Fast IDentity Online with Anonymous Credentials (FIDO-AC)

AI-generated keywords: Web authentication FIDO2 protocol cryptography biometric verification data minimization

AI-generated Key Points

The license of the paper does not allow us to build upon its content and the key points are generated using the paper metadata rather than the full article.

  • Web authentication is crucial for secure online interactions
  • FIDO protocol revolutionizes authentication by eliminating the need for passwords
  • Disconnect exists between authentication process and users' attributes
  • Lack of integration methods for trusted attributes leads to arbitrary disclosure of user information
  • Challenges arise in applications requiring attribute verification due to ad-hoc solutions and lack of user control over data
  • Data breaches like the one at Singtel Optus emphasize the need for more secure and privacy-centric authentication approaches
  • FIDO-AC framework introduced by researchers combines FIDO2 with digital identities securely and privately
  • Prototype implementation of FIDO-AC system demonstrates effectiveness in enhancing security and user empowerment in online authentication processes
Also access our AI generated: Comprehensive summary, Lay summary, Blog-like article; or ask questions about this paper to our AI assistant.

Authors: Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, Lucjan Hanzlik

to be published in the 32nd USENIX Security Symposium(USENIX 2023)
License: CC BY-NC-ND 4.0

Abstract: Web authentication is a critical component of today's Internet and the digital world we interact with. The FIDO2 protocol enables users to leverage common devices to easily authenticate to online services in both mobile and desktop environments following the passwordless authentication approach based on cryptography and biometric verification. However, there is little to no connection between the authentication process and users' attributes. More specifically, the FIDO protocol does not specify methods that could be used to combine trusted attributes with the FIDO authentication process generically and allows users to disclose them to the relying party arbitrarily. In essence, applications requiring attributes verification (e.g. age or expiry date of a driver's license, etc.) still rely on ad-hoc approaches, not satisfying the data minimization principle and not allowing the user to vet the disclosed data. A primary recent example is the data breach on Singtel Optus, one of the major telecommunications providers in Australia, where very personal and sensitive data (e.g. passport numbers) were leaked. This paper introduces FIDO-AC, a novel framework that combines the FIDO2 authentication process with the user's digital and non-shareable identity. We show how to instantiate this framework using off-the-shelf FIDO tokens and any electronic identity document, e.g., the ICAO biometric passport (ePassport). We demonstrate the practicality of our approach by evaluating a prototype implementation of the FIDO-AC system.

Submitted to arXiv on 26 May. 2023

Ask questions about this paper to our AI assistant

You can also chat with multiple papers at once here.

The license of the paper does not allow us to build upon its content and the AI assistant only knows about the paper metadata rather than the full article.

AI assistant instructions?

Results of the summarizing process for the arXiv paper: 2305.16758v3

This paper's license doesn't allow us to build upon its content and the summarizing process is here made with the paper's metadata rather than the article.

In today's digital landscape, web authentication plays a crucial role in ensuring secure interactions online. The has revolutionized the authentication process by allowing users to authenticate to online services seamlessly using common devices, without the need for passwords. This approach is based on robust and , enhancing security and user experience. Despite the advancements in authentication technology, there remains a disconnect between the authentication process and users' attributes. The FIDO protocol lacks specific methods to integrate trusted attributes with the authentication process effectively, leading to arbitrary disclosure of user information to relying parties. This gap poses challenges for applications that require attribute verification, such as age or expiry date of driver's licenses, as they often resort to ad-hoc solutions that do not adhere to or empower users to control their disclosed data. Recent incidents like the data breach at Singtel Optus highlight the critical importance of addressing these shortcomings in authentication systems. The leak of sensitive personal data, including passport numbers, underscores the urgency for more secure and privacy-centric approaches to authentication. In response to these challenges, a team of researchers led by Wei-Zhu Yeoh, Michal Kepkowski, Gunnar Heide, Dali Kaafar, and Lucjan Hanzlik introduces a groundbreaking framework known as FIDO-AC. This innovative framework combines the FIDO2 authentication process with users' digital identities in a non-shareable manner. By leveraging off-the-shelf FIDO tokens and electronic identity documents like ICAO biometric passports (ePassports), FIDO-AC demonstrates how users can authenticate securely while preserving their privacy and control over their identity attributes. The practicality of this approach is validated through a prototype implementation of the FIDO-AC system, showcasing its effectiveness in enhancing both security and user empowerment in online authentication processes. This research is set to be published at the 32nd USENIX Security Symposium (USENIX 2023), marking a significant advancement in securing digital identities and redefining how we authenticate online.
Created on 06 Jun. 2024

Assess the quality of the AI-generated content by voting

Score: 0

Why do we need votes?

Votes are used to determine whether we need to re-run our summarizing tools. If the count reaches -10, our tools can be restarted.

The previous summary was created more than a year ago and can be re-run (if necessary) by clicking on the Run button below.

The license of this specific paper does not allow us to build upon its content and the summarizing tools will be run using the paper metadata rather than the full article. However, it still does a good job, and you can also try our tools on papers with more open licenses.

Similar papers summarized with our AI tools

Navigate through even more similar papers through a

tree representation

Look for similar papers (in beta version)

By clicking on the button above, our algorithm will scan all papers in our database to find the closest based on the contents of the full papers and not just on metadata. Please note that it only works for papers that we have generated summaries for and you can rerun it from time to time to get a more accurate result while our database grows.

Disclaimer: The AI-based summarization tool and virtual assistant provided on this website may not always provide accurate and complete summaries or responses. We encourage you to carefully review and evaluate the generated content to ensure its quality and relevance to your needs.