Decentralized Identity Authentication with Auditability and Privacy

被引:6
|
作者
Alangot, Bithin [1 ]
Szalachowski, Pawel [1 ]
Dinh, Tien Tuan Anh [1 ]
Meftah, Souhail [2 ]
Gana, Jeff Ivanos [2 ]
Aung, Khin Mi Mi [2 ]
Li, Zengpeng [3 ]
机构
[1] Singapore Univ Technol & Design SUTD, Dept Informat Syst Technol & Design ISTD, Singapore 487372, Singapore
[2] ASTAR, Inst Infocomm Res I2R, Singapore 138632, Singapore
[3] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
关键词
blockchain; decentralized identity; authentication; auditability; privacy;
D O I
10.3390/a16010004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it is impossible in existing DID systems for the users to detect credential misuse. In this paper, we propose new DID authentication protocols with two properties: auditability and privacy. The former enables the detection of malicious authentication events, while the latter prevents an adversary from linking an authentication event to the corresponding user and service provider. We present two protocols that achieve auditability with varying privacy and performance guarantees. The first protocol has high performance, but it reveals information about the user. The second protocol achieves full privacy, but it incurs a higher performance overhead. We present a formal security analysis of our privacy-preserving protocols by using the Tamarin prover. We implemented them and evaluated their performance with a permissioned blockchain deployed over the Amazon AWS and a local cloud infrastructure. The results demonstrate that the first protocol is able to support realistic authentication workloads, while the second is nearly practical.
引用
收藏
页数:25
相关论文
共 50 条
  • [31] Privacy and Auditability in the Local Energy Market of an Energy Community with Homomorphic Encryption
    Strepparava, Davide
    Rosato, Federico
    Nespoli, Lorenzo
    Medici, Vasco
    ENERGIES, 2022, 15 (15)
  • [32] Enhanced Security Identity-Based Privacy-Preserving Authentication Scheme Supporting Revocation for VANETs
    Wang, Yimin
    Zhong, Hong
    Xu, Yan
    Cui, Jie
    Wu, Ge
    IEEE SYSTEMS JOURNAL, 2020, 14 (04): : 5373 - 5383
  • [33] A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data
    Gilani, Komal
    Bertin, Emmanuel
    Hatin, Julien
    Crespi, Noel
    2020 2ND CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2020, : 97 - 101
  • [34] A Privacy-Preserving and Scalable Authentication Protocol for the Internet of Vehicles
    Aman, Muhammad Naveed
    Javaid, Uzair
    Sikdar, Biplab
    IEEE INTERNET OF THINGS JOURNAL, 2021, 8 (02) : 1123 - 1139
  • [35] A decentralized lightweight blockchain-based authentication mechanism for IoT systems
    Khalid, Umair
    Asim, Muhammad
    Baker, Thar
    Hung, Patrick C. K.
    Tariq, Muhammad Adnan
    Rafferty, Laura
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2020, 23 (03): : 2067 - 2087
  • [36] A comprehensive survey on authentication and privacy-preserving schemes in VANETs
    Mundhe, Pravin
    Verma, Shekhar
    Venkatesan, S.
    COMPUTER SCIENCE REVIEW, 2021, 41
  • [37] Ensuring Security and Privacy in VANET: A Comprehensive Survey of Authentication Approaches
    Soujanya, B. K.
    Azam, Farooque
    JOURNAL OF COMPUTER NETWORKS AND COMMUNICATIONS, 2024, 2024
  • [38] A Blockchain Based Decentralized Authentication Framework for Resource Constrained IOT devices
    Panda, Soumyashree S.
    Satapathy, Utkalika
    Mohanta, Bhabendu K.
    Jena, Debasish
    Gountia, Debasis
    2019 10TH INTERNATIONAL CONFERENCE ON COMPUTING, COMMUNICATION AND NETWORKING TECHNOLOGIES (ICCCNT), 2019,
  • [39] DecAuth: Decentralized Authentication Scheme for IoT Device Using Ethereum Blockchain
    Mohanta, Bhabendu K.
    Sahoo, Anisha
    Patel, Shibasis
    Panda, Soumyashree S.
    Jena, Debasish
    Gountia, Debasis
    PROCEEDINGS OF THE 2019 IEEE REGION 10 CONFERENCE (TENCON 2019): TECHNOLOGY, KNOWLEDGE, AND SOCIETY, 2019, : 558 - 563
  • [40] Identity Privacy Preserving Biometric Based Authentication Scheme for Naked Healthcare Environment
    Kumar, Tanesh
    Braeken, An
    Liyanage, Madhusanka
    Ylianttila, Mika
    2017 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2017,