Jan Camenisch, Principal Research Staff, IBM Research – Zurich  Traditional authentication is performed by identifying a user and then deciding whether or not she is allowed to access a resource or to use a service. This is problematic from a data protection point of view as users are required to provide more information than necessary, information that is sensitive and requires expensive protection. Modern cryptography such as private credentials provide strong authentication mechanisms that allow a user to only prove that she has the right to a access a resource or use a service, without disclosing any information that needs special protection. One example of such a  cryptographic protocol is direct anonymous attestation. It has been standardized by the Trusted Computing Group in 2004 for authentication of a TPM  (trusted platform module) and has recently been updated to elliptic curve cryptography and also been picked up by FIDO as an authenticator mechanism. This talk explains at high level the cryptography concepts behind authentication without identification, gives an overview of the state of the art, and then discusses the existing standards.

Industry Vertical/Embedded Crypto Track