ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf

上传人:eastlab115 文档编号:804532 上传时间:2019-02-04 格式:PDF 页数:32 大小:1.70MB
下载 相关 举报
ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf_第1页
第1页 / 共32页
ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf_第2页
第2页 / 共32页
ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf_第3页
第3页 / 共32页
ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf_第4页
第4页 / 共32页
ITU-T X 1155-2015 Guidelines on local linkable anonymous authentication for electronic services (Study Group 17)《电子服务在本地链接匿名认证指南(研究组17)》.pdf_第5页
第5页 / 共32页
点击查看更多>>
资源描述

1、 I n t e r n a t i o n a l T e l e c o m m u n i c a t i o n U n i o n ITU-T X.1155 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (10/2015) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY Secure applications and services Security protocols Guidelines on local linkable anonymous au

2、thentication for electronic services Recommendation ITU-T X.1155 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS X.1X.199 OPEN SYSTEMS INTERCONNECTION X.200X.299 INTERWORKING BETWEEN NETWORKS X.300X.399 MESSAGE HANDLING SYSTEMS X.400X.499 DI

3、RECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS X.600X.699 OSI MANAGEMENT X.700X.799 SECURITY X.800X.849 OSI APPLICATIONS X.850X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY General security aspects X.1000X.1029 Network security X.1030X.1049 Security management X.

4、1050X.1069 Telebiometrics X.1080X.1099 SECURE APPLICATIONS AND SERVICES Multicast security X.1100X.1109 Home network security X.1110X.1119 Mobile security X.1120X.1139 Web security X.1140X.1149 Security protocols X.1150X.1159 Peer-to-peer security X.1160X.1169 Networked ID security X.1170X.1179 IPTV

5、 security X.1180X.1199 CYBERSPACE SECURITY Cybersecurity X.1200X.1229 Countering spam X.1230X.1249 Identity management X.1250X.1279 SECURE APPLICATIONS AND SERVICES Emergency communications X.1300X.1309 Ubiquitous sensor network security X.1310X.1339 PKI related Recommendations X.1340X.1349 CYBERSEC

6、URITY INFORMATION EXCHANGE Overview of cybersecurity X.1500X.1519 Vulnerability/state exchange X.1520X.1539 Event/incident/heuristics exchange X.1540X.1549 Exchange of policies X.1550X.1559 Heuristics and information request X.1560X.1569 Identification and discovery X.1570X.1579 Assured exchange X.1

7、580X.1589 CLOUD COMPUTING SECURITY Overview of cloud computing security X.1600X.1601 Cloud computing security design X.1602X.1639 Cloud computing security best practices and guidelines X.1640X.1659 Cloud computing security implementation X.1660X.1679 Other cloud computing security X.1680X.1699 For f

8、urther details, please refer to the list of ITU-T Recommendations. Rec. ITU-T X.1155 (10/2015) i Recommendation ITU-T X.1155 Guidelines on local linkable anonymous authentication for electronic services Summary In electronic services or e-services, there are various occasions where privacy violation

9、s are of concern. Service providers may gather users personal information in the processes of subscription, purchase or delivery. They may be able to access and exploit users personal data that is collected during the service processes. The consequences these threats pose to user privacy, such as pe

10、rsonal data leakage and tracking, are very serious emerging social issues. Therefore, technological solutions for preserving privacy in e-services are necessary. Anonymous authentication that allows users to be able to authenticate themselves without revealing their identity is the most fundamental

11、means of addressing the privacy threats associated with e-services. Recommendation ITU-T X.1155 provides guidelines on local linkable anonymous authentication for e-services. This includes the privacy threats of e-services, the requirements of local linkable anonymous authentication, the functions t

12、hat satisfy these requirements and a general model of local linkable anonymous authentication for e-services. History Edition Recommendation Approval Study Group Unique ID* 1.0 ITU-T X.1155 2015-10-29 17 11.1002/1000/12599 * To access the Recommendation, type the URL http:/handle.itu.int/ in the add

13、ress field of your web browser, followed by the Recommendations unique ID. For example, http:/handle.itu.int/11.1002/1000/11830-en. ii Rec. ITU-T X.1155 (10/2015) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, inf

14、ormation and communication technologies (ICTs). The ITU Telecommunication Standardization Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a w

15、orldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down i

16、n WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts purview, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication adm

17、inistration and a recognized operating agency. Compliance with this Recommendation is voluntary. However, the Recommendation may contain certain mandatory provisions (to ensure, e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory pr

18、ovisions are met. The words “shall“ or some other obligatory language such as “must“ and the negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTSITU draws attention

19、 to the possibility that the practice or implementation of this Recommendation may involve the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others out

20、side of the Recommendation development process. As of the date of approval of this Recommendation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the l

21、atest information and are therefore strongly urged to consult the TSB patent database at http:/www.itu.int/ITU-T/ipr/. ITU 2016 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.1155 (10/2015) iii Ta

22、ble of Contents Page 1 Scope . 1 2 References . 1 3 Definitions 1 3.1 Terms defined elsewhere 1 3.2 Terms defined in this Recommendation . 2 4 Abbreviations and acronyms 3 5 Conventions 3 6 Overview . 4 6.1 Privacy threats in e-services . 5 6.2 Complete anonymity and its side effects 5 6.3 Anonymous

23、 authentication . 6 7 Issues in anonymous authentication . 7 7.1 Traceability issues 7 7.2 Linkability issues 7 7.3 Local linkability issues of anonymous authentication mechanisms . 11 7.4 Anonymous authentication mechanisms and their properties 11 8 Requirements of anonymous authentication for subs

24、cription-based e-services . 12 8.1 Requirements for secure authentication . 12 8.2 Requirements for anonymity in subscription-based services . 13 8.3 Relationship between the requirements and privacy-related issues . 14 9 Framework of local linkable anonymous authentication for e-services . 15 9.1 E

25、ntities 15 9.2 Processes among the entities 16 9.3 Local linkable anonymous authentication mechanisms . 18 Appendix I Use cases 19 I.1 E-commerce use case . 19 I.2 E-voting use case 20 Bibliography. 23 Rec. ITU-T X.1155 (10/2015) 1 Recommendation ITU-T X.1155 Guidelines on local linkable anonymous a

26、uthentication for electronic services 1 Scope This Recommendation provides guidelines on local linkable anonymous authentication for electronic services. This Recommendation includes the following items: privacy threats of electronic services; requirements for local linkable anonymous authentication

27、; functions that satisfy the requirements; models of local linkable anonymous authentication for electronic services. 2 References None. 3 Definitions 3.1 Terms defined elsewhere This Recommendation uses the following terms defined elsewhere: 3.1.1 anonymity b-ITU-T X.1252: A situation where an enti

28、ty cannot be identified within a set of entities. 3.1.2 (entity) authentication b-ITU-T X.1252: A process used to achieve sufficient confidence in the binding between the entity and the presented identity. 3.1.3 claimant b-ITU-T X.1252: An entity that is or represents a principal for the purposes of

29、 authentication. 3.1.4 identifier b-ITU-T X.1252: One or more attributes used to identify an entity within a context. 3.1.5 key b-ISO/IEC 9798-1: Sequence of symbols that controls the operation of a cryptographic transformation. 3.1.6 linking base b-ISO/IEC 20008-1: Public data element, optionally s

30、pecific to a group signature linker, which is involved in the group signature process if using this date element to link multiple signatures created by the same signer is required. 3.1.7 personally identifiable information (PII) b-ITU-T X.1252: Any information (a) that identifies or can be used to i

31、dentify, contact, or locate the person to whom such information pertains, (b) from which identification or contact information of an individual person can be derived, or (c) that is or can be linked to a natural person directly or indirectly. 3.1.8 privacy b-ITU-T X.1252: The right of individuals to

32、 control or influence what personal information related to them may be collected, managed, retained, accessed, and used or distributed. 3.1.9 pseudonym b-ITU-T X.1252: An identifier whose binding to an entity is not known or is known to only a limited extent, within the context in which it is used.

33、3.1.10 revocation b-ITU-T X.1252: The annulment by someone having the authority, of something previously done. 3.1.11 verification b-ITU-T X.1252: The process or instance of establishing the authenticity of something. 2 Rec. ITU-T X.1155 (10/2015) 3.1.12 verifier b-ITU-T X.1252: An entity that verif

34、ies and validates identity information. 3.2 Terms defined in this Recommendation This Recommendation defines the following terms: 3.2.1 anonymous authentication: An authentication in which the personally identifiable information of a claimant is not known to the verifier. NOTE In cryptographic terms

35、, the level or strength of anonymity should be computed by a theoretical mechanism and an anonymous authentication should satisfy a certain level or strength of anonymity. However, this concern is not considered in this Recommendation. 3.2.2 anonymous claimant (or anonymous user): An entity (or serv

36、ice user) who uses anonymous authentication for preserving privacy. 3.2.3 anonymous identifier: An identifier which is not related to and is not used to infer the personally identifiable information of a claimant. Pseudonym is one example of anonymous identifier and is seen by a verifier, while rand

37、om value is used in anonymous authentication based on group signature. This random value should be treated securely as a cryptographic key and is not given to a verifier through the authentication process. 3.2.4 authentication token: A message consisting of data fields which contain information that

38、 is used to generate an authentication transaction for (entity) authentication. In (entity) authentication, an authentication token consists of an identifier and its corresponding key or secret credential such as password. Likewise, an authentication token used in anonymous authentication consists o

39、f an anonymous identifier and its corresponding key or secret credential. 3.2.5 authentication transaction: A message set exchanged in a particular communication for anonymous authentication between a claimant and a verifier. 3.2.6 complete anonymity: A situation where an entity is never identified

40、nor authenticated both in the present and in the future. 3.2.7 conditional traceability: A property where an entity can be traced with a specific condition. 3.2.8 controllable linkability: A property where linking is possible by an entity that possesses a special linking key. 3.2.9 full linkability:

41、 A property of anonymous authentication in which linking is always possible by any verifier. 3.2.10 issuer: An authorized entity that issues an (anonymous) authentication token to a claimant, confirming that the personally identifiable information of the claimant is presented and verified. 3.2.11 li

42、nkability: A property where linking is possible in anonymous authentication. 3.2.12 linking: Process used to determine whether two or more anonymous authentication transactions were performed by the same claimant, even if it is impossible to identify the specific claimant of these transactions. 3.2.

43、13 local linkability: A property where linking is possible only for multiple anonymous authentication transactions presented to the same verifier. 3.2.14 non-anonymous authentication: An authentication which is not anonymous authentication. In this authentication process, personally identifiable inf

44、ormation of a claimant is known to the verifier. 3.2.15 opener: An authorized entity that has a capability to find out an anonymous identifier from an anonymous authentication transaction using a special key called an opening key. Rec. ITU-T X.1155 (10/2015) 3 3.2.16 opening: Process by an authorize

45、d entity called an opener to find out an anonymous identifier from an anonymous authentication transaction. 3.2.17 signer-centric linkability: A property where linking multiple anonymous authentication transactions depends on the information that the signer owns or generates. 3.2.18 traceability: A

46、property where it is possible to find out the personally identifiable information of a claimant in anonymous authentication. 3.2.19 traceable anonymous service: The service in which it is sometimes necessary to trace the anonymous user. 3.2.20 tracer: An authorized entity that has a capability to fi

47、nd out the personally identifiable information from an anonymous identifier. 3.2.21 tracing: Process by an authorized entity called a tracer to find out the personally identifiable information of the claimant from an anonymous identifier. 3.2.22 tracking: Process to collect the previous authenticati

48、on transactions or other data of a claimant in order to infer the claimants privacy-related information. 3.2.23 unlinkability: A property where linking is always impossible by a verifier in anonymous authentication. 3.2.24 untraceability: A property where tracing is always impossible in anonymous au

49、thentication. 3.2.25 untraceable anonymous service: A service in which it is impossible to trace the anonymous user. 3.2.26 verifier-centric linkability: A property where linking multiple anonymous authentication transactions depends on the information that the verifier owns or generates. 4 Abbreviations and acronyms This Recommendation uses the following abbreviations and acronyms: AI Anonymity Issuer BI Blind Issuer CA Certification Authority CL-GS Group Signature with Controllable Linkabili

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1