Decentralized Identity Authentication with Auditability and Privacy

被引:6
|
作者
Alangot, Bithin [1 ]
Szalachowski, Pawel [1 ]
Dinh, Tien Tuan Anh [1 ]
Meftah, Souhail [2 ]
Gana, Jeff Ivanos [2 ]
Aung, Khin Mi Mi [2 ]
Li, Zengpeng [3 ]
机构
[1] Singapore Univ Technol & Design SUTD, Dept Informat Syst Technol & Design ISTD, Singapore 487372, Singapore
[2] ASTAR, Inst Infocomm Res I2R, Singapore 138632, Singapore
[3] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
关键词
blockchain; decentralized identity; authentication; auditability; privacy;
D O I
10.3390/a16010004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it is impossible in existing DID systems for the users to detect credential misuse. In this paper, we propose new DID authentication protocols with two properties: auditability and privacy. The former enables the detection of malicious authentication events, while the latter prevents an adversary from linking an authentication event to the corresponding user and service provider. We present two protocols that achieve auditability with varying privacy and performance guarantees. The first protocol has high performance, but it reveals information about the user. The second protocol achieves full privacy, but it incurs a higher performance overhead. We present a formal security analysis of our privacy-preserving protocols by using the Tamarin prover. We implemented them and evaluated their performance with a permissioned blockchain deployed over the Amazon AWS and a local cloud infrastructure. The results demonstrate that the first protocol is able to support realistic authentication workloads, while the second is nearly practical.
引用
收藏
页数:25
相关论文
共 50 条
  • [21] A comprehensive survey on security, privacy and authentication in blockchain
    Alghamdi, Turki Ali
    Javaid, Nadeem
    INTERNATIONAL JOURNAL OF WEB AND GRID SERVICES, 2023, 19 (03) : 259 - 286
  • [22] Decentralized Identity Authentication Mechanism: Integrating FIDO and Blockchain for Enhanced Security
    Ou, Hsia-Hung
    Pan, Chien-Hsiu
    Tseng, Yang-Ming
    Lin, Iuon-Chang
    APPLIED SCIENCES-BASEL, 2024, 14 (09):
  • [23] Cloud-Assisted Mobile-Access of Health Data With Privacy and Auditability
    Tong, Yue
    Sun, Jinyuan
    Chow, Sherman S. M.
    Li, Pan
    IEEE JOURNAL OF BIOMEDICAL AND HEALTH INFORMATICS, 2014, 18 (02) : 419 - 429
  • [24] FutureDID: A Fully Decentralized Identity System With Multi-Party Verification
    Deng, Haotian
    Liang, Jinwen
    Zhang, Chuan
    Liu, Ximeng
    Zhu, Liehuang
    Guo, Song
    IEEE TRANSACTIONS ON COMPUTERS, 2024, 73 (08) : 2051 - 2065
  • [25] Decoupling Online Ride-Hailing Services: A Privacy Protection Scheme Based on Decentralized Identity
    Sun, Nigang
    Liu, Yuxuan
    Zhang, Yuanyi
    Liu, Yining
    ELECTRONICS, 2024, 13 (20)
  • [26] IDENTITY AND PRIVACY
    Sonntag, Michael
    DIGITALIZED ECONOMY, SOCIETY AND INFORMATION MANAGEMENT (IDIMT-2020), 2020, 49 : 315 - 324
  • [27] Ninja: Non identity based, privacy preserving authentication for ubiquitous environments
    Leung, Adrian
    Mitchell, Chris J.
    UBICOMP 2007: UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4717 : 73 - +
  • [28] PRIVACY PROTECTION FOR USER AUTHENTICATION
    Hajny, Jan
    Pelka, Tomas
    Zeman, Vaclav
    SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2010, : 90 - 93
  • [29] Secure Decentralized Identity Management using Blockchain
    Srivastava, Sandeep
    Agarwal, Deepshikha
    Chaurasia, Brijesh
    2023 IEEE 22ND INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, BIGDATASE, CSE, EUC, ISCI 2023, 2024, : 1355 - 1360
  • [30] CroAuth: A Cross-domain Authentication Scheme based on Blockchain and Decentralized Identity
    Zhang, Zinuo
    Xiong, Ruoting
    Di, Xinyu
    Ren, Wei
    PROCEEDINGS OF THE 2024 27 TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN, CSCWD 2024, 2024, : 2010 - 2015