2020
DOI: 10.3390/s20030945
|View full text |Cite
|
Sign up to set email alerts
|

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services

Abstract: Privacy enhancing technologies (PETs) allow to achieve user’s transactions unlinkability across different online Service Providers. However, current PETs fail to guarantee unlinkability against the Identity Provider (IdP), which becomes a single point of failure in terms of privacy and security, and therefore, might impersonate its users. To address this issue, OLYMPUS EU project establishes an interoperable framework of technologies for a distributed privacy-preserving identity management based on cryptograph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
1
1

Relationship

1
6

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 34 publications
0
4
0
Order By: Relevance
“…Authentication focuses on controlling device access to applications and network domains, ensuring that only authorized users can access paper-sensitive data [124]. The security system must verify the parties identity and verify they are who they claim to be [125]. These security rules are the basis for generating security information in M2M communication.…”
Section: ) Authenticationmentioning
confidence: 99%
“…Authentication focuses on controlling device access to applications and network domains, ensuring that only authorized users can access paper-sensitive data [124]. The security system must verify the parties identity and verify they are who they claim to be [125]. These security rules are the basis for generating security information in M2M communication.…”
Section: ) Authenticationmentioning
confidence: 99%
“…The ecosystem of the OLYMPUS identity management system (overview in Figure 4, more details in [32]) involves three main participants: the virtual Identity Provider (vIdP), the user client and the relying party (RP).…”
Section: Olympus Architecture and Rolesmentioning
confidence: 99%
“…The most widely known solutions are Microsoft's UProve [6,25] and IBM's Identity Mixer [7,9,10]. However, a large body of related work has been carried out over the last decades, including formal frameworks for ABCs [8], schemes allowing users to anonymously delegate parts of their rights to other users [2,3,11,14], issuer-hiding credential schemes allowing user to remain anonymous across multiple issuers [4], ABC systems with distributed issuers [18,32], ABCs bound to hardware tokens [1], cloud-based ABCs [21,23], or distance-bounding schemes [5].…”
Section: Introductionmentioning
confidence: 99%
“…Due to the complexity and importance of their function, IdMs are typically backed by government or official institutions. In Moreno et al [2019], Moreno et al present an IdMs based on PASTA that provides unlinkability through distributed identity providers and biometric identifica-tion. In Bernabé et al [2020], Bernabe et al evaluate ARIES, an European IdMs that also includes ID-proofing based on biometrics and breeder documents handling within their framework.…”
Section: State Of the Artmentioning
confidence: 99%