Internet-Draft | HDK | October 2024 |
Dijkhuis | Expires 20 April 2025 | [Page] |
Hierarchical Deterministic Keys enables managing large sets of keys bound to a secure cryptographic device that protects a single key. This enables the development of secure digital identity wallets providing many one-time-use public keys.¶
This note is to be removed before publishing as an RFC.¶
Status information for this document may be found at https://datatracker.ietf.org/doc/draft-dijkhuis-cfrg-hdkeys/.¶
Source for this draft and an issue tracker can be found at https://github.com/sander/hierarchical-deterministic-keys.¶
This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79.¶
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet-Drafts is at https://datatracker.ietf.org/drafts/current/.¶
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress."¶
This Internet-Draft will expire on 20 April 2025.¶
Copyright (c) 2024 IETF Trust and the persons identified as the document authors. All rights reserved.¶
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (https://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.¶
This document specifies the algorithms to apply Hierarchical Deterministic Keys (HDKs). The purpose of an HDK architecture is to manage large sets of keys bound to a secure cryptographic device that protects a single key. This enables the development of secure digital identity wallets providing many one-time-use public keys.¶
The core idea has been introduced in [BIP32] to create multiple cryptocurrency addresses in a manageable way. The present document extends the idea towards devices commonly used for digital wallets, and towards common interaction patterns for document issuance and authentication.¶
To store many HDKs, only a seed string needs to be securely stored, associated with the device private key. Each HDK is then deterministically defined by a path of self-generated indices or provided key handles. Such a path can efficiently be stored and requires less confidentiality than the seed.¶
To prove possession of many HDKs, the secure cryptographic device only needs to perform common cryptographic operations on a single key. The HDK acts as a blinding factor that enables blinding the device public key.¶
This document provides a specification of the generic HDK scheme, generic HDK instantiations, and fully specified concrete HDK instantiations.¶
An HDK instantiation is expected to be applied in a solution deployed as (wallet) solution instances. One solution instance can have multiple HDK instantiations, for example to manage multiple identities or multiple cryptographic algorithms or key protection mechanisms.¶
This document represents the consensus of the authors, based on working group input and feedback. It is not a standard. It does not include security or privacy proofs.¶
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals, as shown here.¶
The following notation is used throughout the document.¶
An HDK instantiation applies local key derivation to create many key pairs from a single seed value. It applies asynchronous remote key generation to enable providers to derive more key pairs. Additionally, an HDK instantiation applies these key pairs to blind a single key pair and proofs of its possession, such as required in [RFC7800].¶
Solutions MAY omit application of the asynchronous remote key generation functionality. In this case, a solution instance can only derive keys locally.¶
The following example illustrates the use of key derivation. An HDK tree is defined by an initial public key and a seed value, which is a byte array containing sufficient entropy. Now tree nodes are constructed as follows.¶
+------------------------+ |Confidential static data| |+---------+ +----+ | ||pk_device| |seed| | |+----+----+ +--+-+ | +-----+---------+--------+ +-----------------+---------+---------------------------+ |Level 0 v v | |+-----------------------------------------------------+| ||(pk0, sdk0, salt0) = hdk0 = HDK-Root(pk_device, seed)|| |+----+------------------------------------------------+| +-----+-------------------------------------------------+ Level 1 v +-------------------------++-----------------++-----------------+ |(pk1, sk1, salt1) = ||HDK-Derive-Local(||HDK-Derive-Local(| |HDK-Derive-Local(hdk0, 0)|| hdk0, 1) || hdk0, 2) | +-----------+--------+----++-----------------++-----------------+ | +---------------+ | | +-----------+------------------------+--------------------+ |Level 2 v v | |+-----------------------++-----------------------+ | ||HDK-Derive-Local( ||HDK-Derive-Local( | | || (pk1,sk1,salt1), 0)|| (pk1,sk1,salt1), 1)| | |+-----------------------++-----------------------+ | +---------------------------------------------------------+¶
The solution instance computes the Level 0 HDK at the root node using a deterministic function called HDK-Root. The HDK consists of a key pair (pk0, sk0)
, and a byte string salt0
to derive next-level keys.¶
The solution instance computes the Level n > 0
value is using a deterministic function called HDK-Derive-Local. The function takes the previous-level salt as input, and a sequence number i
starting at 0. The function returns a new HDK as output.¶
Instead of a locally generated index, an HDK can also be derived using a key handle as per Asynchronous Remote Key Generation (ARKG) [I-D.draft-bradleylundberg-cfrg-arkg-02]. To enable ARKG, the solution instance uses HDK-Seed-Remote and provides the output public key to an issuer. The issuer returns a key handle, using which the solution instance can derive a next-level key pair and seed using HDK-Derive-Remote.¶
Locally derived parents can have remotely derived children. Remotely derived parents can have locally derived children.¶
The next concept to illustrate is blinding. Blinding enables a solution instance to prove possession of a private key without disclosing the directly associated public key. This way, solutions can avoid linkability across readers of a document that is released with proof of possession.¶
In this example, a document is issued in such a way that it can be presented with proof of possession using pk
as derived using HDK. The solution instance applies the HDK-Authenticate function to the associated sk
along with the device private key sk_device
and reader-provided reader_data
. The output is device_data
, which the solution instance can subsequently use to prove possession to the reader. The reader does not need to be aware that HDK was used.¶
In secure cryptographic device +-----------+ |sk_device +-------------+ +-----------+ | ------------- | HDK in | solution | instance v +-----------+ +-----------+ HDK-Authenticate->|device_data| |pk | ^ ^ +-----------+ +-----------+ | | +-----------+ | | |sk +-------+ | +-----------+ | ------------- | +-----------+ | |reader_data+-------------+ +-----------+¶
Blinding methods can be constructed such that the secure cryptographic device does not need to be designed for it. In such cases, sk_device
does not contain the value of the private device key but a reference to it.¶
The parameters of an HDK instantiation are:¶
ID
: A domain separation tag, represented as a string of ASCII bytes.¶
Nk
: The amount of bytes needed to create a uniformly random key. Note that Nk
usually needs to be higher than the size of the key space, for example to maintain uniform distribution when deriving RNG({1,2,...,n-1}) from RNG({0,1,2,...,2^k-1}) for k=8*Nk
and 2^k >= n
as per [TR03111] Section 4.1.1 Algorithm 2.¶
Ns
: The amount of bytes of a salt value with sufficient entropy.¶
key(bytes)
: Deterministically outputs a key pair (pk, sk)
from a uniformly random string of Nk
bytes.¶
serialize(pk)
: Serializes a public key pk
to a fixed-size string.¶
expand(msg, DST, L)
: Outputs a uniformly random string of L
bytes using a cryptographic hash or extendable-output function and input byte strings msg
and DST
.¶
BL
: An asymmetric key blinding scheme [I-D.draft-bradleylundberg-cfrg-arkg-02], consisting of the functions:¶
ARKG
: An asynchronous remote key generation instantiation [I-D.draft-bradleylundberg-cfrg-arkg-02], encapsulating an asymmetric key blinding scheme instantiation BL
and a key encapsulation mechanism KEM
, and consisting of the functions:¶
ARKG-Derive-Public-Key(pk, info): Outputs (pk', kh)
where pk'
is a derived public key and kh
is a key handle to derive the associated private key, based on an ARKG public seed pk = (pk_kem, pk_bl)
and application-specific information info
.¶
ARKG-Derive-Private-Key(sk, kh, info): Outputs sk'
, a blinded private key based on ARKG private seed sk = (sk_kem, sk_bl)
, a key handle kh
, and application-specific information info
.¶
HDK-Root(pk_device, seed)
: See The HDK-Root function (Section 2.3).¶
HDK-Derive-Remote(pk_device, (pk, sk, salt), kh)
: See The HDK-Derive-Remote function (Section 2.6).¶
HDK-Authenticate(sk_device, sk_hdk, reader_data)
: See The HDK-Authenticate function (Section 2.7).¶
A concrete HDK instantiation MUST specify the instantiation of each of the above functions and values.¶
A solution instance creates a root HDK using a seed and a device public key. The generation of the seed is out of scope for this specification.¶
Inputs: - pk_device, a device public key. - seed, a string of Ns bytes. Outputs: - pk, the root public key. - sk, the root private key. - salt, the root salt. def HDK-Root(pk_device, seed)¶
A solution instance derives a key pair and a salt from an HDK and an index.¶
Inputs: - pk, a public key. - sk, a private key. - salt, a string of Ns bytes. - index, an integer between 0 and 2^32-1 (inclusive). Outputs: - pk', the next-level public key at the provided index. - sk', the next-level private key at the provided index. - salt', the next-level salt at the provided index. def HDK-Derive-Local((pk, sk, salt), index): msg = serialize(pk) || I2OSP(index, 4) okm = expand(msg, ID || salt, Nk + Ns) tau = okm[0:Nk] info = "HDK-Derive-Local" sk' = BL-Blind-Private-Key(sk, tau, info) pk' = BL-Blind-Public-Key(pk, tau, info) salt' = okm[Nk:] return (pk', sk', salt')¶
A solution instance derives an ARKG seed from an HDK.¶
Inputs: - pk, a public key. - sk, a private key. - salt, a string of Ns bytes. Outputs: - pk', an ARKG public seed. - sk', an ARKG private seed. def HDK-Seed-Remote((pk, sk, salt)): okm = expand("seed", ID || salt, Nk) (pk_kem, sk_kem) = key(okm) pk_bl = pk sk_bl = sk return ((pk_kem, pk_bl), (sk_kem, sk_bl))¶
Given an ARKG public seed pk
, an issuer can derive an ARKG key handle kh
and blinded public key pk'
using:¶
(pk', kh) = ARKG-Derive-Public-Key(pk, "")¶
A solution instance derives a key pair and a salt from an HDK and an ARKG key handle.¶
Inputs: - pk_device, the device public key. - pk, a public key. - sk, a private key. - salt, a string of Ns bytes. - kh, an ARKG key handle. Outputs: - pk', the next-level public key for the provided key handle. - sk', the next-level private key for the provided key handle. - salt', the next-level salt for the provided key handle. def HDK-Derive-Remote(pk_device, (pk, sk, salt), kh)¶
A solution instance authenticates the device by creating a blinded proof applying the device private key and an HDK private key. This yields device data which it can use to prove possession of the device-bound document. The application-specific data for proof of possession is out of scope for HDK.¶
Inputs: - sk_device, a (reference to a) device private key. - sk_hdk, an HDK private key. - reader_data, a byte string of solution instance-specific data. Outputs: - device_data, a byte string of device data for proving possession. def HDK-Authenticate(sk_device, sk_hdk, reader_data)¶
Implementations of this function typically perform pre-processing on the reader_data
, invoke the device key operation on the result, and perform post-processing on the output.¶
A HDK instantiation MUST define HDK-Authenticate such that the device_data
can be verified using the public key in the same HDK as sk_hdk
. The reader does not need to know that HDK was applied: the public key will look like any other public key used for proofs of possession.¶
When presenting multiple documents, a reader could require a proof that multiple keys are associated to a single device. Several protocols for a cryptographic proof of association are possible, such as [Verheul2024].¶
For example, a solution instance could prove that two elliptic curve keys B1 = [bf1]D
and B2 = [bf2]D
, where bf1
and bf2
are multiplicative blinding factors for a common device public key D
, are associated using a zero-knowledge protocol. In this protocol, the solution instance proves that they know the discrete logarithm of B2 = [bf2/bf1]B1
with respect to generator B1
.¶
The construction of proof of association protocols requires availability to the prover of the blinding factors. The following function enables exporting these blinding factors.¶
Inputs: - pk, an HDK public key. - sk, an HDK private key. - salt, an HDK salt which is a string of Ns bytes. Outputs: - bf, an HDK private key which is used as a blinding factor. def HDK-Export-Blinding-Factor((pk, sk, salt)): bf = sk return bf¶
Implementations SHOULD use a plausibly deniable proof of association protocol to ensure that the interactive presentation does not accidentally generate evidence that is potentially non-repudiable.¶
Instantiations of HDK using elliptic curves requires the following cryptographic construct:¶
EC
: An elliptic curve with elements of type Element and scalars of type Scalar, consisting of the functions:¶
EC-Add(A, B): Outputs the sum between Elements A
and B
.¶
EC-Scalar-Mult(A, k): Outputs the scalar multiplication between Element A
and Scalar k
.¶
EC-Scalar-Base-Mult(k): Outputs the scalar multiplication between the base Element and Scalar k
.¶
EC-Order(): Outputs the order of the base Element.¶
EC-Serialize-Element(A): Outputs a byte string representing Element A
.¶
These instantiations instantiate the following:¶
def serialize(pk): return EC-Serialize-Element(pk) def key(bytes): sk' = OS2IP(bytes) mod (EC-Order() - 1) sk = sk' + 1 pk = EC-Scalar-Base-Mult(sk) return (pk, sk)¶
Such instantiations of HDK use elliptic curves (see Using elliptic curves (Section 3.1)) and require the following cryptographic construct:¶
ECDH
: An Elliptic Curve Key Agreement Algorithm - Diffie-Hellman (ECKA-DH) [TR03111] with elliptic curve EC
, consisting of the functions:¶
ECDH-Create-Shared-Secret(sk_self, pk_other): Outputs a shared secret byte string representing an Element.¶
In such instantiations, the reader provides an ephemeral public key reader_data
. The HDK-Authenticate function returns device_data
consisting of a binary encoded x-coordinate Z_AB
of an ECDH operation with sk_device
and sk_hdk
. Subsequently, the solution instance creates a message authentication code (MAC), such as in ECDH-MAC authentication defined in [ISO18013-5]. The reader verifies this MAC by performing an ECDH operation with its ephemeral private key and the HDK public key.¶
These instantiations instantiate the following:¶
def HDK-Root(pk_device, seed): msg = serialize(pk_device) okm = expand(msg, ID || seed, Nk + Ns) (_, sk') = key(okm[0:Nk]) pk' = EC-Scalar-Mult(pk_device, sk') salt' = okm[Nk:] return (pk', sk', salt') def HDK-Derive-Remote(pk_device, (pk, sk, salt), kh): (pk_arkg, sk_arkg) = HDK-Seed-Remote((pk, sk, salt)) sk' = ARKG-Derive-Private-Key(sk_arkg, kh, "") pk' = EC-Scalar-Mult(pk_device, sk') msg = serialize(pk') salt' = expand(msg, ID || salt, Ns) return (pk', sk', salt') def HDK-Authenticate(sk_device, sk_hdk, reader_data): P' = EC-Scalar-Mult(reader_data, sk_hdk) # Compute Z_AB within the secure cryptographic device. Z_AB = ECDH-Create-Shared-Secret(sk_device, P') return Z_AB¶
Such instantiations of HDK use elliptic curves (see Using elliptic curves (Section 3.1)) require the following cryptographic construct:¶
DSA
: an EC-SDSA (Schnorr) digital signature algorithm [TR03111], consisting of the functions:¶
DSA-Sign(sk, message): Outputs the signature (c, r)
created using private signing key sk
over byte string message
.¶
DSA-Verify(signature, pk, message): Outputs whether signature
is a signature over message
using public verification key pk
.¶
DSA-Serialize(c, r): Outputs the byte array serialization of the signature (c, r)
.¶
DSA-Deserialize(bytes): Outputs the signature (c, r)
represented by byte string bytes
.¶
The reader MUST create an input byte string reader_data
with sufficient entropy for each challenge.¶
The reader MUST verify the proof device_data
using DSA-Verify with the HDK public key.¶
def HDK-Root(pk_device, seed): msg = serialize(pk_device) okm = expand(msg, ID || seed, Nk + Ns) (pk_blind, sk') = key(okm[0:Nk]) pk' = EC-Add(pk_device, pk_blind) salt' = okm[Nk:] return (pk', sk', salt') def HDK-Derive-Remote(pk_device, (pk, sk, salt), kh): (pk_arkg, sk_arkg) = HDK-Seed-Remote((pk, sk, salt)) sk' = ARKG-Derive-Private-Key(sk_arkg, kh, "") pk' = EC-Add(pk_device, EC-Scalar-Base-Mult(sk')) msg = serialize(pk') salt' = expand(msg, ID || salt, Ns) return (pk', sk', salt') def HDK-Authenticate(sk_device, sk_hdk, reader_data): # Compute signature within the secure cryptographic device. signature = DSA-Sign(sk_device, reader_data) (c, s) = DSA-Deserialize(proof) s' = s + c * sk_hdk mod EC-Order() proof = DSA-Serialize(c, s') return proof¶
Due to potential patent claims, this document does not specify an implementation for threshold ECDSA.¶
The RECOMMENDED instantiation is the HDK-ECDH-P256. This avoids the risk of having the holder unknowingly producing a potentially non-repudiable signature over reader-provided data. Secure cryptographic devices that enable a high level of assurance typically support managing ECDH keys with the P-256 elliptic curve.¶
This instantiation uses ECDH (see Using ECDH message authentication codes for proof of possession (Section 3.2)).¶
ID
: "HDK-ECDH-P256-v1"
¶
Nr
: 48¶
Ns
: 32¶
ARKG
: ARKG instantiation as described in [I-D.draft-bradleylundberg-cfrg-arkg-02] with the identifier ARKG-P256MUL-ECDH
, KEM
as defined above, and BL
with elliptic curve arithmetic as described in [I-D.draft-bradleylundberg-cfrg-arkg-02] Section 3.1, but with multiplicative instead of additive blinding.¶
ECDH
: ECKA-DH with curve EC
¶
The holder MUST generate sk_device
as an ECDH
private key in the secure cryptographic device.¶
This instantiation uses EC-SDSA (see Using EC-SDSA signatures for proof of possession (Section 3.3)).¶
ID
: "HDK-ECSDSA-P256-v1"
¶
Nr
: 48¶
Ns
: 32¶
ARKG
: ARKG instantiation as described in [I-D.draft-bradleylundberg-cfrg-arkg-02] with the identifier ARKG-P256ADD-ECDH
, KEM
as defined above, and BL
with elliptic curve arithmetic as described in [I-D.draft-bradleylundberg-cfrg-arkg-02] Section 3.1.¶
DSA
: EC-SDSA-opt (the optimised EC-SDSA) with curve EC
.¶
The holder MUST generate sk_device
as a DSA
private key in the secure cryptographic device.¶
The HDK algorithm assumes that the holder controls a secure cryptographic device that protects the device key pair (pk_device, sk_device)
. The device key is under sole control of the holder.¶
In the context of [EU2024-1183], this device is typically called a Wallet Secure Cryptographic Device (WSCD), running a personalised Wallet Secure Cryptographic Application (WSCA) that exposes a Secure Cryptographic Interface (SCI) to a Wallet Instance (WI) running on a User Device (UD). The WSCD is certified to protect access to the device private key with high attack potential resistance to achieve high level of assurance authentication as per [EU2015-1502]. This typically means that the key is associated with a strong possession factor and with a rate-limited Personal Identification Number (PIN) check as a knowledge factor, and the verification of both factors actively involve the WSCD.¶
An example deployment of HDK in this context is illustrated below.¶
+---------------------+ +----------------------+ |Issuer infrastructure| |User Device (UD) | | | | | |+-------------------+|OpenID4VCI|+--------------------+| ||Issuer service |<----------++Wallet Instance (WI)|| || || |++-------------------+| ||Optionally an || +-+--------------------+ ||ARKG subordinate || |Secure ||party || |Cryptographic |+-------------------+| |Interface (SCI) +---------------------+ +v-------------------+ |Wallet Secure | |Cryptographic | Internal Manages |Application (WSCA) | registry <-----------+ | |Optionally an | |ARKG delegating | |party | ++-------------------+ |Uses +v-------------------+ Protects |Wallet secure | Device keys <-----------+cryptographic | |device (WSCD) | +--------------------+¶
The WSCA could be a single program or could be deployed in a distributed architecture, as illustrated below.¶
+--------------+ |User device | |+------------+| ||WI || |++-----------+| | |SCI | |+v-----------+| ||WSCA agent || |++-----------+| +-+------------+ |WSCA protocol +v-----------+ |WSCA service| +------------+¶
In the case of a distributed WSCA, the UD contains a local component, here called WSCA agent, accessing an external and possibly remote WSCA service from one or more components over a WSCA protocol. For example, the WSCA agent may be a local web API client and the WSCA service may be provided at a remote web API server. In such cases, typically the WSCA service receives a high-assurance security evaluation, while the WSCA agent is assessed to not be able to compromise the system's security guarantees.¶
The internal registry can be managed by the WSCA agent, by the WSCA service, or by the combination. When the user device is a natural person’s mobile phone, WSCA agent management could provide better confidentiality protection against compromised WSCA service providers. When the user device is a cloud server used by a legal person, and the legal person deploys its own WSCD, WSCA service management could provide better confidentiality protection against compromised Wallet Instance cloud providers.¶
In a distributed WSCA architecture, the WSCA could internally apply distributed key generation. A description of this is out of scope for the current document.¶
The HDK algorithm can support any of the following WSCD architectures:¶
Local external standalone device, for example:¶
Local internal standalone programmable cryptographic chip, for example:¶
Local internal preprogammed security platform, for example:¶
Remote HSM, for example:¶
Cryptographic module certified against EN 419221-5:2018 with a local client application providing a WSCA service, remotely controlled for example using:¶
In all cases, the WSCD may implement a Cryptographic Service Provider [TR03181] to reduce the scope for Common Criteria certification of the WSCA.¶
The solution proposal discussed herein works in all four WSCD architectures that support the required cryptographic primitives within the WSCD:¶
The other HDK operations can be performed in a WSCA or WSCA agent running on any UD, including hostile ones with limited sandboxing capabilities, such as in a smartphone's rich execution environment or in a personal computer web browser.¶
If the user enters the PIN in the WI instead of on the WSCD directly, the WI MUST process it directly after entering, the WI MUST keep the plaintext PIN confidential, and the WI MUST delete the PIN from memory as soon as the encrypted PIN or data derived from the PIN is passed over the SCI.¶
The rate-limiting of the PIN check MUST be managed within the WSCD or on securely managed SCI infrastructure. In particular, the rate-limiting MUST NOT be managed solely in local WI or WSCA agent software since it is assumed that attackers could modify this without detection.¶
Some issuers could require evidence from a solution provider of the security of the holder's cryptographic device. This evidence is in the context of [EU2024-1183] divided into initial "Wallet Trust Evidence" and related "Issuer Trust Evidence". Each is a protected document that contains a trust evidence public key associated with a private key that is protected in the secure cryptographic device. In HDK, these public keys are specified as follows.¶
The Wallet Trust Evidence public key is the root HDK public key. To achieve reader unlinkability, the wallet SHOULD limit access to a trusted person identification document provider only.¶
To prevent association across identities, the solution provider MUST before issuing Wallet Trust Evidence ensure that (a) a newly generated device key pair is used and (b) the wallet follows the protocol so that the HDK-Root output is bound to exactly this key. For (a), the solution provider could rely on freshness of a key attestation and ensure that each device public key is attested only once. For (b), the wallet could proof knowledge of sk'
with a Schnorr non-interactive zero-knowledge proof [RFC8235] with base point pk_device
. This would ensure,that the root blinding key sk'
is not shared with the solution provider to reduce the risk of the solution provider unblinding future derived keys.¶
The Issuer Trust Evidence public key can be any non-root HDK public key. The solution provider MUST verify that the wallet knows the associated private key before issuing Issuer Trust Evidence. The solution provider MUST ensure that sk_device
is under sole control of the solution instance holder. To achieve reader unlinkability, the solution instance MUST limit access of Issuer Trust Evidence to a single issuer. Subsequent issuers within the same HDK tree do not need to receive any Issuer Trust Evidence, since they can derive equally secure keys by applying ARKG to presented keys attested by trusted (other) issuers.¶
In [draft-OpenID4VCI], the following terminology applies:¶
OpenID4VCI | HDK |
---|---|
Credential | attestation |
Credential Issuer | issuer |
Verifier | reader |
Wallet | solution instance |
HDK enables solution instances and issuers cooperatively to establish the cryptographic key material that issued attestations will be bound to.¶
For asynchronous batch issuance, HDK proposes an update to the OpenID4VCI endpoints. This proposal is under discussion in openid/OpenID4VCI#359. In the update, the solution instance shares an ARKG public seed with the issuer, and the issuer shares a key handle for each attestation, generated using:¶
ARKG-Derive-Public-Key(key_generation_public_key, "")¶
The key handles MUST be considered confidential, since they provide knowledge about the blinding factors. Compromise of this knowledge could introduce undesired linkability. In HDK, both the holder and the issuer know the key handle during issuance.¶
In an alternative to HDK, the holder independently generates blinded key pairs and proofs of association, providing the issuer with zero knowledge about the blinding factors. However, this moves the problem: the proofs of association would now need to be considered confidential.¶
This design is based on ideas introduced to the EU Digital Identity domain by Peter Lee Altmann.¶
Helpful feedback came from Emil Lundberg, John Bradley and Remco Schaar.¶