
MOA-ID 2.0. eGovernment Review, 13:20–21.
Nu
˜
nez, D. and Agudo, I. (2014). BlindIdM: A privacy-
preserving approach for identity management as a ser-
vice. International Journal of Information Security,
pages 1–17.
Paquin, C. (2013). U-Prove Cryptographic Specification
V1.1.
Pearson, S. and Benameur, A. (2010). Privacy, Security and
Trust Issues Arising from Cloud Computing. In IEEE
CloudCom, pages 693–702.
RFC 6960 (2012). X.509 Internet Public Key Infrastructure
Online Certificate Status Protocol - OCSP.
W3C (2007). SOAP Version 1.2 Part 1: Messaging Frame-
work (Second Edition).
UsingAnonymousCredentialsforeIDAuthenticationinthePublicCloud
163