Idemix:
Identity Mixer
Group 4
Ashley Bringer,
Candice Gordon, Sean Mackey, Reba Smith
Key Words: Idemix, IBM's Zurich Research Laboratory in Rüschlikon, Switzerland, Cryptographic Techniques, Pseudonym, Anonymous Credential Systems, PKI, Anonymity Revocation, Data Parsimony
The new software Idemix: Identity Mixer is an emerging technology that has
just made its way into the information world. This product was designed by IBM's Zurich Research Laboratory in Rüschlikon, Switzerland to cut down on personal information
that will be shared over the internet. This will have huge impactions for any
business that does online transactions. Companies will no longer have
unnecessary information about customers, and those customers will not be at as
much risk of having their information leaked.
The reason why Idemix is so cutting edge is that
once a person’s information is given to the master company then it never has to
be re-entered. This will cut down on personal information such as driver’s
license number, credit card number, or even social security number that could
be stolen by internet thieves. The way that Idemix
keeps the information so safe is by using anonymous credential systems, and by
only allowing the necessary information out and nothing extra. The anonymous
credential system is the basis for the Idemix system.
Anonymous credential systems include several subsystems such as cryptographic
techniques, data parsimony, pseudonyms, PKI, and anonymity revocation. Each of
these complex factors was created using logarithms, which makes any internet
trail nearly impossible to track. Cryptographic techniques are changing
everyday and becoming more and more complex, but by using the logarithms IBM’s
team has been able to produce encrypted information more affectively than
before. Data parsimony is used to keep data separate. This means that when a
new pseudonym is used the data trail does not lead back to another previously
used pseudonym or even to one that is used later. PKI or public-key infracture is a way to keep people from loaning others
their user name and password. The PKI is an all or nothing system, such that if
you let someone on your account then all of your credentials can be accessed by
that person. Finally, anonymity revocation is what is used if a person tries to
steal from a company using this system. If someone tries to buy something and
never pays for it then their information can be recovered by a designated
authority. This is how criminals will be kept out of this system of total
anonymity. With all of these systems in place any of the information that is
let out is kept safe, because the customer’s internet trail is encrypted, a different
pseudonym is used every time a transaction is processed, and their data is kept
separate from past data. A person can have total anonymity when buying online;
this will allow people to buy without fear of embarrassment or ridicule. An
example of Idemix is someone trying to rent a car
over the internet. Instead of that person sending there driver’s license and method
of payment they can do it all with the Idemix system.
The Idemix software allows the customer to go to a
secure website and complete the transaction in a few short steps. The customer
never types in their credit card number or even a driver’s license number, but
rather the software gives the green light for the car company to release the
car to the customer. The customer has been totally protected by the Idemix system.
The people that created this software are IBM's Zurich Research Laboratory
in Rüschlikon. Some of the people that worked on this
project are Jan Camenisch, Victor Shoup,
Anna Lysyanskaya, and Els
Van Herreweghen, but this is just a few of the team
that worked on this project. These are the people that wrote the logarithms,
codes, PKI’s, and credential systems that are used to
protect, change, and encrypt customer information. Another area that is worked
on at the Zurich Research Laboratory is business integration technologies,
which tries to improve e-business communications and organization. This is one
lab that is on the forefront of research in the information technologies field.
The reason that this product is important is because the world is becoming
more dangerous day by day for internet transactions. The truth is that there are
so many people in the world that want to get money for free and an easy way to
do it is to steal it from information trails. These trails are being hacked
into and stolen by internet thieves. With millions and millions of dollars being
spent every year over the internet this is something that people will start to
fear. If people do not feel safe then they will not buy online, and if that
were to happen many businesses would fail.
This product is also very important for big businesses that do thousands of
transactions online everyday. Idemix can be expanded
to large companies, so that their information does not get leaked to
competitors by disgruntled employees. People within the company that do not
need to know certain information would not have access to the decryption code,
and thereby eliminating leaks or wandering by employees. This would keep other
rival companies from getting inside secrets or learning how a company has a
competitive advantage. The use for the Idemix
technology is growing everyday. This system has already been used in prototype
by different companies to gather and keep information anonymous.
Therefore this new technology is a great way to for people to search and
buy anything online. Idemix is a revolutionary product
that will aid in boosting internet sales, and by creating a new and more
efficient way to keep personal information personal. Identity theft is a
growing problem, and technology must stay in front of the thieves and Idemix is a way to do it.
Reference
Idemix: Pseudonymity for E-transactions. Retrieved January 30, 2007 from <http://www.zurich.ibm.com/security/idemix>
Unkefer, Hannah. (2007, January 26) Made In IBM Labs: IBM Software to Safeguard Consumer Identity on the Web with “Identity Mixer”. IBM Press release. Retrieved from <http://www-03.ibm.com/press/us/en/pressrelease/20974.wss>
Questions about Idemix: Identity Mixer (Group 4)
Multiple Choice
1) What lab developed the Idemix software?
A. IBM Austin Research Laboratory B. IBM Zurich Research Laboratory
C. IBM Hursley Development Laboratory D. IBM Research Lab of
2) All of these are part of the anonymous credential system except _______________.
A. Anonymity B. Data Parsimony
C. Credentials D. References
3) In Idemix, ___________ uses false information to encrypt any information given to the online services.
A. Pseudonym B. Anonymity
C. PKI (Public Key Infracture) D. Data Parsimony
4) Which one of these is considered to be a disadvantage of Idemix?
A. Third party B. Shipping
C. No paperwork D. Credential
True or False
_____ 5) Idemix allows online services to receive information such as driver license number.
_____ 6) Public Key Infracture allow trustworthy partners to receive your information using Idemix.
_____ 7) Selecting a condition is a transaction step part of idemix.