Credentials are integral to digital identity and to our daily lives: driver's licenses confirm our capability to operate motor vehicles; university degrees assert our level of education; and government-issued passports attest to our citizenship when traveling between countries. Establishing an adequate Digital ID infrastructure can reduce the need to repetitively hand over sensitive identity documents to multiple organisations. 

Verifiable credentials are digital credentials that provide a set of tamper-proof claims and metadata that can be verified for authenticity. Verifiable credentials (VC) are digital credentials that follow the relevant World Wide Consortium Open standards. By using Cryptography and privacy enhancing technologies (PETS), VCs have the power to verify a user’s assertion without revealing sensitive information. Anonymous credentials are used to verify ownership of credentials without disclosing their privacy. 

The project aims to explore recent advances in anonymous verifiable credentials and their applications. The aim is to build anonymous verifiable credentials that are unlinkable (two presentations will not be linked to the same user), discloses minimal information, and can be revoked when required. 

The project involves both theory and implementation. The project involves excellent understanding of data structures, discrete mathematics, and algorithms. This space is highly active and can lead to impactful results. 

References:

  1. https://www.w3.org/TR/vc-data-model-2.0/
  2. https://www.nist.gov/video/stppa4-talk-1-anonymous-credentials
  3. https://link.springer.com/chapter/10.1007/978-3-031-30731-7_6
School

Computer Science and Engineering

Research Area

Security | Algorithms | Data structures

Suitable for recognition of Work Integrated Learning (industrial training)? 

No

The supervisor is supportive and have excellent understanding of the topic. The selected student will work closely with other members of the team.

The student will understand how foundational problems are buried in practical problems. The student will learn and work on designing and implementing cryptographic algorithms. Excellent C/C++/Rust is highly desirable. The aim is to experience the joys of research.