{"id":170918,"date":"2012-02-25T22:58:55","date_gmt":"2012-02-25T22:58:55","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/project\/u-prove\/"},"modified":"2023-05-29T14:07:29","modified_gmt":"2023-05-29T21:07:29","slug":"u-prove","status":"publish","type":"msr-project","link":"https:\/\/www.microsoft.com\/en-us\/research\/project\/u-prove\/","title":{"rendered":"U-Prove"},"content":{"rendered":"
<\/p>\n
A U-Prove token is a type of credential similar to a PKI certificate that can encode attributes of any type, but with two important differences:<\/p>\n
1) The issuance and presentation of a token is unlinkable<\/i> due to the special type of public key and signature encoded in the token; the cryptographic \u201cwrapping\u201d of the attributes contain no correlation handles. This prevents unwanted tracking of users when they use their U-Prove tokens, even by colluding insiders.<\/p>\n
2) Users can minimally disclose information about what attributes are encoded in a token in response to dynamic verifier policies. As an example, a user may choose to only disclose a subset of the encoded attributes, prove that her undisclosed name does not appear on a deny list, or prove that she is of age without disclosing her actual birthdate.<\/p>\n
These user-centric aspects make the U-Prove technology ideally suited to creating the digital equivalent of paper-based credentials and the plastic ID cards in one’s wallet.<\/p>\n
Microsoft has made available the foundational features of the technology by releasing the core U-Prove specifications under the Open Specification Promise. The core cryptographic scheme has been standardized in ISO\/IEC 18370-2:2016 (opens in new tab)<\/span><\/a> (Blind digital signatures \u2014 Part 2: Discrete logarithm based mechanisms).<\/p>\n Overview A U-Prove token is a type of credential similar to a PKI certificate that can encode attributes of any type, but with two important differences: 1) The issuance and presentation of a token is unlinkable due to the special type of public key and signature encoded in the token; the cryptographic \u201cwrapping\u201d of the […]<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","footnotes":""},"research-area":[13558],"msr-locale":[268875],"msr-impact-theme":[],"msr-pillar":[],"class_list":["post-170918","msr-project","type-msr-project","status-publish","hentry","msr-research-area-security-privacy-cryptography","msr-locale-en_us","msr-archive-status-active"],"msr_project_start":"","related-publications":[163029,163030,163032,163033,165488,165489,165490,166842,166843,166844,166845,166846,166847,166848,167028,167468],"related-downloads":[],"related-videos":[],"related-groups":[],"related-events":[],"related-opportunities":[],"related-posts":[],"related-articles":[],"tab-content":[],"slides":[],"related-researchers":[{"type":"user_nicename","display_name":"Karen Easterbrook","user_id":32510,"people_section":"Group 1","alias":"keaster"},{"type":"user_nicename","display_name":"Greg Zaverucha","user_id":31912,"people_section":"Group 1","alias":"gregz"},{"type":"user_nicename","display_name":"Christian Paquin","user_id":31473,"people_section":"Group 1","alias":"cpaquin"}],"msr_research_lab":[],"msr_impact_theme":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-project"}],"version-history":[{"count":9,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170918\/revisions"}],"predecessor-version":[{"id":944838,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-project\/170918\/revisions\/944838"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=170918"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=170918"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=170918"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=170918"},{"taxonomy":"msr-pillar","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-pillar?post=170918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}Links<\/h1>\n
\n
News<\/h1>\n
\n