Taxonomy 101
As the first work package - anonymous credentials state of the art - is drawing to a close, we started to write a Systematization of Knowledge (SoK) paper to summarize our findings. The SoK paper starts with a taxonomy for privacy-preserving electronic identities, followed by a set of evaluation criteria, which are then applied to the elements of the taxonomy which are currently being discussed.
Here is an overview of the first levels of our proposed taxonomy, for you to discuss:
- Taxonomy for privacy-preserving electronic identities
- Goals and threats - what does it mean to have a privacy-preserving eID
- Privacy goals - what we want to protect
- Threat models - possible attacks to be averted
- Actors - active parties considered in our paper
- Solution foundations and implementations - how the Goals can be implemented and Threats averted
- Cryptographic building blocks - algorithms and data structures to solve the goals and threats
- Hardware security - protecting access to private keys
- Data structures - available solutions to encapsulate the cryptographic building blocks
- Regulatory and normative frameworks - how the solution is bound by documents
- Legal texts - proposed laws, directives, and ordinances
- Technical references - more detailed instructions how to implement the laws
- Standards - existing definitions of algorithms and data structures
- Goals and threats - what does it mean to have a privacy-preserving eID
There is still some flux with one or the other sub-category, but the general structure is now fixed. We’ll base our paper on these descriptions, and use the Goals and threats to evaluate both the Solution foundations, as well as the Regulatory frameworks. Another evaluation is between the Solution foundations and the Regulatory frameworks, as some of the proposed solutions might not fit the requirements of the regulatory frameworks.
If you want to give feedback on our taxonomy, please reach out to Linus Gasser.