Decentralized Identity Authentication with Auditability and Privacy

被引:6
|
作者
Alangot, Bithin [1 ]
Szalachowski, Pawel [1 ]
Dinh, Tien Tuan Anh [1 ]
Meftah, Souhail [2 ]
Gana, Jeff Ivanos [2 ]
Aung, Khin Mi Mi [2 ]
Li, Zengpeng [3 ]
机构
[1] Singapore Univ Technol & Design SUTD, Dept Informat Syst Technol & Design ISTD, Singapore 487372, Singapore
[2] ASTAR, Inst Infocomm Res I2R, Singapore 138632, Singapore
[3] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
关键词
blockchain; decentralized identity; authentication; auditability; privacy;
D O I
10.3390/a16010004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it is impossible in existing DID systems for the users to detect credential misuse. In this paper, we propose new DID authentication protocols with two properties: auditability and privacy. The former enables the detection of malicious authentication events, while the latter prevents an adversary from linking an authentication event to the corresponding user and service provider. We present two protocols that achieve auditability with varying privacy and performance guarantees. The first protocol has high performance, but it reveals information about the user. The second protocol achieves full privacy, but it incurs a higher performance overhead. We present a formal security analysis of our privacy-preserving protocols by using the Tamarin prover. We implemented them and evaluated their performance with a permissioned blockchain deployed over the Amazon AWS and a local cloud infrastructure. The results demonstrate that the first protocol is able to support realistic authentication workloads, while the second is nearly practical.
引用
收藏
页数:25
相关论文
共 50 条
  • [11] Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone
    Wang, Jiahe
    Wei, Songjie
    Liu, Haozhe
    BLOCKCHAIN - ICBC 2019, 2019, 11521 : 202 - 210
  • [12] Secure and Privacy-Preserving Authentication Scheme Using Decentralized Identifier in Metaverse Environment
    Kim, Myeonghyun
    Oh, Jihyeon
    Son, Seunghwan
    Park, Yohan
    Kim, Jungjoon
    Park, Youngho
    ELECTRONICS, 2023, 12 (19)
  • [13] A blockchain and signature based scheme for cross-domain authentication with decentralized identity
    Zhang, Zinuo
    Ren, Wei
    Zhang, Xianchao
    Sun, Yani
    Zhu, Tianqing
    Choo, Kim-Kwang Raymond
    COMPUTER STANDARDS & INTERFACES, 2025, 94
  • [14] Eisdspa: An Efficient and Secure Blockchain-Based Donation Scheme With Privacy Protection and Auditability
    Zhou, Yong
    Lei, Hong
    Bao, Zijian
    IEEE OPEN JOURNAL OF THE COMMUNICATIONS SOCIETY, 2024, 5 : 7498 - 7510
  • [15] Pribadi: A decentralized privacy-preserving authentication in wireless multimedia sensor networks for smart cities
    Goyat, Rekha
    Kumar, Gulshan
    Saha, Rahul
    Conti, Mauro
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (04): : 4823 - 4839
  • [16] DecentID: Decentralized and Privacy-preserving Identity Storage System using Smart Contracts
    Friebe, Sebastian
    Sobik, Ingo
    Zitterbart, Martina
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 37 - 42
  • [17] Blockchain-based Privacy Protection Unified Identity Authentication
    Zheng, Yue
    Li, Yarong
    Wang, Zhen
    Deng, Chunhua
    Luo, Yili
    Li, Yixin
    Ding, Jianwei
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 42 - 49
  • [18] Privacy and Authentication in VANETs
    Moni, Shafika Showkat
    Manivannan, D.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2020, 11 (02): : 98 - 124
  • [19] A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing
    Cao, Dan
    Zhao, Baokang
    Su, Jinshu
    Wang, Baosheng
    Wang, Xiaofeng
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1175 - 1188
  • [20] Class-Imbalance Privacy-Preserving Federated Learning for Decentralized Fault Diagnosis With Biometric Authentication
    Lu, Shixiang
    Gao, Zhiwei
    Xu, Qifa
    Jiang, Cuixia
    Zhang, Aihua
    Wang, Xiangxiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 9101 - 9111