Skip to main content

Oblivious identitY Management for Private and User-friendly Services

Deliverables

Public Workshop

will disseminate and demonstrate results to raise awareness

OLYMPUS Future Business Development

describes results from the evaluation with external stakeholders related possible business models based on the demonstrating capabilities of the OLYMPUS technologies in real working environments

Initial Version of Project’s Web Site

will be updated on a monthly basis.

Requirements and Design Templates for OLYMPUS

describes cross domain scenarios and related use-case requirements. Moreover, it contains design guidelines and detailed KPI for evaluation of OLYMPUS.

OLYMPUS Framework and Tools

contains the final version of the integrated OLYMPUS framework including the tools developed in T52 and T53 It also contains the final specification of the deployment packages and software tools

OLYMPUS Benchmarking and Testing Environment

contains a first version of the benchmarking and testing environment including a documentation of how to use it.

Business and Innovation Plans

Business and Innovation Plans

Quality Assurance Plan

describes the quality system and procedures.

Final Public Report

summarises the project results

First pilots deployment and initial evaluation

describes real working pilotsMVPs corresponding to the two usecases and initial feedback

Intermediate Integrated OLYMPUS Framework and Tools

contains a first version of the integrated OLYMPUS framework including the tools developed in T5.2 and T5.3. It also contains a specification of the deployment packages and software tools.

First Reference Implementation of Oblivious IdM

describes the first implementation of the oblivious IdM solution including the APIs that are offered to higherlevel applications and the design security mechanisms and implementation of a solution to enable authentication in offline use cases with an oblivious IdM

OLYMPUS Blueprint

outlines the overall OLYMPUS framework including its components and interfaces Further focus is on the required components to realize the novel cryptographic approaches of the intended ecosystem A first draft version IntD11 will be generated on M13 to WP3 and WP4 and based on the feedback of the initial evaluation a final version will be generated on M24

Final Pilot deployment and evaluation of User Experience and GDPR compliance

reports on final description of the pilots deployment integration aspects and lesson learnt related to the user experiences with the solutions tested in the two use cases Also compliance report with a special focus in GDPR fulfillment

Use-case descriptions

contains a complete list of requirement and specifications of the use-cases for demonstration and evaluation.

Second Reference Implementation of Oblivious IdM

is an update on D32 reflecting the changes that were made to the implementation after incorporating feedback from the use cases

Security and Privacy-aware OLYMPUS Framework Impact Assessment

This deliverable will describe how OLYMPUS will enhance the current IdM solutions and will provide a DPIA evaluation based on the GDPR regulation. Additionally this deliverable will answer ethics requirements for collection, storage, and protection of personal data.

Final Report on Dissemination, Exploitation and Standardisation Activities

reports on results regarding dissemination exploitation and standardisation

Intermediate Report on Dissemination and Standardisation Activities

reports on activities and plans for dissemination, exploitation and standardisation.

Project Handbook

details project management and reporting procedures.

OLYMPUS support for extended eID models

contains the analysis done for extending the capabilities of OLYMPUS for new functionalities like extended Document Signer or the possible extension to another physical identities holders for eg through bridging with eIDAS or STORK

OLYMPUS User Experience Design Guidelines

A document describing the results of the user studies and how they are used to create a set of user experience design guidelines for OLYMPUS technology

Cryptographic Design of an Oblivious IdM System

contains a full specification of the cryptographic protocols performed between the user device, partial IdPs, and the service provider.

Searching for OpenAIRE data...

Publications

Towards a standardized model for privacy-preserving Verifiable Credentials

Author(s): Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabé, Antonio Skarmeta
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-6, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469204

A Holistic Approach to Enhanced Security and Privacy in Digital Health Passports

Author(s): Tore Frederiksen
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-10, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469212

Approaching the Data Protection Impact Assessment as a legal methodology to evaluate the degree of privacy by design achieved in technological proposals. A special reference to Identity Management systems

Author(s): Cristina Timón López, Ignacio Alamillo Domingo, Julián Valero Torrijos
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-9, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469207

Which authentication method to choose. A legal perspective on user-device authentication in IoT ecosystems

Author(s): Cristina Timón López, Ignacio Alamillo Alamillo Domingo, Julián Valero Valero Torrijos
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-6, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3470068

Towards the Design of a Privacy-preserving Attribute Based Credentials-based Digital ID in Denmark – Usefulness, Barriers, and Recommendations

Author(s): Mads Schaarup Andersen
Published in: The 16th International Conference on Availability, Reliability and Security, 2021, Page(s) 1-8, ISBN 9781450390514
Publisher: ACM
DOI: 10.1145/3465481.3469211

OLYMPUS: towards Oblivious identitY Management for Private and User-friendly Services

Author(s): Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta, Michael Stausholm, Tore Kasper Frederiksen, Noelia Martinez, Nuno Ponte, Evangelos Sakkopoulos, Anja Lehmann
Published in: 2019 Global IoT Summit (GIoTS), 2019, 2019, Page(s) 1-6, ISBN 978-1-7281-2171-0
Publisher: IEEE
DOI: 10.1109/giots.2019.8766357

PESTO: Proactively Secure Distributed Single Sign-On, or How to Trust a Hacked Server

Author(s): Carsten Baum, Tore Frederiksen, Julia Hesse, Anja Lehmann, Avishay Yanai
Published in: 2020 IEEE European Symposium on Security and Privacy (EuroS&P), 2020, Page(s) 587-606, ISBN 978-1-7281-5087-1
Publisher: IEEE
DOI: 10.1109/eurosp48549.2020.00044

OLYMPUS: A distributed privacy-preserving identity management system

Author(s): Rafael Torres Moreno, Jesus Garcia Rodriguez, Cristina Timon Lopez, Jorge Bernal Bernabe, Antonio Skarmeta
Published in: 2020 Global Internet of Things Summit (GIoTS), 2020, Page(s) 1-6, ISBN 978-1-7281-6728-2
Publisher: IEEE
DOI: 10.1109/giots49054.2020.9119663

Security Analysis of CPace

Author(s): Michel Abdalla, Julia Hesse, Björn M. Haase
Published in: 2021
Publisher: -

Implications juridiques relatives à la gestion de l’identité numérique et perspectives d’innovation en Europe

Author(s): Cristina Timón López
Published in: 2020
Publisher: -

Digital Identity Management: a key factor on the pursuit of privacy and the fight against cybercrime

Author(s): Cristina Timón, Julián Valero & Ignacio Alamillo
Published in: 2020, ISBN 978-84-17580-15-5
Publisher: Huygens Editorial
DOI: 10.5281/zenodo.6242441

Fuzzy Asymmetric Password-Authenticated Key Exchange

Author(s): Andreas Erwig, Julia Hesse, Maximilian Orlt, Siavash Riahi
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II, 12492, 2020, Page(s) 761-784, ISBN 978-3-030-64833-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64834-3_26

Succinct Diophantine-Satisfiability Arguments

Author(s): Patrick Towa, Damien Vergnaud
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III, 12493, 2020, Page(s) 774-804, ISBN 978-3-030-64839-8
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64840-4_26

(R)CCA Secure Updatable Encryption with Integrity Protection

Author(s): Michael Klooß, Anja Lehmann, Andy Rupp
Published in: Advances in Cryptology – EUROCRYPT 2019 - 38th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Darmstadt, Germany, May 19–23, 2019, Proceedings, Part I, 11476, 2019, Page(s) 68-99, ISBN 978-3-030-17652-5
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-17653-2_3

Short Threshold Dynamic Group Signatures

Author(s): Jan Camenisch, Manu Drijvers, Anja Lehmann, Gregory Neven, Patrick Towa
Published in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, 12238, 2020, Page(s) 401-423, ISBN 978-3-030-57989-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_20

Identity Management: State of the Art, Challenges and Perspectives

Author(s): Tore Kasper Frederiksen, Julia Hesse, Anja Lehmann, Rafael Torres Moreno
Published in: Privacy and Identity Management. Data for Better Living: AI and Privacy - 14th IFIP WG 9.2, 9.6/11.7, 11.6/SIG 9.2.2 International Summer School, Windisch, Switzerland, August 19–23, 2019, Revised Selected Papers, 576, 2020, Page(s) 45-62, ISBN 978-3-030-42503-6
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-42504-3_4

Deploying Personalized Oblivious Mobile Identity

Author(s): Georgia Sourla, Evangelos Sakkopoulos
Published in: Knowledge-Based Software Engineering: 2020 - Proceedings of the 13th International Joint Conference on Knowledge-Based Software Engineering (JCKBSE 2020), Larnaca, Cyprus, August 24-26, 2020, 19, 2020, Page(s) 162-177, ISBN 978-3-030-53948-1
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-53949-8_15

Public-Key Generation with Verifiable Randomness

Author(s): Olivier Blazy, Patrick Towa, Damien Vergnaud
Published in: Advances in Cryptology – ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I, 12491, 2020, Page(s) 97-127, ISBN 978-3-030-64836-7
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-64837-4_4

Separating Symmetric and Asymmetric Password-Authenticated Key Exchange

Author(s): Julia Hesse
Published in: Security and Cryptography for Networks - 12th International Conference, SCN 2020, Amalfi, Italy, September 14–16, 2020, Proceedings, 12238, 2020, Page(s) 579-599, ISBN 978-3-030-57989-0
Publisher: Springer International Publishing
DOI: 10.1007/978-3-030-57990-6_29

Implementation and evaluation of a privacy-preserving distributed ABC scheme based on multi-signatures

Author(s): Jesús García-Rodríguez, Rafael Torres Moreno, Jorge Bernal Bernabe, Antonio Skarmeta
Published in: Journal of Information Security and Applications, 62, 2021, Page(s) 102971, ISSN 2214-2126
Publisher: -
DOI: 10.1016/j.jisa.2021.102971

ScrambleDB: Oblivious (Chameleon) Pseudonymization-as-a-Service

Author(s): Anja Lehmann
Published in: Proceedings on Privacy Enhancing Technologies, 2019/3, 2019, Page(s) 289-309, ISSN 2299-0984
Publisher: -
DOI: 10.2478/popets-2019-0048

The OLYMPUS Architecture—Oblivious Identity Management for Private User-Friendly Services

Author(s): Rafael Torres Moreno, Jorge Bernal Bernabe, Jesús García Rodríguez, Tore Kasper Frederiksen, Michael Stausholm, Noelia Martínez, Evangelos Sakkopoulos, Nuno Ponte, Antonio Skarmeta
Published in: Sensors, 20/3, 2020, Page(s) 945, ISSN 1424-8220
Publisher: Multidisciplinary Digital Publishing Institute (MDPI)
DOI: 10.3390/s20030945

Privacy-Preserving Solutions for Blockchain: Review and Challenges

Author(s): Jorge Bernal Bernabe, Jose Luis Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno, Antonio Skarmeta
Published in: IEEE Access, 7, 2019, Page(s) 164908-164940, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2019.2950872

A Trusted Approach for Decentralised and Privacy-Preserving Identity Management

Author(s): Rafael Torres Moreno, Jesus Garcia-Rodriguez, Jorge Bernal Bernabe, Antonio Skarmeta
Published in: IEEE Access, 9, 2021, Page(s) 105788-105804, ISSN 2169-3536
Publisher: Institute of Electrical and Electronics Engineers Inc.
DOI: 10.1109/access.2021.3099837

Security and privacy in the Internet of Things: Challenges Solutions

Author(s): Jorge Bernal Bernabe, Jose L. Canovas, Jose L. Hernandez-Ramos, Rafael Torres Moreno and A. Skarmeta
Published in: Security and privacy in the Internet of Things: Challenges Solutions, 2020, ISBN 978-1-64368-053-8
Publisher: IOS Press BV
DOI: 10.3233/aise27