Decentralized Identity Authentication with Auditability and Privacy

被引:6
|
作者
Alangot, Bithin [1 ]
Szalachowski, Pawel [1 ]
Dinh, Tien Tuan Anh [1 ]
Meftah, Souhail [2 ]
Gana, Jeff Ivanos [2 ]
Aung, Khin Mi Mi [2 ]
Li, Zengpeng [3 ]
机构
[1] Singapore Univ Technol & Design SUTD, Dept Informat Syst Technol & Design ISTD, Singapore 487372, Singapore
[2] ASTAR, Inst Infocomm Res I2R, Singapore 138632, Singapore
[3] Shandong Univ, Sch Cyber Sci & Technol, Qingdao 266237, Peoples R China
关键词
blockchain; decentralized identity; authentication; auditability; privacy;
D O I
10.3390/a16010004
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it is impossible in existing DID systems for the users to detect credential misuse. In this paper, we propose new DID authentication protocols with two properties: auditability and privacy. The former enables the detection of malicious authentication events, while the latter prevents an adversary from linking an authentication event to the corresponding user and service provider. We present two protocols that achieve auditability with varying privacy and performance guarantees. The first protocol has high performance, but it reveals information about the user. The second protocol achieves full privacy, but it incurs a higher performance overhead. We present a formal security analysis of our privacy-preserving protocols by using the Tamarin prover. We implemented them and evaluated their performance with a permissioned blockchain deployed over the Amazon AWS and a local cloud infrastructure. The results demonstrate that the first protocol is able to support realistic authentication workloads, while the second is nearly practical.
引用
收藏
页数:25
相关论文
共 50 条
  • [41] DecentID: Decentralized and Privacy-preserving Identity Storage System using Smart Contracts
    Friebe, Sebastian
    Sobik, Ingo
    Zitterbart, Martina
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 37 - 42
  • [42] Trajectory as an Identity: Privacy-Preserving and Sybil-Resistant Authentication for Internet of Vehicles
    Li, Jiangtao
    Song, Zhaoheng
    Li, Yufeng
    Cao, Chenhong
    He, Yuanhang
    SECURITY AND COMMUNICATION NETWORKS, 2021, 2021
  • [43] Privacy and Authentication in VANETs
    Moni, Shafika Showkat
    Manivannan, D.
    INTERNATIONAL JOURNAL OF NEXT-GENERATION COMPUTING, 2020, 11 (02): : 98 - 124
  • [44] SEPSI: A Secure and Efficient Privacy-Preserving Set Intersection with Identity Authentication in IoT
    Liu, Bai
    Zhang, Xiangyi
    Shi, Runhua
    Zhang, Mingwu
    Zhang, Guoxing
    MATHEMATICS, 2022, 10 (12)
  • [45] FBIA: A Fog-Based Identity Authentication Scheme for Privacy Preservation in Internet of Vehicles
    Song, Liangjun
    Sun, Gang
    Yu, Hongfang
    Du, Xiaojiang
    Guizani, Mohsen
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2020, 69 (05) : 5403 - 5415
  • [46] A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing
    Cao, Dan
    Zhao, Baokang
    Su, Jinshu
    Wang, Baosheng
    Wang, Xiaofeng
    MATHEMATICAL AND COMPUTER MODELLING, 2013, 58 (5-6) : 1175 - 1188
  • [47] A designated private set based trapdoor authentication scheme for privacy preserving trust management in decentralized systems
    Hong, Hanshu
    Sun, Yibo
    Sun, Zhixin
    DISCOVER COMPUTING, 2024, 27 (01)
  • [48] Class-Imbalance Privacy-Preserving Federated Learning for Decentralized Fault Diagnosis With Biometric Authentication
    Lu, Shixiang
    Gao, Zhiwei
    Xu, Qifa
    Jiang, Cuixia
    Zhang, Aihua
    Wang, Xiangxiang
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2022, 18 (12) : 9101 - 9111
  • [49] A privacy-aware authentication and usage-controlled access protocol for IIoT decentralized data marketplace
    Dixit, Akanksha
    Zarpelao, Bruno Bogaz
    Smith-Creasey, Max
    Rajarajan, Muttukrishnan
    COMPUTERS & SECURITY, 2024, 146
  • [50] Cross trust: A decentralized MA-ABE mechanism for cross-border identity authentication
    Chen, Jian
    Lu, Fei
    Liu, Yuanzhe
    Peng, Sheng
    Cai, Zhiming
    Mo, Fu
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2024, 44