Development of Enhanced Cloud File Sharing Security with eID Token-Based Trust Mechanisms
Keywords:
Electronic identities, privacy, mobile eID, requirementsAbstract
Numerous systems provide users an electronic identification (eID) for document signing or online service authentication (e.g., governmental eIDs, OpenID). Current solutions, however, fail to provide adequate methods for using them as conventional ID cards that digitally verify their holders to another individual in the actual realm. We foresee a comprehensive mobile eID that offers this capability while safeguarding privacy, meets the stringent security standards for governmental identities (such as driver's licenses and passports), and is applicable in the private sector (e.g., as loyalty cards). This study delineates possible applications for a flexible and privacy-preserving mobile eID and examines the notion of privacy-preserving attribute searches. Additionally, we delineate essential functional, mobility, security, and privacy needs, and provide a concise review of alternative methodologies to address each of them.
Downloads
References
J. Bringer, H. Chabanne, R. Lescuyer, and A. Patey. Efficient and Strongly Secure Dynamic Domain-Specific Pseudonymous Signatures for ID Documents. In Financial Cryptography and Data Security, pages 255–272. Springer, 2014.
J. Bringer, H. Chabanne, R. Lescuyer, and A. Patey. Hierarchical Identities from Group Signatures and Pseudonymous Signatures. In The New Codebreakers, pages 457–469. Springer, 2016.
BSI. Kryptographische Verfahren: Empfehlungen und Schlu¨ssella¨ngen. Technical Report TR-02102-1 v2016-1, Feb. 2016.
J. Camenisch and M. Stadler. Efficient group signature schemes for large groups. In Advances in Cryptology, CRYPTO ’97, pages 410–424. Springer, Aug. 1997.
D. Chaum and E. Van Heyst. Group signatures. In Advances in Cryptology, EUROCRYPT ’91, pages 257–265. Springer, 1991.
M. H¨olzl, E. Asnake, R. Mayrhofer, and M. Roland. A Password-authenticated Secure Channel for App to Java Card Applet Communication. International Journal of Pervasive Computing and Communications (IJPCC), 11:374–397, Oct. 2015.
V. Kumar, H. Li, J.-M. J. Park, K. Bian, and Y. Yang. Group Signatures with Probabilistic Revocation: A Computationally-Scalable Approach for Providing Privacy-Preserving Authentication. In Proc. CCS 2015, pages 1334–1345. ACM, 2015.
A. Lehmann et al. Survey and Analysis of Existing eID and Credential Systems. FutureID Deliverable D32.1, Apr. 2013.
W. Lueks, G. Alpa´r, J.-H. Hoepman, and P. Vullers. Fast revocation of attribute-based credentials for both users and verifiers. In ICT Systems Security and Privacy Protection, pages 463–478. Springer, 2015.
H. K. Maji, M. Prabhakaran, and M. Rosulek. Attribute-Based Signatures. In Topics in Cryptology, CT-RSA 2011, pages 376–392. Springer, Feb. 2011.
T. Nakanishi and N. Funabiki. Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps. In Advances in Cryptology, ASIACRYPT 2005, pages 533–548.
Springer, Dec. 2005.
T. Nyman, J.-E. Ekberg, and N. Asokan. Citizen electronic identities using TPM 2.0. In Proceedings of the 4th International Workshop on Trustworthy Embedded Devices, pages 37–48. ACM, 2014.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 International Journal of Scientific Research in Science, Engineering and Technology

This work is licensed under a Creative Commons Attribution 4.0 International License.