Evoking Comprehensive Mental Models of Anonymous Credentials
- 788 Downloads
Anonymous credentials are a fundamental technology for preserving end users’ privacy by enforcing data minimization for online applications. However, the design of user-friendly interfaces that convey their privacy benefits to users is still a major challenge. Users are still unfamiliar with the new and rather complex concept of anonymous credentials, since no obvious real-world analogies exists that can help them create the correct mental models. In this paper we explore different ways in which suitable mental models of the data minimization property of anonymous credentials can be evoked on end users. To achieve this, we investigate three different approaches in the context of an e-shopping scenario: a card-based approach, an attribute-based approach and an adapted card-based approach. Results show that the adapted card-based approach is a good approach towards evoking the right mental models for anonymous credential applications. However, better design paradigms are still needed to make users understand that attributes can be used to satisfy conditions without revealing the value of the attributes themselves.
KeywordsCredential Selection Anonymous Credentials Mental Models Usability
Unable to display preview. Download preview PDF.
- 1.Brands, S.: Rethinking Public Key Infrastructure and Digital certificates - Building in Privacy. Ph.D. thesis, Eindhoven. Institute of Technology (1999)Google Scholar
- 3.Camenisch, J., Crane, S., Fischer-Hübner, S., Leenes, R., Pearson, S., Pettersson, J.S., Sommer, D., Andersson, C.: Trust in PRIME. In: Proceedings of Fifth IEEE International Symposium on Signal Processing and Information Technology, pp. 552–559 (December 2005)Google Scholar
- 6.Johnson-Laird, P.N.: Mental models: towards a cognitive science of language, inference, and consciousness. Harvard University Press, Cambridge (1983)Google Scholar
- 7.Jonassen, D.H.: Operationalizing mental models: strategies for assessing mental models to support meaningful learning and design-supportive learning environments. In: The First International Conference on Computer Support for Collaborative Learning, CSCL 1995, pp. 182–186. L. Erlbaum Associates Inc., Hillsdale (1995)Google Scholar
- 8.Pettersson, J.S.: HCI Guidelines. PRIME deliverable D6.1.f (February 2008)Google Scholar
- 10.Wästlund, E., Fischer-Hübner, S.: The Users’ Mental Models’ Effect on their Comprehension of Anonymous Credentials. In: Privacy and Identity Management for Life, pp. 229–240. Springer, Heidelberg (2011)Google Scholar
- 11.Whitten, A., Tygar, J.D.: Why Johnny Can’t Encrypt: A Usability Evaluation of PGP 5.0. In: Proceedings of the 8th USENIX Security Symposium (1999)Google Scholar
- 12.Young, I.: Mental Models: Aligning Design Strategy with Human Behavior. Rosenfeld media (2008)Google Scholar