3G/ Revocation: Introduction & Overview - goal is to connect

From IIW

Revocation: Introduction and Overview - Goal Is To Connect

Tuesday 3G

Convener: Andreas Freitag

Notes-taker(s): Chat and edit from Andreas Freitag

Tags for the session - technology discussed/ideas considered:

  1. revocation #privacy #standards

Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps

Link to presentation:

https://drive.google.com/file/d/1HBr2VinzbJxq8dOs4b398tOUbRXmhraE/view?usp=sharing

ZOOM CHAT ( Edited and discussion sorted to headlines):

QUESTIONS addressing cryptographic accumulators with delta files

20:37:49 From Rouven Heck1 to Everyone : Ever holder needs to update the Witness file, even if their stuff is not updated, correct?

20:38:24 From Micha Kraus to Everyone : Yes, on each accumulator update

20:39:04 From Paul DIetrich to Everyone : Is that pushed to all credential holders or do they just go get it when they need to present next time?

20:40:52 From Christian Bormann to Everyone : afaik normally it's not pushed, wallets get it when they need to present a proof of non-revocation (could also be done with certain intervals)

Andreas F.: You can implement in different ways.

20:41:36 From Dominic Wörner to Everyone : In Indy, updates/deltas are on the ledger. Depends on the wallet implementation when they fetch the updates

20:48:36 From Jeremie Miller to Everyone : Short expiration is exactly how OAuth/OIDC work w/ access token (and refresh tokens to update them), I don't believe scalability is really an issue with this approach given its adoption.

20:48:51 From Michael Lodder to Everyone : but privacy is

20:48:56 From Paul DIetrich to Everyone : thanks. Which of these methods does CredentialStatusXXXX use?

20:49:43 From Brian Richter to Everyone : List based I believe Paul

20:52:22 From Rouven Heck1 to Everyone : I’m wondering what credentials have practical use-cases if they are not tight to an individual / entity

20:52:37 From Kristina Yasuda1 to Everyone : like coupons?

20:53:06 From Rouven Heck1 to Everyone : ok, in this use-cases - what are the privacy concerns?

20:53:36 From Stephen Curran to Everyone : Proving age?

20:54:28 From Rouven Heck1 to Everyone : Proving age in which use-case? Entering a bar - needs your photo. Ordering something online - requires your address, etc.

20:54:49 From Rouven Heck1 to Everyone : if it’s just an age proof without anyting - wouldn’t this be something whcih can be shared easily?

One ring to rule them all, one ring to don't find them?

Andreas: I wish for a privacy preserving, scalable solution and the SSI community should agree on one (but not unlimited number) revocation method

20:56:00 From Rouven Heck1 to Everyone : @Andreas - why is your wishlist including that it’s only one revocation list? Don’t you think that it would be useful to use different methods depending on use-cases?

Andreas: Multiple methods would cause a lot of implementing effort for an agent which want to be interoperable. A second challenge is to keep privacy level high.
With a limited and agreed implementations privacy-by-design can be ensured.

20:59:15 From Paul DIetrich to Everyone : As far as I can tell the SSI community hasn’t select one method for anything yet. I hope this changes the game.

20:59:51 From Kristina Yasuda1 to Everyone : ^ so true

21:00:32 From Rouven Heck1 to Everyone : I would argue it’s not a desirable outcome

21:00:38 From Rouven Heck1 to Everyone : (at least not yet)

21:05:31 From Jeremie Miller to Everyone : +1 privacy by design!

21:05:32 From Karim Stekelenburg to Everyone : +9000!

21:06:19 From Michael Lodder to Everyone : +++

21:07:52 From Paul DIetrich to Everyone : How many credential revocations standards exist today?

Andreas: It is realized with lists/hidden list. The only implementation with cryptographic accumulators I know is the indy implementation.

21:19:19 From Rouven Heck1 to Everyone : @Andreas - what are we doing if the new approach with the Silverbullet will not work? :)

21:30:32 From Andreas Freitag to Everyone : @Rouven search a new one

“Standards”

21:09:25 From Paul DIetrich to Everyone : these are drafts right now? or have they been standardized.

Andreas: Yes, no standards at the moment.

21:10:36 From Kristina Yasuda1 to Everyone : no real standardization for 1 and 3, for 2, this is the one: https://w3c-ccg.github.io/vc-status-rl-2020/

21:11:03 From Kristina Yasuda1 to Everyone : I meant no real standardization *needed* for 1 and 3

21:11:59 From Paul DIetrich to Everyone : I get that for 3, but for #1 there has to be some kind of API?

21:12:29 From Michael Lodder to Everyone : how many ways are there to check for revocation with x509 certificates

Driving licence use case

21:02:26 From Michael Shea to Everyone : how many driver’s licenses are there in Austria?

Andreas: we have about 4Mio in Austria. For our testing we decide to have a setup with 10Mio items.

21:02:40 From Michael Lodder to Everyone : we started with w

21:02:49 From Michael Lodder to Everyone : revoke 600/day, add 1K/day

Almost every use-case / customer needs revocation

21:06:39 From Kristina Yasuda1 to Everyone : maybe you realize you gave an entrance pass to a criminal and want to revoke it within an hour...

Miscellaneous

21:08:49 From Kristina Yasuda1 to Everyone : one is Issuer call-home - you put that endpoint in the credential; Credential revocation list 2021 in W3C CCG; and no revocation needed

21:10:06 From Michael Shea to Everyone : IoT is very broad, if the IoT is a Medical device the requirements are very different

21:11:55 From Karim Stekelenburg to Everyone : Will BBS+ revocation lower the performance issues for JSON-LD once it’s there?

PRIVACY & Revocation by API

21:12:36 From Kristina Yasuda1 to Everyone : Issuer offers an API, and you put a link to that API inside the credential which verifier hits?

21:13:06 From Paul DIetrich to Everyone : But what do I get when I call it? Does 200 mean its OK?

21:13:07 From Michael Lodder to Everyone : @Kristina then you get correlation and disclosure

21:13:21 From Michael Lodder to Everyone : you get tracked by the issuer and every verifier

21:13:30 From Michael Lodder to Everyone : you don’t want the protocol to betray you

Andreas: It has disadvantages in privacy

21:13:34 From Michael Shea to Everyone : +1 Andreas

21:13:39 From Jeremie Miller to Everyone : +1 Andreas!

21:13:40 From Michael Lodder to Everyone : we have enough of those already

21:13:46 From Kristina Yasuda1 to Everyone : pairwise DIDs can prevent RP correlation, but yeah IdP correlation is there

21:13:53 From Stephen Curran to Everyone : +1 Andreas

21:13:57 From Rouven Heck1 to Everyone : It depends on who your customers are … ;)

21:14:14 From Michael Lodder to Everyone : DIDs don’t get you correlation, credential presentation could without ZKPs

21:14:25 From Rouven Heck1 to Everyone : governments and big corporate might have other requirements than peer to peer use-cases

21:14:32 From Kristina Yasuda1 to Everyone : I am listing options and +1 to Rouven, some issuers ask for the call home...

21:15:08 From Kristina Yasuda1 to Everyone : if you have a different DID in each credential of the same content issued per RP, that prevents correlation

21:15:37 From Michael Lodder to Everyone : its only prevented if its never disclosed

21:15:46 From Michael Lodder to Everyone : if the DID is revealed, its correlatable

21:16:01 From Michael Lodder to Everyone : especially since its a unique number