Skip to content

Commit 782a6e8

Browse files
authored
Topic o and z discussion papers updated, release 3 (#597)
* Updated topic O discussion paper r3 * Updated topic Z discussion paper r3
1 parent 29a5b13 commit 782a6e8

File tree

2 files changed

+63
-21
lines changed

2 files changed

+63
-21
lines changed

docs/discussion-topics/o-catalogues-for-attestations.md

Lines changed: 14 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# O - Catalogues for Attestations
22

3-
Version 0.3, updated 29 Aug 2025
3+
Version 0.4, updated 8 Sep 2025
44
[Link to GitHub discussion](https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/discussions/557)
55

66
## 1. Introduction
@@ -147,6 +147,13 @@ A Schema Provider for an Attestation Rulebook MAY generate a machine-readable ve
147147
of the attestation schema and register it in the catalogue of schemes for the attestation of attributes.
148148
The registration SHALL include a reference to the corresponding Attestation Rulebook.
149149

150+
The following High-Level Requirement is proposed to be added under Topic 25:
151+
152+
**CAT_11**
153+
A request to include or to modify an attribute in the catalogue of attributes SHALL indicate
154+
how a verification point for an attribute can be used
155+
156+
150157
### 3.2 High-Level Requirements to be changed
151158
The requirements specified in Topics 25 and 26 shall be removed, as they are considered outdated.
152159
In addition, the content of these topics shall be updated to reflect the conclusions of
@@ -158,6 +165,7 @@ A list of the requirements that shall be removed follows:
158165

159166
**Topic 25**
160167

168+
161169
| **Index** | **Requirement specification** |
162170
|-----------|-------------------|
163171
| CAT_01 | The Commission SHALL establish a catalogue of attributes used within the EUDI Wallet ecosystem. *Note: The catalogue of attributes does not need to be a separate catalogue, but could be combined with the Attestation Rulebooks catalogue mentioned in CAT_05.* |
@@ -186,7 +194,11 @@ The ARF includes in various locations the term `catalogue of published Attestati
186194
(e.g., section 3.15). This should be rephrased to `catalogue of schemes for the attestation of attributes`.
187195

188196
Similarly, Section 5.5 of the ARF has to be re-written and adapted to the definitions set
189-
in Section 2 of this document.
197+
in Section 2 of this document.
198+
199+
Finally, Section 5.5 will be revised to clearly state that the catalogue of attributes
200+
will be used by QTSPs, and that each Member State remains free to implement its own verification
201+
mechanisms, including the use of OOTS.
190202

191203
## 4 References
192204

docs/discussion-topics/z-device-bound-attestations.md

Lines changed: 49 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Z - Device-bound Attestations
22

3-
Version 0.5, updated 1 Sep 2025
3+
Version 0.6, updated 8 Sep 2025
44

55
[Link to GitHub discussion](https://github.com/eu-digital-identity-wallet/eudi-doc-architecture-and-reference-framework/discussions/581)
66

@@ -36,9 +36,11 @@ This document is structured as follows:
3636
- Chapter 3 discusses use cases for non device-bound attestations.
3737
- Chapter 4 presents the additions and changes that will be made to the ARF as a result of discussing this topic with Member States.
3838

39-
## 2. Existing requirements related to device-bound attestations
39+
## 2. Definitions, Existing requirements related to device-bound attestations
4040
Device binding refers to the practice of cryptographically linking an attestation
4141
to a specific device, through the use of a private key stored in secure hardware.
42+
In the context of the ARF **device binding refers to the binding of an attestation
43+
to a cryptographic key stored in a WSCD**.
4244

4345
One of the key advantages of device binding is its ability to prevent the sharing
4446
or unauthorized reuse of attestations. Since the attestation is tied to a cryptographic
@@ -129,8 +131,9 @@ presentation to be device-bound. For example, a PID can be securely bound to a d
129131
while complementary attestations, such as a university diploma or a professional license,
130132
may remain portable and unbound.
131133

132-
**Question**
133-
What should happen with respect to re-issuance? Currently the ARF specifies the following:
134+
## 4 Discussion
135+
### Re-issuance of non device bound attestations
136+
Currently the ARF specifies the following:
134137

135138
> In the absence of User authentication, and to prevent that a re-issued PID or attestation
136139
ends up at the wrong User, the PID Provider or Attestation Provider ensures that the re-issued
@@ -140,18 +143,45 @@ But this not applicable to non device-bound attestations. It is noted that even
140143
cannot use the re-issued attestation (e.g., because "claim-based" binding is used) sensitive
141144
information about a user may be inferred.
142145

143-
## 4 Additions and changes to the ARF
146+
In order to ensure that a re-issued non device-bound attestation does not end up
147+
with the wrong User, the corresponding refresh tokens SHALL be bound to the WSCA/WSCD
148+
used by the Wallet Unit that stores the replaced attestation.
149+
150+
### Security of non device-bound attestations
151+
Non device-bound attestations should be bound to the User using alternative
152+
mechanisms, such as "Attribute-Based Binding" that links them to a device-bound
153+
attestation, for example, a PID. Nevertheless, there are no technical means
154+
to prevent a User from presenting a standalone non device-bound attestation, nor
155+
to prevent a Relying Party from accepting it. In such cases, non device-bound
156+
attestations can be stolen and re-used by a third party. Attestation Providers
157+
should always assess this risk.
158+
159+
## 5 Additions and changes to the ARF
144160
Currently the ARF only considers device-bound attestations. It will adapted to also
145161
consider non device-bound attestations.
146162

147-
### 4.1 High-Level Requirements to be added to Annex 2
163+
### 5.1 High-Level Requirements to be added to Annex 2
148164
The following HLR will be added to Topic 12 (Attestation Rulebooks)
149165

150166
**ARB_30**
151167
The Schema Provider for an Attestation Rulebook SHALL specify whether an attestation
152168
is device-bound or not.
153169

154-
### 4.2 High-Level Requirements to be changed
170+
The following HLR will be added to Topic 10 (Issuing a PID or attestation to a Wallet Unit)
171+
172+
**ISSU_66**The common OpenID4VCI protocol referenced in requirement ISSU_01, or an EUDI
173+
Wallet-specific extension or profile thereof, SHALL enable an Attestation Provider
174+
to verify that the refresh token used for the re-issuance of a non device-bound
175+
attestation is bound to a WSCA/WSCD included with the Wallet Unit in which the
176+
replaced attestation is stored.
177+
178+
The following HLR will be added to Topic 6 (Relying Party authentication and User approval)
179+
180+
**RPA_12**
181+
A Wallet Unit MAY provide a visual indication to the User about the binding mechanism
182+
used by an attestation requested by a Relying Party.
183+
184+
### 5.2 High-Level Requirements to be changed
155185
**OAI_02** A Wallet Unit SHALL support proving cryptographic device binding between a
156186
WSCA/WSCD included in the Wallet Unit and a PID or **device-bound** attestation,
157187
in accordance with [SD-JWT VC] or [ISO/IEC 18013-5]. Notes: Such a mechanism is called
@@ -176,20 +206,20 @@ and 'key binding' in [SD-JWT-VC]. - Discussions on device binding are ongoing,
176206
in particular regarding whether non-device-bound PIDs or attestations should be
177207
supported by a Wallet Unit, and if so, what the requirements for this support should be.~~
178208

179-
**ISSU_27** An Attestation Provider SHALL support the issuance of both device-bound
180-
and non device-bound attestation. When an issued attestation is device-bound, an Attestation Provider
181-
SHALL ensure that the attestation is cryptographically
182-
bound to a WSCA/WSCD included in the Wallet Unit, as specified in requirement WUA_11 in
183-
[Topic 9]
209+
**ISSU_27** An Attestation Provider MAY implement device binding for all attestations it issues. When an issued
210+
attestation is device-bound, an Attestation Provider SHALL ensure that the attestation is
211+
cryptographically bound to a WSCA/WSCD included in the Wallet Unit, as specified in requirement
212+
WUA_11 in [Topic 9]
184213

185214
**ISSU_65** The common OpenID4VCI protocol referenced in requirement ISSU_01, or an
186215
EUDI Wallet-specific extension or profile thereof, SHALL enable a PID Provider,
187-
Attestation Provider or Wallet Provider to verify that a re-issued PID, attestation,
216+
Attestation Provider or Wallet Provider to verify that a re-issued PID, **device-bound** attestation,
188217
or WUA is bound to the same WSCA/WSCD to which the existing PID, **device-bound** attestation, or WUA is bound.
189218
Note: This can be done, for instance, by requiring that OAuth 2.0 Demonstrating
190-
Proof of Possession (DPoP) [RFC 9449] is used for each Refresh Token, and that the
191-
public key in the DPoP proof is identical to the public key in the existing PID,
192-
attestation, or WUA issued to the Wallet Unit previously.
219+
Proof of Possession (DPoP) [RFC 9449] is used for each Refresh Token and that the
220+
public key of the Refresh Token and the PID are stored in the same WSCA/WSCD.
221+
~~public key in the DPoP proof is identical to the public key in the existing PID,
222+
attestation, or WUA issued to the Wallet Unit previously.~~
193223

194224
**ZKP_01**
195225
A ZKP scheme SHALL provide support for the following generic functions, while hiding
@@ -211,18 +241,18 @@ This SHALL include at least the attestation type and the PID Provider or
211241
Attestation Provider that issued the PID or attestation, as well as their service supply points.
212242
However, the Migration Object SHALL NOT contain attribute identifiers or attribute values,
213243
and SHALL NOT contain any private keys of the PID or **device-bound** attestation.
214-
**For non device-bound attestations a Wallet Unit SHALL add to the Migration Object all data necessary to
244+
**For non device-bound attestations a Wallet Unit MAY add to the Migration Object all data necessary to
215245
transfer the attestation to a new device. This includes attribute identifiers or attribute values**
216246

217247

218-
### 4.3 Descriptions to be added to the ARF main document
248+
### 5.3 Descriptions to be added to the ARF main document
219249

220250
Section "6.6.3.8 Relying Party Instance verifies device binding" will be modified
221251
to reflect that non device-bound attestation can exist. Section
222252
"6.6.2.3.3 Verifies that the PID key or the attestation key is protected by the WSCD"
223253
will be modified to reflect that non device-bound attestation can exist
224254

225-
### 4.4 Other changes
255+
### 5.4 Other changes
226256
The Rulebook template will be modified according to the new HRL **ARB_30**. TS 10
227257
will be modified according to the new HRL **Mig_03**.
228258

0 commit comments

Comments
 (0)