Topic C: Wallet Unit Attestation (WUA) and Key Attestation #387
Replies: 5 comments 3 replies
-
Topic C formulates requirements for the Wallet Unit Attestation (WUA) based on the eIDAS regulation and three November 24 2024 eIDAS implementation regulations and is asking public feedback on three questions. In this comment I only give my answers to the first two questions which I think are fundamental for wallet security. Topic C starts with a summary of the WUA requirements based on the legal texts and from this interprets what this means from a cybersecurity perspective. I think this is confusing and not working for me, also as it seems to assume that the legal people that wrote the texts are cybersecurity experts having done a thorough cybersecurity risk assessment. In my view one should start the WUA discussion from a cybersecurity/privacy standpoint avoiding technical details as much as possible and from thereon compare the legal texts on what is missing. Then fix/amend that in the wallet Architecture Reference Framework (ARF) in a way the legal people can use it in upcoming eIDAS implementation regulations. I think the WUA cybersecurity discussion boils down to three questions which are not yet fully satisfactorily answered in Topic C. These questions are: My full reaction to Topic C and my answers to A-C can be read in Comments&RecommendationsTopicC.pdf. Here I also refer to the paper specifying Proof-of-Association (PoA) techniques I posted earlier. Topic C Question 1: Are there any missing requirements?
Topic C Question 2: Do we prevent PID and Attestation providers from achieving "cryptographically bound" (such as by proof of association), by limiting the WUA to contain only a signed public key and a set of supported capabilities/operations? |
Beta Was this translation helpful? Give feedback.
-
On behalf of the Spanish Data Protection Authority (AEPD) The attached document contains our comments on this topic. Thank you very much for this opportunity to contribute to this important discussion. |
Beta Was this translation helpful? Give feedback.
-
There are alternative processes that can be implemented TODAY today and that are much more data protection respecting and secure.
o For each and every transaction, the WUA serial number (part of each VC) is obfuscated (through a committment for those cryptography inclined) and:
o For the revocation process:
All these principles can be implemented with the BBS# proposal we have made and are illustrated in the following github flows proposed for presentation. Finally, we think that the WUA MUST be managed through a ZPK enabled scheme (cf topic G), otherwise the transactions that absolutely required full privacy / unlinkability will be at least linkable by the issuer, which is not acceptable. And contrary to this sentence “To mitigate the privacy risk of the long validity period of the WUA, the WUA should be a once-only attestation as specified in [Topic A].“, this will not mitigate anything in this case. Generally, the topic remains very confusing and we do not see at this stage a clear setup taking into account at the same type time the security, privacy and scaling issues:
As long as these questions are not answered very precisely, we will remain unconvinced that an industrially deployable solution is on the way and will remain on the contrary convinced that deploying a first version of the ARF without ZKP is bound to failure and just delaying the inevitable and obvious. |
Beta Was this translation helpful? Give feedback.
-
Hi @ad-Orange, sorry to pick only one sentence out of your long post, but most of the other things are actively being discussed already and I like to understand this objection better. On the face of it, it seems strange to me to say that offline (i.e., proximity) transactions cannot be on LoA High or that attestations used offline must have a short validity period for them to be LoA High. That is because the CIR 2015/1502, which specifies the LoAs, was written in the context of very long-lived, offline electronic identification means such as electronic passports and identity cards. Yet, of course, it allows LoA High to be reached for such identification means. Also, in the context of the ARF, if a proximity transaction flow is used, this only means that the Wallet Unit and the Relying Party are not communicating over the internet. It does not mean that the RP must be fully offline. Moreover, even if the RP is offline at the moment of the transaction, it may be online often enough to allow it to retrieve a fresh attestation status list or identifier list every 24 hours (or more often). For those reasons, I don't believe that it's impossible for proximity transactions to be LoA High. But please continue the discussion if you disagree., |
Beta Was this translation helpful? Give feedback.
-
Hi @ad-Orange, yes, that clarifies, thanks. I agree with you. The reason I asked is that often 'offline' is used as a kind of shorthand for 'in proximity'. Also, 'full offline transactions' are not recognized as a category in the ARF and therefore do not seem to be very relevant to me. But that's probably my particular way of looking at the world :-). |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Welcome to the discussion on the Digital Credentials API, part of the ongoing development of the Architecture and Reference Framework (ARF) for the European Digital Identity (EUDI) Wallet.
This discussion is based on the document Topic C - Wallet Unit Attestation (WUA) and Key Attestation.
The goal is to define high-level requirements for WUA as defined in the IAs of article 5a, and for the key attestation. The legal requirements in Chapter 2 of the document addresses different aspects related to Wallet Unit Attestation. The aspects cover interaction with the user (i.e. requirements in relation to the user interface), interaction with other parties (i.e. what WUA should be used for) and the WUA itself (i.e. essential information that should be contained in the WUA). This document will not go into requirements on the user interface, etc., but will focus on how WUA may be used in connection with other parties.
Furthermore, the document is ONLY intended to clarify the high level requirements related to WUA. The technical specifications related to WUA is to be developed by the Commission at a later point in time.
The legal requirements in relation to the functional requirements of WUA can be summarized as the following functionality:
Based on the functional requirement, the following requirements with regard to the WUA itself can derived:
All of this can be achieved as a (revocable) attestation on a public key, issues by the Wallet Provider. Additionally the WUA should contain relevant information on the Wallet Unit capabilities, such as the WSCD/WSCA. These must also be attested by the Wallet Provider and may be used to provide additional trust in the Wallet Unit.
This discussion is part of a structured process to refine and complete the ARF, with your input playing a vital role. We invite you to share your comments, insights, and suggestions here. Your contributions will be carefully reviewed and considered as we work towards the next version of the ARF, which will incorporate updates on this topic.
Thank you for participating in this important conversation.
Beta Was this translation helpful? Give feedback.
All reactions