Giter VIP home page Giter VIP logo

scal3's Introduction

SCAL3

Verify that systems operate under your sole control

You need identity wallets and trust services to participate securely in online society. Whether you are booking a holiday, signing a contract, or providing financial services. Underlying central systems mitigate risks of identity theft, fraud, and data loss. But you need assurance that these systems process user data only under their sole control. With SCAL3, Vidua empowers its users with this assurance made available on scale.

Depending on the risks, wallet and trust service providers leverage central systems with a sole control assurance level (SCAL):

  • SCAL1 systems authenticate users before operating on their data.
  • SCAL2 systems also operate only on instructions linked to multiple authentication factors.
  • SCAL3 systems also enable users to verify tamper-evident logs proving sole control.

Adoption of mobile wallets is accelerating with the “eIDAS 2.0” European Digital Identity framework. But the phones in use today are not equipped for security at scale. Users will therefore rely on central systems for cryptography, for example hardware security modules (HSMs). With the increasing reach and impact of such technology, only the transparency of SCAL3 puts users truly in control.

Prove sole control with SCAL3

  1. A subscribed user is enrolled using a device they control.
  2. The user authorizes an instruction, for example by entering a PIN code.
  3. The provided system only executes instructions generated using multi-factor authentication.
  4. The provider keeps a tamper-evident log with evidence of instructions.
  5. Upon request, the provider proves that a particular operation was authorized.
flowchart LR
subgraph Provider
	direction TB
	system(Central system)
	log[(Tamper-evident log)]
	system -- 3. execution --> system
	system -- 4. evidence --> log
end
subgraph Subscriber
	direction TB
	user((User))
	device[<br>Device<br><br>]
	user -- 1. control --> device
end
Subscriber -- 2. instruction --> Provider
Provider -- 5. proof --> Subscriber

Verify transparent systems

Publishing open source code is not enough. To verify if the system does what its provider claims, you need to check its actual behaviour.

Providers with SCAL3 enable users to verify that their systems only operated upon sole control. Under normal circumstances, the provider can prove that each operation has an instruction that was generated by an authentic subscriber.

If anyone suspects compromise or corruption, they can easily investigate and make their case. All evidence of instructions is available in a tamper-evident log.

This empowers users with cryptographic proof.

Three ways to achieve SCAL3

  1. Using the SCAL3 with UAF scheme. This involves using a dedicated multi-factor cryptographic device, such as a FIDO security key supporting UAF.
  2. Using the SECDSA technology. This technology is based on algorithms that were invented in 2021 and patented by Eric Verheul. Users verify evidence by applying homomorphic encryption.
  3. Using the SCAL3 with Thresholds scheme. With this patent pending solution, users verify evidence using open standard ECDSA and ECSDSA signature verification.

In 2023, Cleverbase experimented with all three solutions. In 2024, the Vidua identity wallet is rolling out solution 3 to its users. By enabling verification using open standards, this method makes it easy for users to verify the tamper-evident logs.

scal3's People

Contributors

sander avatar

Stargazers

Hidde Dorhout avatar Nikita Wootten avatar A.J. Stein avatar Sp0Q avatar  avatar Sander Dijkhuis avatar Lluís Ariño avatar Reginaldo Soares avatar Arne Visscher avatar Reginaldo Soares avatar  avatar

Watchers

 avatar Sp0Q avatar Sander Dijkhuis avatar A.J. Stein avatar

Forkers

sander

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.