...
Gliffy Diagram | ||||||
---|---|---|---|---|---|---|
|
Idemix
IRMA implements the Idemix Protocol to handle pseudonymous attribute handling. The Idemix protocol provides a way for users to use verifiable pseudonymous identifiers, coupled with certain attributes at services, without revealing their identity. With Idemix, this includes non-traceability across services, by the virtue of the user having credentials targeted to each service.
The credentials are always issued by an Issuer Organization. The User contacts the Issuer and registers an account and establishes a pseudonym. If the user is eligible for certain attributes, a credential will be issued containing the pseudonym and the attributes to the user.
Then, the user can prove the possession of such credentials without actually revealing them to a verifier organization.
Use cases (generalized)
The following use case descriptions present some ideas of how the system may be used in academic setting.
...