Transforming face-to-face identity proofing into anonymous digital identity using the Bitcoin blockchain
نویسندگان
چکیده
The most fundamental purpose of blockchain technology is to enable persistent, consistent, distributed storage of information. Increasingly common are authentication systems that leverage this property to allow users to carry their personal data on a device while a hash of this data is signed by a trusted authority and then put on a blockchain to be compared against. For instance, in 2015, MIT introduced a schema for the publication of their academic certificates based on this principle. In this work, we propose a way for users to obtain assured identities based on face-to-face proofing that can then be validated against a record on a blockchain. Moreover, in order to provide anonymity, instead of storing a hash, we make use of a scheme of Brands to store a commitment against which one can perform zero-knowledge proofs of identity. We also enforce the confidentiality of the underlying data by letting users control a secret of their own. We show how our schema can be implemented on Bitcoin’s blockchain and how to save bandwidth by grouping commitments using Merkle trees to minimize the number of Bitcoin transactions that need to be sent. Finally, we describe a system in which users can gain access to services thanks to the identity records of our proposal.
منابع مشابه
Anonymous Identities for Permissioned Blockchains
In this paper we address the issue of retaining user anonymity within a permissioned blockchain. We present the ChainAnchor architecture that adds an identity and privacy-preserving layer above the blockchain, either the private blockchain or the public Blockchain in Bitcoin. ChainAnchor adds an anonymous identity verification step such that anyone can read and verify transactions from the bloc...
متن کاملVerifiable Anonymous Identities and Access Control in Permissioned Blockchains
In this paper we address the issue of identity and access control within shared permissioned blockchains. We propose the ChainAchor system that provides anonymous but verifiable identities for entities on the blockchain. ChainAchor also provides access control to entities seeking to submit transactions to the blockchain to read/verify transactions on the the permissioned blockchain. Consensus n...
متن کاملIdentity Chains
In this short technical summary, the authors describe how the mathematical primitives of Ring Confidential Transactions [Noe] may be used to provide anonymous identity authentication services in a similar manner to "Anonrep" [ZWC16] but in a trustless (or permissioned), distributed manner, and with the additional security and resilience provided by a blockchain. The use of the mathematics in th...
متن کاملBacking Rich Credentials with a Blockchain PKI∗
This is the second of a series of papers describing the results of a project whose goal was to identify five remote identity proofing solutions that can be used as alternatives to knowledge-based verification. This paper describes the second solution, which makes use of a rich credential adapted for use on a blockchain and backed by a blockchain PKI. A rich credential, also used in Solution 1, ...
متن کاملA User-Centric System for Verified Identities on the Bitcoin Blockchain
We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin’s decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- CoRR
دوره abs/1710.02951 شماره
صفحات -
تاریخ انتشار 2017