Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data

被引:7
作者
Cho, Kang Woo [1 ]
Jeong, Byeong-Gyu [1 ]
Shi, Sang Uk [2 ]
机构
[1] Pukyong Natl Univ, Dept Informat Secur, Busan, South Korea
[2] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan, South Korea
基金
新加坡国家研究基金会;
关键词
blockchain; decentralized SSI; verifiable credential; credit scoring; fintech; SYSTEM;
D O I
10.1587/transinf.2021NGP0006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The continuous development of the mobile computing environment has led to the emergence of fintech to enable convenient financial transactions in this environment. Previously proposed financial identity services mostly adopted centralized servers that are prone to single-point-of-failure problems and performance bottlenecks. Blockchain-based self-sovereign identity (SSI), which emerged to address this problem, is a technology that solves centralized problems and allows decentralized identification. However, the verifiable credential (VC), a unit of SSI data transactions, guarantees unlimited right to erasure for self-sovereignty. This does not suit the specificity of the financial transaction network, which requires the restriction of the right to erasure for credit evaluation. This paper proposes a model for VC generation and revocation verification for credit scoring data. The proposed model includes double zero knowledge - succinct non-interactive argument of knowledge (zk-SNARK) proof in the VC generation process between the holder and the issuer. In addition, cross-revocation verification takes place between the holder and the verifier. As a result, the proposed model builds a trust platform among the holder, issuer, and verifier while maintaining the decentralized SSI attributes and focusing on the VC life cycle. The model also improves the way in which credit evaluation data are processed as VCs by granting opt-in and the special right to erasure.
引用
收藏
页码:1857 / 1868
页数:12
相关论文
共 29 条
[1]   Ligero: Lightweight Sublinear Arguments Without a Trusted Setup [J].
Ames, Scott ;
Hazay, Carmit ;
Ishai, Yuval ;
Venkitasubramaniam, Muthuramakrishnan .
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2017, :2087-2104
[2]   PrivBox: Verifiable decentralized reputation system for online marketplaces [J].
Azad, Muhammad Ajmal ;
Bag, Samiran ;
Hao, Feng .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2018, 89 :44-57
[3]  
Bitansky N, 2013, LECT NOTES COMPUT SC, V7785, P315, DOI 10.1007/978-3-642-36594-2_18
[4]  
Blum Manuel, 2019, Providing sound foundations for cryptography: on the work of Shafi Goldwasser and Silvio Micali, P329
[5]  
Camenisch J, 2003, LECT NOTES COMPUT SC, V2576, P268
[6]  
Chakraborty S, 2019, INT CONF ADV COMMUN, P56, DOI [10.23919/icact.2019.8701926, 10.23919/ICACT.2019.8701926]
[7]  
Council of the European Union, 2016, REGULATION EU 201667
[8]  
Gabizon A, EXPLAINING SNARKS
[9]   A survey on FinTech [J].
Gai, Keke ;
Qiu, Meikang ;
Sun, Xiaotong .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2018, 103 :262-273
[10]   THE KNOWLEDGE COMPLEXITY OF INTERACTIVE PROOF SYSTEMS [J].
GOLDWASSER, S ;
MICALI, S ;
RACKOFF, C .
SIAM JOURNAL ON COMPUTING, 1989, 18 (01) :186-208