Scalable Secure Identity Establishment - PowerPoint PPT Presentation

1 / 12
About This Presentation
Title:

Scalable Secure Identity Establishment

Description:

Am I really talking to Bank of America? Is it secure? ... PKI certifies that Bob has public key PKBob. PKI also says 'trust Bob. ... – PowerPoint PPT presentation

Number of Views:38
Avg rating:3.0/5.0
Slides: 13
Provided by: csBer
Category:

less

Transcript and Presenter's Notes

Title: Scalable Secure Identity Establishment


1
Scalable Secure Identity Establishment
  • Abraham Bachrach, Karl Chen, Rodrigo Fonseca,
    Dilip Joseph, Jeremy Rahe, Ananth Rao
  • CS294-8 Fall 2005
  • Final presentation _at_ 2005-12-07

2
Introduction
Am I really talking to Bank of America? Is it
secure?
Is it really Bob who wants to withdraw 1 million?
Dont PKIs already solve the problem?
3
Problems with PKIs
  • Too many of them, Not widely trusted
  • Entangle authentication authorization
  • PKI certifies that Bob has public key PKBob
  • PKI also says trust Bob.
  • Does not allow pseudonymity
  • Verisign has screwed up

4
Our Proposal
  • Factor out the identity layer
  • Maps flat id ? public key
  • Identifiers
  • 256-bit integer
  • Opaque, semantic-free, tussle-free
  • First-come, first-serve
  • Pseudonymous

5
Architecture
  • Identity Registrar (like Robot CA)
  • Central authority to sign
  • flat id ? public key certificates.
  • Trusted to execute algorithm (FCFS)
  • Publishing System
  • Content Distribution Network DHT, etc.
  • Not trusted

6
How Many Namespaces?
  • Alternatives
  • Single namespace, single organization
  • Single namespace, multiple organizations
  • Multiple namespaces
  • Thus multiple namespaces
  • Each country runs its own registrar
  • Ids prefixed with a country code
  • Users can register with any I.R.

7
Publishing System (e.g., OpenDHT)
Use internal database to lookup Bobs flat id.
8
Scalability
  • Identity Registrar needs to push keys into the
    Publishing System
  • Need to maintain freshness of keys
  • Huge bandwidth required
  • Delegate freshness to a Certificate Validator

9
Publishing System (e.g., OpenDHT)
10
Scalability
  • Certificate Validator refreshes Validity
    Certificate every N hours
  • Trusted only by owner of identifier
  • Identity Registrar uninvolved
  • Can charge for premium service
  • Many will exist

11
Applications
  • Map from human-readable names to flat identifier
  • Traditional trust-establishment mechanisms
  • PKI
  • PGP-style distributed web of trust
  • Chat
  • Life, the Universe, and Everything

12
Discussion
  • Flat ids provide pseudonymity
  • Tussle spaces
  • DNS, Google, Comcast, Verisign, ICANN, national
    governments
  • Users free to trust whoever they want
Write a Comment
User Comments (0)
About PowerShow.com