On 2022-07-28 9:30, Torsten Lodderstedt wrote:


Am 28.07.2022 um 08:57 schrieb Neil Madden <[email protected] 
<mailto:[email protected]>>:

{
“iss”: “gov.uk <http://gov.uk/>”,
“over_18”: true
}

If this is signed using a deterministic signature algorithm (eg EdDSA) then the 
token will be identical for everyone that is over 18 and so naturally 
unlinkable.

Such a credential needs to be bound to the legit holder, which is typically 
achieved by adding a public key (reference) to it (which is missing in your 
example). The holder must then create a presentation signed with the 
corresponding private key to proof possession and with that legitimate 
holdership. That key results in likability.

Indeed.

A challenge-response solution may be a more logical way dealing with this kind 
of application.

That is,
- the RP create a challenge and sends it to the Holder
- the Holder authenticates to Issuer and includes the challenge
- the Issuer returns an assertion including the challenge
- the Holder shows the assertion to the RP

Some 10Y+ back MSFT launched the UPROV system.  I know very little about it but 
it would be interesting to know the pros and cons of that compared to JWP.

Cheers,
Anders









_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

_______________________________________________
jose mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/jose

Reply via email to