Conclusion and Future Work
We compared two general approaches aiming to ensure non-transferability for anonymous credentials: biometric enforced non-transferability and non-transferability based on embedded valuable secrets. Not surprisingly, the weakest points are the biometric sensors and finding meaningful (valuable) secrets for the user. Both approaches are not able to ensure perfect non-transferability, but may be sufficient depending on the values to protect.
Unable to display preview. Download preview PDF.