creator-assertions / identity-assertion

Creator Assertions Working Group :: Identity Assertion
https://creator-assertions.github.io/identity/
Other
3 stars 5 forks source link

Discussion of Zero Knowledge Identity Management #84

Open scouten-adobe opened 3 months ago

scouten-adobe commented 3 months ago

Follow up on Slack discussion by @walkerlj0:

I wonder if tornodo cash’s mixer could be used for identity for document signing: https://medium.com/coinmonks/tornado-cash-explained-204e262853fc

Discuss in 1 April 2024 meeting.

walkerlj0 commented 3 months ago

@scouten-adobe could we change the name of this issue to Discussion of Zero Knowledge Identity Management?

walkerlj0 commented 3 months ago

ZKP can be used to validate identity (by having holder of identity sign with a private key) without revealing any information about that identity (name, location, biometric info, even key) for a credential holder.

What are the reasons for anonymous Identity for Holders of credential?

Considerations Who Issues identity? (who manages IAM or KYC?) Can we make these ^ decentralized/ as Anonymous Identifiers (AIDs)? What ZK Proofs have been used for this before? Have ZK Proofs been vetted for security or vulnerability? (e.g. a small amount of info is revealed, and opens a door for inference of other data through an attack) Where are these proofs run/ done (on a TEE/ ZKVM like Risc0)

scouten-adobe commented 3 months ago

@talltree @walkerlj0 and Patrick Boehler to reach out to AnonCreds / Hyperledger group

christianpaquin commented 2 months ago

Just catching up on the CAWG April 1st meeting recording; a couple of comments on the ZKP discussion that derived from @walkerlj0's previous comment.

Firstly, we should lead with privacy scenarios, and then decide on appropriate technical solutions (considering things like maturity and deployability). ZK has become a catch-all term encompassing many technologies, but there exists a spectrum of privacy-protecting techniques providing various benefits. You might be interested in this blog post that covers many of them.

Secondly, I've been a long supporter of anoncreds (and its predecessor incarnations) but I wouldn't recommend taking a dependency on its specification. The same cryptographic building blocks providing selective disclosure and unlinkability (e.g., BBS signatures) will be available in more industry-friendly specifications, such as Verifiable Credentials. That, IMO, would be the way to provide such privacy protections.

Lastly but not least, the current C2PA architecture is highly incompatible with unlinkable identities. Even if we support privacy-protecting CAWG identity assertions, the X.509 based claim signature will unescapably produce trackable unique identifiers. There are some suboptimal strategies to go around that, but a proper technical solution for this scenario would require changes to the core C2PA spec.

FYI @talltree, @scouten-adobe