A Blockchain-Based Digital Identity System with Privacy, Controllability, and Auditability

被引:0
作者
Song, Zhiming [1 ,2 ,3 ]
Yan, Enhua [1 ]
Song, Junrong [1 ]
Jiang, Rong [1 ,2 ]
Yu, Yimin [1 ]
Chen, Taowei [1 ]
机构
[1] Yunnan Univ Finance & Econ, Intelligent Applicat Res Inst, Kunming, Yunnan, Peoples R China
[2] Yunnan Key Lab Serv Comp, Kunming, Peoples R China
[3] Yuxi Normal Univ, Yunnan Key Lab Smart City Cyberspace Secur, Yuxi, Peoples R China
关键词
Blockchain; Digital identity; Privacy protection; Controllability; Auditability; LINKABLE RING SIGNATURES; ACCUMULATORS; FRAMEWORK; SCHEME;
D O I
10.1007/s13369-024-09178-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The blockchain-based digital identity system (BDIS) has emerged as a promising alternative to centralized digital identity systems. While BDISs offer numerous advantages such as decentralization and enhanced security, traditional implementations still exhibit weaknesses in ensuring identity authenticity, controllability, and auditability while maintaining privacy. This paper aims to address these challenges by proposing novel approaches. It separates the functions of verifying physical identity and issuing digital credentials into two distinct roles: the identity verifier and the credential provider, employing linkable ring signatures to obscure the verifier's identity and significantly mitigate the risk of identity information leakage-a common issue in traditional schemes where a single entity performs both tasks. Additionally, this paper addresses the overlooked aspect of identity controllability in traditional schemes, especially proactive and passive revocation with privacy in mind, by integrating cryptographic commitments, zero-knowledge proofs, PS randomized signatures, cryptographic accumulators, and AES encryption. This approach ensures privacy while enabling both types of revocation. Furthermore, it tackles the neglected auditability of identity privacy in traditional schemes by combining linkable ring signatures with smart contract events and other technologies, ensuring auditable privacy protection. Fourth, a blockchain smart contract is utilized to manage system parameters and implement on-chain verification of privacy-protected identities, ensuring cross-platform capability, transparent verification, and resilience against single-point failures. A use case is provided, evaluating the system's performance. Comparative analysis and security discussions suggest that the proposed system rectifies deficiencies in current BDISs and offers improved applicability, execution performance, and security.
引用
收藏
页码:7027 / 7051
页数:25
相关论文
共 62 条
  • [11] Camenisch J., 2002, P 9 ACM C COMP COMM, P21, DOI [DOI 10.1145/586110.586114, 10.1145/586110.586114]
  • [12] Derler David, 2015, Topics in Cryptology - CT-RSA 2015. The Cryptographers' Track at the RSA Conference 2015. Proceedings: LNCS 9048, P127, DOI 10.1007/978-3-319-16715-2_7
  • [13] Diebold Z., 2017, SELF SOVEREIGN IDENT
  • [14] Ethereum Foundation, 2023, Web3.py
  • [15] A Comprehensive Formal Security Analysis of OAuth 2.0
    Fett, Daniel
    Kuesters, Ralf
    Schmitz, Guido
    [J]. CCS'16: PROCEEDINGS OF THE 2016 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2016, : 1204 - 1215
  • [16] Gao WC, 2018, 2018 27TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND NETWORKS (ICCCN)
  • [17] GitHub, 2019, Implementation of elliptic curve operations on G2 for altbn128 in Solidity
  • [18] TrailChain: Traceability of data ownership across blockchain-enabled multiple marketplaces
    Gupta, Pooja
    Dedeoglu, Volkan
    Kanhere, Salil S.
    Jurdak, Raja
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 203
  • [19] Gupta S., 2021, Multimedia Security: Algorithms for Intelligent Systems book series (AIS), P269, DOI [10.1007/978-981-15-8711-5_14, DOI 10.1007/978-981-15-8711-5_14]
  • [20] Ingram David, 2018, Reuters