First of all, BBS and SD-JWT are not comparable apple to apple. BBS is a 
signature scheme and it needs to be combined with few other things like JWP or 
BBS data integrity proof type (https://www.w3.org/TR/vc-di-bbs/) with JSON-LD 
payload. While SD-JWT is a mechanism that can be used with any crypto suite.

Second, how to do batch issuance of the credential (honestly, of any credential 
format: not just SD-JWT VCs but also mdocs and JWT-VCs) and whether it can be 
done low cost is out of scope of the credential format (or any of its 
components) specification itself. Btw when using OpenID4VCI (an extension of 
oauth), batch issuing SD-JWTs does not need a blind signature and I do not know 
what you mean by exhaustion of the supply of tokens, there are only access 
token and refresh token involved in a usual manner.

Best,
Kristina

Get Outlook for iOS<https://aka.ms/o0ukef>
________________________________
From: Watson Ladd <watsonbl...@gmail.com>
Sent: Thursday, August 24, 2023 9:08 PM
To: Daniel Fett <m...@danielfett.de>
Cc: Hannes Tschofenig <hannes.tschofe...@gmx.net>; oauth@ietf.org 
<oauth@ietf.org>; draft-ietf-oauth-selective-disclosure-jwt....@ietf.org 
<draft-ietf-oauth-selective-disclosure-jwt....@ietf.org>
Subject: Re: SD-JWT does not meet standard security definitions

[You don't often get email from watsonbl...@gmail.com. Learn why this is 
important at https://aka.ms/LearnAboutSenderIdentification ]

On Thu, Aug 24, 2023 at 3:44 AM Daniel Fett <m...@danielfett.de> wrote:
>
> Thanks, Hannes.
>
> The fact that technologies like AnonCreds are based on such old principles, 
> yet they are not uniformly standardized, often times limited to a few 
> implementations that may or may not be secure, are full of security footguns, 
> lack hardware support, and are just extremely hard or impossible to deploy 
> speaks for itself.
>
> That's why things like SD-JWT exist and gain traction.
>
> Yes, you have to jump through hoops to get unlinkability, but it is not 
> impossible, and it seems to be a good tradeoff for many.

Is there a document describing this that we can compare to the BBS
version? Because it's a lot harder than you think: you need a blind
signature and cut and choose for the credential openings (or
rerandomization via structure preserving signatures, hello pairings),
you need to deal with exhaustion of the supply of tokens, your
issuance process has to be repeatable at low cost, so that's also
getting messy, and then the hardware binding has its own special
problems. None of that is in this draft, and I think it would be a lot
better if we spelled it out here or someplace else to get a better
sense of the tradeoffs.

I would also like to point out that if end users don't like the
privacy aspects, they simply won't use this technology. That's a very
serious deployment issue.

Sincerely,
Watson Ladd

--
Astra mortemque praestare gradatim
_______________________________________________
OAuth mailing list
OAuth@ietf.org
https://www.ietf.org/mailman/listinfo/oauth

Reply via email to