480 likes | 650 Views
2. Some comments from last time:. Properties of Identity SystemNarrow identifiers to pin point a specific subject (e.g. no collision) Audit and non-repudiationSecurity (crypto etc) privacyAccess control
E N D
1. Identity Theft
Abhilasha Bhargav-Spantzel
bhargav@cerias.purdue.edu
2. 2 Some comments from last time: Properties of Identity System
Narrow identifiers to pin point a specific subject (e.g. no collision)
Audit and non-repudiation
Security (crypto etc) + privacy
Access control
Seems like there may be a contradiction b/w the property of consistent context plus the idea of central identity management. Passport was trying to make identity consistent.
3. 3 Outline Motivation of Identity Theft Problem
Crypto Background
Zero Knowledge Proofs
Distributed Hash Tables
Our Recent Work (will be presented in ACM CCS Digital Identity Management workshop)
Other Related Work
Liberty Alliance Identity Theft workgroup (if there is time)
4. 4 Identity Theft