A Blockchain-Based Digital Identity System with Privacy, Controllability, and Auditability

被引:2
作者
Song, Zhiming [1 ,2 ,3 ]
Yan, Enhua [1 ]
Song, Junrong [1 ]
Jiang, Rong [1 ,2 ]
Yu, Yimin [1 ]
Chen, Taowei [1 ]
机构
[1] Yunnan Univ Finance & Econ, Intelligent Applicat Res Inst, Kunming, Yunnan, Peoples R China
[2] Yunnan Key Lab Serv Comp, Kunming, Peoples R China
[3] Yuxi Normal Univ, Yunnan Key Lab Smart City Cyberspace Secur, Yuxi, Peoples R China
关键词
Blockchain; Digital identity; Privacy protection; Controllability; Auditability; LINKABLE RING SIGNATURES; ACCUMULATORS; FRAMEWORK; SCHEME;
D O I
10.1007/s13369-024-09178-0
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
The blockchain-based digital identity system (BDIS) has emerged as a promising alternative to centralized digital identity systems. While BDISs offer numerous advantages such as decentralization and enhanced security, traditional implementations still exhibit weaknesses in ensuring identity authenticity, controllability, and auditability while maintaining privacy. This paper aims to address these challenges by proposing novel approaches. It separates the functions of verifying physical identity and issuing digital credentials into two distinct roles: the identity verifier and the credential provider, employing linkable ring signatures to obscure the verifier's identity and significantly mitigate the risk of identity information leakage-a common issue in traditional schemes where a single entity performs both tasks. Additionally, this paper addresses the overlooked aspect of identity controllability in traditional schemes, especially proactive and passive revocation with privacy in mind, by integrating cryptographic commitments, zero-knowledge proofs, PS randomized signatures, cryptographic accumulators, and AES encryption. This approach ensures privacy while enabling both types of revocation. Furthermore, it tackles the neglected auditability of identity privacy in traditional schemes by combining linkable ring signatures with smart contract events and other technologies, ensuring auditable privacy protection. Fourth, a blockchain smart contract is utilized to manage system parameters and implement on-chain verification of privacy-protected identities, ensuring cross-platform capability, transparent verification, and resilience against single-point failures. A use case is provided, evaluating the system's performance. Comparative analysis and security discussions suggest that the proposed system rectifies deficiencies in current BDISs and offers improved applicability, execution performance, and security.
引用
收藏
页码:7027 / 7051
页数:25
相关论文
共 62 条
[21]   An access control model for medical big data based on clustering and risk [J].
Jiang, Rong ;
Han, Shanshan ;
Yu, Yimin ;
Ding, Weiping .
INFORMATION SCIENCES, 2023, 621 :691-707
[22]   Medical big data access control model based on UPHFPR and evolutionary game [J].
Jiang, Rong ;
Han, Shanshan ;
Zhang, Ying ;
Chen, Taowei ;
Song, Junrong .
ALEXANDRIA ENGINEERING JOURNAL, 2022, 61 (12) :10659-10675
[23]   A trust transitivity model of small and medium-sized manufacturing enterprises under blockchain-based supply chain finance [J].
Jiang, Rong ;
Kang, Yuanjie ;
Liu, Yongsong ;
Liang, Zhihong ;
Duan, Yunlong ;
Sun, Yani ;
Liu, Jialan .
INTERNATIONAL JOURNAL OF PRODUCTION ECONOMICS, 2022, 247
[24]   A medical big data access control model based on fuzzy trust prediction and regression analysis [J].
Jiang, Rong ;
Xin, Yang ;
Chen, Zhenxing ;
Zhang, Ying .
APPLIED SOFT COMPUTING, 2022, 117
[25]  
Khovratovich D., 2017, GITHUB COMMIT JASONA, V17, P41
[26]  
Lee J., 2021, Cryptology ePrint Archive
[27]  
Liu JK, 2005, LECT NOTES COMPUT SC, V3481, P614
[28]  
Lundkvist C., 2017, Uport: a Platform for Self-Sovereign Identity
[29]  
Mohammed, 2019, INT J INNOV ENG RES, V6, P86
[30]  
Nguyen L, 2005, LECT NOTES COMPUT SC, V3376, P275