Decentralized Identity Authentication with Auditability and Privacy

نویسندگان

چکیده

Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, providers. However, when user credentials are compromised, it is impossible in existing DID for the detect credential misuse. In this paper, we propose new authentication protocols with two properties: auditability and privacy. The former enables detection of malicious events, while latter prevents an adversary from linking event corresponding service provider. We present that achieve varying privacy performance guarantees. first protocol has high performance, but reveals information about user. second achieves privacy, incurs a higher overhead. formal security analysis our privacy-preserving Tamarin prover. implemented them evaluated permissioned deployed Amazon AWS local cloud infrastructure. results demonstrate able support realistic workloads, nearly practical.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

Most of today’s authentication schemes involve verifying the identity of a principal in some way. This process is commonly known as entity authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity authentication may not be sufficient or even appropriate, especially if a principal’s privacy is to be protected. In order to preserve privacy, o...

متن کامل

Authentication and Privacy

Authentication and privacy refer to the problems of ensuring that communication takes place only between the right parties without disclosure of information to unauthorized eavesdroppers. Radio communication is highly appealing for the convenience of mobility—the freedom from a fixed location. For this reason, wireless services have been growing rapidly. In 2005, an ITU study found more than 2 ...

متن کامل

Privacy Protecting Biometric Authentication Systems Privacy Protecting Biometric Authentication Systems

Privacy Protecting Biometric Authentication Systems As biometrics gains popularity and proliferates into the daily life, there is an increased concern over the loss of privacy and potential misuse of biometric data held in central repositories. The major concerns are about i) the use of biometrics to track people, ii) non-revocability of biometrics (eg. if a fingerprint is compromised it can no...

متن کامل

Enigma: Decentralized Computation Platform with Guaranteed Privacy

A peer-to-peer network, enabling different parties to jointly store and run computations on data while keeping the data completely private. Enigma’s computational model is based on a highly optimized version of secure multi-party computation, guaranteed by a verifiable secret-sharing scheme. For storage, we use a modified distributed hashtable for holding secret-shared data. An external blockch...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Algorithms

سال: 2022

ISSN: ['1999-4893']

DOI: https://doi.org/10.3390/a16010004