Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Rename "herd privacy" to "group privacy". #121

Merged
merged 2 commits into from
Jan 13, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
20 changes: 10 additions & 10 deletions index.html
Original file line number Diff line number Diff line change
Expand Up @@ -207,7 +207,7 @@ <h2>Introduction</h2>
burden it places from a bandwidth and processing perspective, both on the server
and the client fetching the information. In order to meet privacy expectations,
it is useful to bundle the status of large sets of credentials into a single
list to help with herd privacy. However, doing so can place an impossible
list to help with group privacy. However, doing so can place an impossible
burden on both the server and client if the status information is as much as a
few hundred bytes in size per credential across a population of
hundreds of millions of <a>holders</a>.
Expand All @@ -222,7 +222,7 @@ <h2>Introduction</h2>
constructed for 100,000 <a>verifiable credentials</a> that is roughly
12,500 bytes in size in the worst case. In a case where a few hundred
credentials have been revoked, the size of the list is less than a
few hundred bytes while providing privacy in a herd of 100,000 individuals.
few hundred bytes while providing privacy in a group of 100,000 individuals.
</p>

<section class="informative">
Expand Down Expand Up @@ -255,8 +255,8 @@ <h3>Conceptual Framework</h3>
Another benefit of using a bitstring is that it enables large numbers of
<a>verifiable credential</a> statuses to be placed in the same list.
This specification uses a minimum list length of 131,072. This
size ensures an adequate amount of herd privacy in the average case.
If better herd privacy is required, the bitstring can be made larger.
size ensures an adequate amount of group privacy in the average case.
If better group privacy is required, the bitstring can be made larger.
</p>

<figure id="bitstring">
Expand Down Expand Up @@ -1061,7 +1061,7 @@ <h3>Revocation Bitstring Length</h3>
<p>
This document specifies a minimum revocation bitstring length of 131,072, or
16KB uncompressed. This is enough to give <a>holders</a> an adequate amount of
herd privacy if the number of verifiable credentials issued is large enough.
group privacy if the number of verifiable credentials issued is large enough.
However, if the number of issued verifiable credentials is a small population,
the ability to correlate an individual increases because the number of allocated
slots in the bitstring is small. Correlating this information with, for example,
Expand Down Expand Up @@ -1098,20 +1098,20 @@ <h3>Content Distribution Networks</h3>
<section class="informative">
<h3>Malicious Issuers and Verifiers</h3>
<p>
In general, the herd privacy protections offered by this specification can be
In general, the group privacy protections offered by this specification can be
circumvented by malicious <a>issuers</a> and <a>verifiers</a>. Its privacy
benefits can only be realized when issuers and verifiers intend to avoid
tracking or sharing the presentation of particular credentials.
</p>
<p>
A malicious <a>issuer</a> might intentionally attack herd privacy by creating a
unique status list per credential issued in order to establish a 1-1 mapping to track
A malicious <a>issuer</a> might intentionally attack group privacy by creating a
unique status list per credential issued in order to establish a one-to-one mapping to track
when a <a>verifier</a> processes a specific credential. Similarly, they could establish
another a 1-1 mapping by using a different cryptographic key for every credential
another a one-to-one mapping by using a different cryptographic key for every credential
issued that is tracked in a status list.
</p>
<p>
A malicious <a>verifier</a> might intentionally attack herd privacy by sharing
A malicious <a>verifier</a> might intentionally attack group privacy by sharing
information from presented credentials with a malicious <a>issuer</a>.
</p>
</section>
Expand Down
Loading