trustoverip / tswg-acdc-specification-archived

Authentic Chained Data Containers (ACDC)
Other
3 stars 4 forks source link

Using ZKP such as AnonCreds with ACDCs #73

Open SmithSamuelM opened 1 year ago

SmithSamuelM commented 1 year ago

Privacy Protection in ACDCs

The baseline specification for ACDCs includes some basic privacy protection mechanisms. These are basic in the sense that they do not require any crypto besides cryptographic strength PRNGs, Digests, and Signatures. This is meant to provide a highly adoptable lowest common denominator that all implementations can support using only universally available cryptographic libraries such as libsodium, for example. This highly adoptable baseline does not preclude however extensions to the spec for more sophisticated crypto that supports more sophisticated privacy protection mechanisms.

Existing Mechanisms

The baseline ACDC spec is heavily influenced by KERI and takes a security-first approach, specifically a strong no-compromise approach to the authenticity of all issuances and presentations of ACDCs, where authenticity is defined to mean secure attribution to a given autonomic identifier.

Exploitation Threat Model

ACDC employ a three-party exploitation threat model with regards the privacy of the parties in any exchange of data via ACDCs. This is modeled as the disclosure of data from the first party, the Discloser, to the second party, the Disclosee. There may be one or more third parties that are not party to the disclosure itself. Third parties may exploit by correlating information leaked about the disclosure and/or via the collusion with the second party.

More to come.

dhh1128 commented 1 year ago

@SmithSamuelM : this looks like great info, but it appears to be truncated, as it ends in the middle of a sentence. Is there more?

SmithSamuelM commented 1 year ago

There is more to come. I just got interrupted.