6 SUMMARY AND FUTURE
WORK
In this paper we have presented ZKlaims, a design for
non-interactive privacy-preserving credentials based
on a non-interactive zero-knowledge protocol. We
have shown how zkSNARKs can be leveraged for de-
centralized identity provider services. We conducted
performance evaluations of ZKlaims to show that is
can be used in practice and where integrators must ac-
commodate for additional resources. Finally, we have
integrated our ZKlaims implementation into the de-
centralized identity provider reclaimID. This means
improved privacy for reclaimID users if they choose
to share ZKlaims proofs as attributes while at the
same time providing relying parties with strong as-
sertions by trusted third parties.
As a next step, we plan to address shortcomings
with current authorization protocols such as OpenID
Connect with respect to complex credentials such as
ZKlaims. OpenID Connect does not specify how re-
lying parties can request special credential types such
as certificates, ZKlaims or other third party asserted
attributes. This is due to the fact that the protocol
was not originally designed to be implemented on
top of decentralized infrastructures. However, in the
wake of self-sovereign identity systems (Kraft, 2017;
Schanzenbach et al., 2018; Sovrin, 2018), this is a
challenge in need of further research and develop-
ment.
In future work we also plan to investigate how
ZKlaims can be used in the Internet of Things. Specif-
ically, we plan on investigating how device can dis-
close metadata such as firmware versions to request-
ing parties in a minimal way. This could allow ser-
vices to query large fleets of devices for vulnerable
firmware versions without having all devices explic-
itly disclose the exact versions they run on.
ACKNOWLEDGMENTS
This work was partially funded by the Fraunhofer
Cluster Cognitive Internet Technologies.
REFERENCES
Ben-Sasson, E., Chiesa, A., Genkin, D., Tromer, E., and
Virza, M. (2013). Snarks for c: Verifying program
executions succinctly and in zero knowledge. In Ad-
vances in Cryptology–CRYPTO 2013, pages 90–108.
Springer.
Camenisch, J. and Van Herreweghen, E. (2002). Design and
implementation of the idemix anonymous credential
system. In Proceedings of the 9th ACM conference on
Computer and communications security, pages 21–30.
ACM.
Confessore, N. (2018). Cambridge analytica and facebook:
The scandal and the fallout so far, the new york times.
Friebe, S., Sobik, I., and Zitterbart, M. (2018). Decentid:
Decentralized and privacy-preserving identity storage
system using smart contracts. In 2018 17th IEEE In-
ternational Conference On Trust, Security And Pri-
vacy In Computing And Communications (TrustCom),
pages 37–42.
Groth, J. (2016). On the size of pairing-based non-
interactive arguments. In Annual International Con-
ference on the Theory and Applications of Crypto-
graphic Techniques, pages 305–326. Springer.
Isaakidis, M., Halpin, H., and Danezis, G. (2016). Unlim-
itid: Privacy-preserving federated identity manage-
ment using algebraic macs. In Proceedings of the 2016
ACM on Workshop on Privacy in the Electronic Soci-
ety, pages 139–142. ACM.
Kraft, D. (2017). Nameid. https://nameid.org/.
Paquin, C. (2011). U-prove technology overview v1. 1. Mi-
crosoft Corporation Draft Revision, 1.
Parno, B., Howell, J., Gentry, C., and Raykova, M. (2013).
Pinocchio: Nearly practical verifiable computation. In
Security and Privacy (SP), 2013 IEEE Symposium on,
pages 238–252. IEEE.
Sakimura, N., Bradley, J., Jones, M., de Medeiros, B., and
Mortimore, C. (2014). Openid connect core 1.0 incor-
porating errata set 1. http://openid.net/specs/openid-
connect-core-1
0.html.
Schanzenbach, M. and Banse, C. (2016). Managing and
presenting user attributes over a decentralized secure
name system. In Data Privacy Management and Se-
curity Assurance - 11th International Workshop, DPM
2016, September 26-27, 2016, Proceedings, pages
213–220.
Schanzenbach, M., Bramm, G., and Sch
¨
utte, J. (2018). re-
claimid: Secure, self-sovereign identities using name
systems and attribute-based encryption. In Proceed-
ings of the International Conference on Trust, Secu-
rity and Privacy in Computing and Communications
(TrustCom).
Sovrin (2018). A protocol and token for self-sovereign
identity and decentralized trust. https://sovrin.org/wp-
content/uploads/2018/03/Sovrin-Protocol-and-Token-
White-Paper.pdf, 2019/02/02.
Wachs, M., Schanzenbach, M., and Grothoff, C. (2014a). A
censorship-resistant, privacy-enhancing and fully de-
centralized name system. In Cryptology and Network
Security, pages 127–142. Springer.
Wachs, M., Schanzenbach, M., and Grothoff, C. (2014b).
On the feasibility of a censorship resistant decentral-
ized name system. In Foundations and Practice of
Security, pages 19–30. Springer.
SECRYPT 2019 - 16th International Conference on Security and Cryptography
332