Sign In

Communications of the ACM

ACM TechNews

Ibm's Sophisticated Cryptographic Algorithm Protects Your Identity

View as: Print Mobile App Share:
Artist's conception of digital encryption.

Identity Mixer uses an algorithm to encrypt the certified identity attributes of a user, giving the user the ability to reveal only selected pieces of those attributes to third parties.


IBM researchers have developed Identity Mixer, a cloud-based technology that uses an algorithm to encrypt the certified identity attributes of a user in a way that enables the user to reveal only selected pieces to third parties.

Identity Mixer can be used within a digital wallet, which contains credentials certified by a trusted third party. "With Identity Mixer now in the cloud, developers have a very strong cryptographic tool that makes privacy practical; it is a piece of software that you can incorporate into any identity management service enabling the service to verify that an individual is an authorized user without revealing any other personal information," says Brown University professor Anna Lysyanskaya.

IBM researchers are working with academic and industrial partners in Europe and Australia in the Authentication and Authorization for Entrusted Unions pilot project to demonstrate the cloud version of Identity Mixer.

For a pilot test in Germany, 20 test participants will be equipped with sensors for in-home activity and status monitoring. The data gathered from these sensors will be transferred to a dedicated cloud server and analyzed to determine the type of assistance required.

A second pilot will support Australia's freedom from exotic diseases, using Identity Mixer to enable secure sharing of sensitive information in a timely matter across remote locations and among collaborating partners.

From Help Net Security
View Full Article


Abstracts Copyright © 2015 Information Inc., Bethesda, Maryland, USA


No entries found