Secure Anonymous Digital Identity
- 1 Add a Comment
- 2 Use Case Metadata
- 3 Use Case Content
- 4 NSTIC Guiding Principles Considerations
- 5 Domain Expert Working Group Considerations
- 6 Derived Requirements
Add a Comment
To add a comment, you will need to be logged on to the wiki. If you are logged on, click the button below to add a comment. The comment will be appended to the Discussion page for disposition by the reviewer. <inputbox> type=comment editintro=Comment_Instructions preload=Comment_Preload buttonlabel=Post a Comment on the Discussion Page default=Talk:Secure Anonymous Digital Identity hidden=yes </inputbox>
Use Case Metadata
Secure Anonymous Digital Identity
Use Case Lifecycle Status
|Contributed||Working Draft||Committee Review||Compilation||Approval||Publication|
|This use case has been sent to the IDESG Committees for their review. When committee comments are resolved and all individual use case criteria are met, this use case will be a candidate for compilation. The IDESG Standards Coordinating Committee may select this use case for including in the Compilation phase.|
Use Case AHG Review Status
This use case was reviewed by the User Case AHG on 2013-09-25.
Use Case Category
Use Case Content
Use Case Description
Create an anonymous crypto "Core Identifier" key unique to you through immutable binding to your real-world "Core Identity" and which cannot be reverse-engineered to reveal your real-world identity but which you and only you can then use as your user-centric online identifier to create as many online personas as you wish.
- Trusted infrastructure of authorized issuers
- trusted process, device and crypto for authorized issuers to create Core Identifiers
- users to use their Core Identifiers to create and maintain their personas
Goals / User Stories
user-centric single online identifier that is anonymous but due to it's trusted creation process and biometric key provides users with a low-cost unique anonymous online identifier which they can present as a globally trusted identifier asserting that "you are you" to relying parties, such that they will accept it together with required attributes to create your personas
- optimum trust in the infrastructure and process to create every Core Identifier.
- Core Identifier is only usable by the owning (real-world) Core Identity
- the process to create a Core identifier must bind immutably to the Core Identity
- Additional assumptions are described in Jericho Identity Commandments #1, #2 & #3
Because you are you and always will be you, there is every reason why the real-world unique "you" should be translated into a parallel online-world "you". The translation process must
- be trusted as high integrity (certified process, equipment, and authorized issuers)
- take a short time to do
- be low cost
- assure interoperability
- be immutable i.e. enduring and unchanging, to guarantee its validity
- not record any real-world attributes of the real-world Core Identity
- use certified crypto to assure reverse engineering cannot be successful.
Full process is described in Jericho Forum references listed below:
- Identity Videos #1 and #2 (each approx 4 minutes)
- Identity Key Concepts Guide, sections 3.1 & 3.2
take your Core Identifier to your Government along with acceptable proof of citizenship to create an e-citizen persona.
Then take your e-citizen persona to your electoral authority when you need to register to vote in an election, so creating anonymous voting persona which allows you to vote from anywhere in the world, anonymously, but only once because the voting process necessitates recording of each vote so records "this anonymous person voted" and prevents it voting more than once, though importantly NOT how you voted. In situations where failure to vote may incur penalties, because a persona can go down (but not up) your identity tree, you can prove that your persona voted.
Demonstrated success example is Austrian e-Government Innovationszentrum (EGIZ) scheme outlined in Jericho Forum Identity Key Concepts Chapter 5.
- Extended by:
- Extension of:
References and Citations
- Jericho Forum Identity Commandments, available via a link at
- Jericho Forum Identity Videos #1 & #2, available via links to YouTube on https://collaboration.opengroup.org/jericho/
or directly at
- Video #1: http://www.youtube.com/embed/tfj1DKOAeQI
- Video #2: http://www.youtube.com/embed/ZlG3yZfk9tw
- Jericho Forum Identity Key Concepts Guide, available via a link at
NSTIC Guiding Principles Considerations
User Experience/Usability Considerations
Domain Expert Working Group Considerations