Re: [jose] An attempt at unlinkable tokens with minimal magic

Tobias Looker <tobias.looker@mattr.global> Fri, 29 July 2022 15:55 UTC

Return-Path: <tobias.looker@mattr.global>
X-Original-To: jose@ietfa.amsl.com
Delivered-To: jose@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BA5AFC14F75F for <jose@ietfa.amsl.com>; Fri, 29 Jul 2022 08:55:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.496
X-Spam-Level:
X-Spam-Status: No, score=0.496 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_REMOTE_IMAGE=0.01, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URI_GOOGLE_PROXY=2.596] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mattr.global
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id MNMqthpor2m1 for <jose@ietfa.amsl.com>; Fri, 29 Jul 2022 08:55:01 -0700 (PDT)
Received: from AUS01-SY4-obe.outbound.protection.outlook.com (mail-sy4aus01on2115.outbound.protection.outlook.com [40.107.107.115]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 02765C14F745 for <jose@ietf.org>; Fri, 29 Jul 2022 08:55:00 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=BQZvx2QKSNd2Blp5nR+qTlRaQ+1c2SVaQYlC84nJV5+Vk1ElRX3OaWvX9HlAtg6otI6+V12wrWNaTx1CKotS1MUedGsjwltGEGw/1S7hHBSEkjEQQpGq+Z4JDHOvbEa0iCT13KouHteNiVb9SkhJmqdktqr3WQHqDwchRyE/OJBurdwQfAz4JeOuPZK7LlPzaXC+I3wpDxO8Ob0ouUmhmkS5ORFym2mVsZmOztcYhNRTVgh6GTwbkjz4Ga/iYw5vGpCoOGa1PJpwZZ7B+LgFegiAPunG6bGTNM6SnRY9JIHFGmuLHsZsiq3Qcyj1LO8uBfOWzfQAzwusBd/Wg8z2Kg==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=03qz8b9PTL6wimiVr2aha70IeOyvdp6RJxIIVBinmU0=; b=bbgX+sLjG4Fs/1PFuSqPuy4VFxuJX8nX1qYAPyR4dkyPDs/LDDJLWa42TKrWZXkkT62rEPHKagn68ZlzL6f9g+Nn92bpNePvt/rlO4k7je8g1ctLmT0A5bdmPcqLfzwSvBXPBcx/E0wi0hj5mbOSdBGaKxWn+Y6Zj58AyjLYVS3DetnTMTIf276Yl2RK7VzVlDurfNdGqX503H3aXYf+0TW4UepYctttKAy8wT2MZUkeT97woIlXtxXoDEllShp9skCBxsJcu+fV7CgPwpT8iTcy0K2DsAxeCvh9TyHLxIWPhdTewgOkOHEGG02FjL0lbIEKCblomYtgbVPWl2Yn1g==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=mattr.global; dmarc=pass action=none header.from=mattr.global; dkim=pass header.d=mattr.global; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mattr.global; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=03qz8b9PTL6wimiVr2aha70IeOyvdp6RJxIIVBinmU0=; b=IBdLV6nOf3mpPArEW/TET16gK7w8oxzAhf829PAMbHrk0mG3+sm9TSDlzn+Hd3U4H4F3Ycv0tHL/l5yLs3I/cC4bHOPMlOPMT16eHlHZ6zRr4BuqHMefcrqTqXOHDsW5SIQlN5Z7Q0D8fJLrxOF/+wkDoFEHIYAsEikeq++4WCA=
Received: from SY4P282MB1274.AUSP282.PROD.OUTLOOK.COM (2603:10c6:10:b2::12) by ME3P282MB2890.AUSP282.PROD.OUTLOOK.COM (2603:10c6:220:13b::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5482.11; Fri, 29 Jul 2022 15:54:55 +0000
Received: from SY4P282MB1274.AUSP282.PROD.OUTLOOK.COM ([fe80::a5cb:2888:63f9:e20a]) by SY4P282MB1274.AUSP282.PROD.OUTLOOK.COM ([fe80::a5cb:2888:63f9:e20a%7]) with mapi id 15.20.5482.012; Fri, 29 Jul 2022 15:54:55 +0000
From: Tobias Looker <tobias.looker@mattr.global>
To: Neil Madden <neil.madden@forgerock.com>, Vasileios Kalos <vasilis.kalos=40mattr.global@dmarc.ietf.org>
CC: "jose@ietf.org" <jose@ietf.org>
Thread-Topic: [jose] An attempt at unlinkable tokens with minimal magic
Thread-Index: AQHYotyHaqvJYmIf+EOYHOHd9+kEmq2U8SmAgABwBZA=
Date: Fri, 29 Jul 2022 15:54:55 +0000
Message-ID: <SY4P282MB127450B6BF7B80E46431BB589D999@SY4P282MB1274.AUSP282.PROD.OUTLOOK.COM>
References: <ME4P282MB0984F3582C4BD1707B86C8068E969@ME4P282MB0984.AUSP282.PROD.OUTLOOK.COM> <3D04F1F0-ACA2-402D-94B5-BB227126CFAE@forgerock.com>
In-Reply-To: <3D04F1F0-ACA2-402D-94B5-BB227126CFAE@forgerock.com>
Accept-Language: en-GB, en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=mattr.global;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 36678197-052f-4885-d7e0-08da717aae86
x-ms-traffictypediagnostic: ME3P282MB2890:EE_
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SY4P282MB1274.AUSP282.PROD.OUTLOOK.COM; PTR:; CAT:NONE; SFS:(13230016)(366004)(396003)(346002)(136003)(39840400004)(376002)(66946007)(64756008)(8676002)(4326008)(66556008)(66446008)(76116006)(66476007)(91956017)(33656002)(86362001)(38070700005)(316002)(110136005)(166002)(38100700002)(19627405001)(122000001)(9686003)(26005)(53546011)(83380400001)(478600001)(71200400001)(7696005)(41300700001)(6506007)(966005)(55016003)(2906002)(186003)(5660300002)(8936002)(44832011)(52536014); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_SY4P282MB127450B6BF7B80E46431BB589D999SY4P282MB1274AUSP_"
MIME-Version: 1.0
X-OriginatorOrg: mattr.global
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SY4P282MB1274.AUSP282.PROD.OUTLOOK.COM
X-MS-Exchange-CrossTenant-Network-Message-Id: 36678197-052f-4885-d7e0-08da717aae86
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Jul 2022 15:54:55.4212 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: c2c9cf73-6aae-4702-9844-02adab723771
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: ePm0bKJ6F7uFAhM0hQmMaOop522xpaSPNtxxUl9zYsCM/4Z8ci2tz/5Pp2Bww+ZWrUhyCDE+178xt9GBzrJUufMzrdw1ic7EkfRQd8vNH0g=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: ME3P282MB2890
Archived-At: <https://mailarchive.ietf.org/arch/msg/jose/28YGEXIC-JqBwIdaUvHhfXvVlQ8>
Subject: Re: [jose] An attempt at unlinkable tokens with minimal magic
X-BeenThere: jose@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Javascript Object Signing and Encryption <jose.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/jose>, <mailto:jose-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/jose/>
List-Post: <mailto:jose@ietf.org>
List-Help: <mailto:jose-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/jose>, <mailto:jose-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 29 Jul 2022 15:55:05 -0000

In general its impossible for cryptography alone to negate all risk at the application layer. Cryptographic schemes that support unlinkability primarily serve to remove what is a strong possible source of correlation.

I think we are also perhaps talking about a narrower application of JWP then where it could actually be applied to (e.g just focusing on attribute based credentials or VC's).
For example a cryptographic scheme supporting unlinkability represented in JWP has possible applications within protocols like privacy pass [1]. A use-case such as this I think goes to your point too Neil which is that purpose-built protocols can help to manage the application-level risk that cryptography alone cannot solution for. To be clear though I don't think that means that the JWP work shouldn't be done because it lacks an accompanying protocol, because there is multiple that could use it.

[1] https://privacypass.github.io/


Thanks,

[Mattr website]<https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fscanmail.trustwave.com%2F%3Fc%3D15517%26d%3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1WeN4boYw%26u%3Dhttps%253a%252f%252fmattr.global%252f&data=04%7C01%7CSteve.Lowes%40mbie.govt.nz%7C5a65fe33c70b41fd8ba908d976f3a2f1%7C78b2bd11e42b47eab0112e04c3af5ec1%7C0%7C0%7C637671611076709977%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=tKqCMzLUQNCeORd908YqfqZoT7tCy%2FMVwXdjpch1sDY%3D&reserved=0>



Tobias Looker

MATTR
CTO

+64 (0) 27 378 0461
tobias.looker@mattr.global<mailto:tobias.looker@mattr.global>

[Mattr website]<https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fscanmail.trustwave.com%2F%3Fc%3D15517%26d%3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1WeN4boYw%26u%3Dhttps%253a%252f%252fmattr.global%252f&data=04%7C01%7CSteve.Lowes%40mbie.govt.nz%7C5a65fe33c70b41fd8ba908d976f3a2f1%7C78b2bd11e42b47eab0112e04c3af5ec1%7C0%7C0%7C637671611076709977%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=tKqCMzLUQNCeORd908YqfqZoT7tCy%2FMVwXdjpch1sDY%3D&reserved=0>

[Mattr on LinkedIn]<https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fscanmail.trustwave.com%2F%3Fc%3D15517%26d%3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1SbN9fvNg%26u%3Dhttps%253a%252f%252fwww.linkedin.com%252fcompany%252fmattrglobal&data=04%7C01%7CSteve.Lowes%40mbie.govt.nz%7C5a65fe33c70b41fd8ba908d976f3a2f1%7C78b2bd11e42b47eab0112e04c3af5ec1%7C0%7C0%7C637671611076719975%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=t%2BidOI32oaKuTJf1AkcG%2B%2FirIJwbrgzXVZnjOAC52Hs%3D&reserved=0>

[Mattr on Twitter]<https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fscanmail.trustwave.com%2F%3Fc%3D15517%26d%3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiW1WdMte6ZA%26u%3Dhttps%253a%252f%252ftwitter.com%252fmattrglobal&data=04%7C01%7CSteve.Lowes%40mbie.govt.nz%7C5a65fe33c70b41fd8ba908d976f3a2f1%7C78b2bd11e42b47eab0112e04c3af5ec1%7C0%7C0%7C637671611076729970%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=BD9WWyXEjVGlbpbCja93yW%2FzLJZpe%2Ff8lGooe8V6i7w%3D&reserved=0>

[Mattr on Github]<https://aus01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fscanmail.trustwave.com%2F%3Fc%3D15517%26d%3Dw46s4eMXULV_ns1ZfAKYLbVKcqey_PHiWwGdMoDtMw%26u%3Dhttps%253a%252f%252fgithub.com%252fmattrglobal&data=04%7C01%7CSteve.Lowes%40mbie.govt.nz%7C5a65fe33c70b41fd8ba908d976f3a2f1%7C78b2bd11e42b47eab0112e04c3af5ec1%7C0%7C0%7C637671611076729970%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C1000&sdata=4AhRuXZCnU5i3hcngo4H3UiNayYUtXpRcImV4slS1mw%3D&reserved=0>

This communication, including any attachments, is confidential. If you are not the intended recipient, you should not read it - please contact me immediately, destroy it, and do not copy or use any part of this communication or disclose anything about it. Thank you. Please note that this communication does not designate an information system for the purposes of the Electronic Transactions Act 2002.

________________________________
From: jose <jose-bounces@ietf.org> on behalf of Neil Madden <neil.madden@forgerock.com>
Sent: 29 July 2022 19:18
To: Vasileios Kalos <vasilis.kalos=40mattr.global@dmarc.ietf.org>
Cc: jose@ietf.org <jose@ietf.org>
Subject: Re: [jose] An attempt at unlinkable tokens with minimal magic

EXTERNAL EMAIL: This email originated outside of our organisation. Do not click links or open attachments unless you recognise the sender and know the content is safe.



On 29 Jul 2022, at 01:44, Vasileios Kalos <vasilis.kalos=40mattr.global@dmarc.ietf.org> wrote:

Hey all,

What JWP allows that I find very useful is the following: the Verifier will learn nothing more than what the user reveals, even if they (the Verifier) cooperate with the Issuer (or anyone else).

Isn’t this somewhat overstating the likely privacy benefits? If the prover reveals _any_ PII to the verifier then the verifier can collaborate with the issuer to discover everything about that user. And we know from many studies on deanonymisation that it is very easy to accidentally reveal enough information to be identifiable. ZK proofs are nice and everything but they only ensure zero *additional* knowledge is gained by the verifier. In practice what is explicitly revealed is often enough.

IMO if you want to have any hope of actually achieving the privacy you want then you really need to design the entire protocol, including specifying exactly what information is to be revealed. I think designing a generic “privacy preserving” message container is likely to give people unrealistic expectations.

— Neil