A Comprehensive Approach to User Delegation and Anonymity within Decentralized Identifiers for IoT

被引:0
作者
Kim, Taehoon [1 ]
Seo, Daehee [2 ]
Kim, Su-Hyun [3 ]
Lee, Im-Yeong [3 ]
机构
[1] Soonchunhyang Univ, Dept Software Convergence, Asan 31538, South Korea
[2] Sangmyung Univ, Fac Artificial Intelligence & Data Engn, Seoul 03016, South Korea
[3] Soonchunhyang Univ, Dept Comp Software Engn, Asan 31538, South Korea
关键词
decentralized identifier; delegation; anonymity; sequential aggregate signature; non-interactive zero-knowledge proof; PROVABLY SECURE; BLOCKCHAIN; GOVERNANCE; SIGNATURES;
D O I
10.3390/s24072215
中图分类号
O65 [分析化学];
学科分类号
070302 ; 081704 ;
摘要
Decentralized Identifiers have recently expanded into Internet of Things devices and are crucial in securing users' digital identities and data. However, Decentralized Identifiers face challenges in scenarios necessitating authority delegation and anonymity, such as when dealing with legal guardianship for minors, device loss or damage, and specific medical contexts involving patient information. This paper aims to strengthen data sovereignty within the Decentralized Identifier system by implementing a secure authority delegation and anonymity scheme. It suggests optimizing verifiable presentations by utilizing a sequential aggregate signature, a Non-Interactive Zero-Knowledge Proof, and a Merkle tree to prevent against linkage and Sybil attacks while facilitating delegation. This strategy mitigates security risks related to delegation and anonymity, efficiently reduces the computational and verification efforts for signatures, and reduces the size of verifiable presentations by about 1.2 to 2 times.
引用
收藏
页数:20
相关论文
共 37 条
  • [1] HealthBlock: A Framework for a Collaborative Sharing of Electronic Health Records Based on Blockchain
    Abdelgalil, Leina
    Mejri, Mohamed
    [J]. FUTURE INTERNET, 2023, 15 (03):
  • [2] Abe M., 1999, P ADV CRYPTOLOGY CRY
  • [3] Anaigoundanpudur K.N., 2021, Masters Thesis
  • [4] Avellaneda O., 2019, IEEE Communications Standards Magazine, V3, P10, DOI [10.1109/MCOMSTD.2019.9031542, DOI 10.1109/MCOMSTD.2019.9031542]
  • [5] Begum N., 2020, P 2020 8 INT S COMPU
  • [6] Bhargavan K., 2014, P ADV CRYPTOLOGY CRY
  • [7] Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
  • [8] Bosk D., 2022, P PRIV ENHANCING TEC, V2022, P571, DOI [10.56553/popets-2022-0123, DOI 10.56553/POPETS-2022-0123]
  • [9] Improved Identity Management with Verifiable Credentials and FIDO
    Chadwick D.W.
    Laborde R.
    Oglaza A.
    Venant R.
    Wazan S.
    Nijjar M.
    [J]. IEEE Communications Standards Magazine, 2019, 3 (04): : 14 - 20
  • [10] Decentralized and Self-Sovereign Identity: Systematic Mapping Study
    Cucko, Spela
    Turkanovic, Muhamed
    [J]. IEEE ACCESS, 2021, 9 : 139009 - 139027