You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Assumption: Users can be attackers
Use case: someone requests issuance of a COVID certificate and proves her identity with an identity credential. this user can than pass the token to someone else, who requests the actual issuance to her key material
Options:
Issuance requires verifiable identity credential as well
Device/hardware binding between the different process steps
Credential itself is bound to a certain identity/identity credential (i.e. the verifier would ensure the holder binding)
The text was updated successfully, but these errors were encountered:
would probably not be enough, as such a user would likely also be willing to request issuance to someone else's key material himself. By cooperating with the other person, proofs of posession of key material should also not prevent this
Assumption: Users can be attackers
Use case: someone requests issuance of a COVID certificate and proves her identity with an identity credential. this user can than pass the token to someone else, who requests the actual issuance to her key material
Options:
The text was updated successfully, but these errors were encountered: