Projects per year
Abstract
Delegating authentication to identity providers like Google or Facebook, while convenient, compromises user privacy. These identity providers can record users' every move; the global identifiers they provide also enable internet-wide tracking. We show that neither is a necessary evil by presenting the BISON pseudonym derivation protocol, inspired by Oblivious Pseudorandom Functions. It hides the service provider's identity from the identity provider yet produces a trusted, scoped, immutable pseudonym. Colluding service providers cannot link BISON pseudonyms; this prevents user tracking. BISON does not require a long-lived state on the user device and does not add additional actors to the authentication process. BISON is practical. It is easy to understand, implement, and reason about, and is designed to integrate into existing authentication protocols. To demonstrate this, we provide an OpenID Connect extension that allows OIDC's PPID pseudonyms to be derived using BISON while remaining fully backwards compatible. Additionally, BISON uses only lightweight cryptography. Pseudonym derivation requires a total of four elliptic curve scalar-point multiplications and four hash function evaluations, taking ≈ 3 ms in our proof of concept implementation. Thus, BISON's privacy guarantees can be realized in practice. This makes BISON a crucial stepping stone towards the privacy-preserving internet of tomorrow.
| Original language | English |
|---|---|
| Title of host publication | ACM ASIA CCS 2025 - Proceedings of the 20th ACM ASIA Conference on Computer and Communications Security |
| Publisher | Association for Computing Machinery (ACM) |
| Pages | 1355-1371 |
| Number of pages | 17 |
| ISBN (Electronic) | 9798400714108 |
| DOIs | |
| Publication status | Published - 24 Aug 2025 |
| Event | 20th ACM ASIA Conference on Computer and Communications Security, AsiaCCS 2025 - Hanoi, Viet Nam Duration: 25 Aug 2025 → 29 Aug 2025 Conference number: 2025 https://asiaccs2025.hust.edu.vn/ |
Publication series
| Name | Proceedings of the ACM Conference on Computer and Communications Security |
|---|---|
| ISSN (Print) | 1543-7221 |
Conference
| Conference | 20th ACM ASIA Conference on Computer and Communications Security, AsiaCCS 2025 |
|---|---|
| Abbreviated title | ACM AsiaCCS |
| Country/Territory | Viet Nam |
| City | Hanoi |
| Period | 25/08/25 → 29/08/25 |
| Internet address |
ASJC Scopus subject areas
- Software
- Computer Networks and Communications
Fields of Expertise
- Information, Communication & Computing
Fingerprint
Dive into the research topics of 'BISON: Blind Identification with Stateless scOped pseudoNyms'. Together they form a unique fingerprint.-
EU - LICORICE - reLIable and sCalable tOols foR self-sovereIgn identity and data proteCtion framEwork
Tauber, A. (Project manager on research unit)
1/10/24 → 30/09/27
Project: Research project
-
EU - ERATOSTHENES - Secure management of IoT devices lifecycle through identities, trust and distributed ledgers
Tauber, A. (Project manager on research unit)
1/10/21 → 31/03/25
Project: Research project
Activities
- 1 Talk at conference or symposium
-
BISON: Blind Identification with Stateless scOped pseudoNyms
Heher, J. (Speaker) & More, S. J. (Contributor)
29 Aug 2025Activity: Talk or presentation › Talk at conference or symposium › Science to science
Research output
- 1 Preprint
-
BISON: Blind Identification through Stateless scOpe-specific derivatioN (Preprint)
Heher, J., Heimberger, L. & More, S., 30 May 2024.Research output: Working paper › Preprint
File