Keyshare protocol
This document describes the goals and details of the IRMA keyshare protocol.
Introduction
The IRMA mobile app allows users to obtain and disclose IRMA attributes, as well as attach them to signed statements. Before such an IRMA session proceeds, the Yivi app may ask the user to enter her IRMA PIN code so that the requestor can be sure that it is indeed the attribute owner initiating the session (as opposed to, e.g., a thief of the user's phone). The verification of the correctness of the IRMA PIN code, and preventing the session from happening when it is not, is the responsibility of the IRMA keyshare server. In order to do this, it interacts with the Yivi app and possibly the IRMA server in a protocol that we call the keyshare protocol. This protocol is documented here.
Each IRMA scheme decides whether or not it employs an IRMA keyshare server. If it does, then this keyshare server is involved in any IRMA session that involves attributes that fall under the scheme manager's responsibility.
Upon app installation, the IRMA user registers to the keyshare servers of the installed scheme managers. At this point the user chooses her IRMA PIN code. The app additionally generates an ECDSA keypair, of which the public key is sent to the keyshare server, and the corresponding private key is stored exclusively in the phone's Secure Enclave (SE) or Trusted Execution Environment (TEE). Afterwards, whenever the user performs an IRMA session, the user must first enter her IRMA PIN code, after which her Yivi app signs a challenge provided by the keyshare server using its ECDSA private key. Only if the PIN is correct and the challenge is correctly signed will the keyshare server allow the session to proceed.
Goals
The keyshare server must:
- Authenticate a user as being the same person that registered to the keyshare server in the past, just before an IRMA session occurs, using (1) a secret from the phone's SE/TEE and (2) the user's IRMA PIN;
- Block the IRMA session from happening when this authentication fails,
- Allow users to remotely block their Yivi app from performing future IRMA session in case of loss or theft of their phone. That is, the user can revoke her own attributes.
- The keyshare server must not learn the values of any of the attributes of any user, and also not to whom the user discloses attributes.
Consequentially, it is insufficient to verify the user's IRMA PIN code locally in the Yivi app, because otherwise a malicious actor could try to bruteforce the PIN of a user and thus gain access to her attributes. Instead we have chosen to modify the cryptography that is used in IRMA sessions in such a way that the keyshare server's contribution to it is necessary for the session to complete, so that the keyshare server can reliably block sessions from happening by refusing to cooperate, if the correct PIN is not entered. Additionally the keyshare server prevents bruteforce attempts on the user's PIN, by rejecting further PIN attempts if the user's PIN is entered incorrectly too many times.
IRMA secret keys and keyshares
IRMA is an implementation of the Idemix attribute-based credential (ABC) scheme. In such schemes a credential is a set of numbers along with a digital signature over this set of numbers, created by the issuer using the issuer's private key. The ABC scheme provides an attribute disclosure protocol in which the user can selectively disclose any subset of the attributes to another party (called the verifier or service provider), in such a way that the verifier is assured of the validity of the issuer's signature over all attributes (including the ones that were not shown).
In IRMA, the first attribute