Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data

被引:7
作者
Cho, Kang Woo [1 ]
Jeong, Byeong-Gyu [1 ]
Shi, Sang Uk [2 ]
机构
[1] Pukyong Natl Univ, Dept Informat Secur, Busan, South Korea
[2] Pukyong Natl Univ, Dept IT Convergence & Applicat Engn, Busan, South Korea
基金
新加坡国家研究基金会;
关键词
blockchain; decentralized SSI; verifiable credential; credit scoring; fintech; SYSTEM;
D O I
10.1587/transinf.2021NGP0006
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The continuous development of the mobile computing environment has led to the emergence of fintech to enable convenient financial transactions in this environment. Previously proposed financial identity services mostly adopted centralized servers that are prone to single-point-of-failure problems and performance bottlenecks. Blockchain-based self-sovereign identity (SSI), which emerged to address this problem, is a technology that solves centralized problems and allows decentralized identification. However, the verifiable credential (VC), a unit of SSI data transactions, guarantees unlimited right to erasure for self-sovereignty. This does not suit the specificity of the financial transaction network, which requires the restriction of the right to erasure for credit evaluation. This paper proposes a model for VC generation and revocation verification for credit scoring data. The proposed model includes double zero knowledge - succinct non-interactive argument of knowledge (zk-SNARK) proof in the VC generation process between the holder and the issuer. In addition, cross-revocation verification takes place between the holder and the verifier. As a result, the proposed model builds a trust platform among the holder, issuer, and verifier while maintaining the decentralized SSI attributes and focusing on the VC life cycle. The model also improves the way in which credit evaluation data are processed as VCs by granting opt-in and the special right to erasure.
引用
收藏
页码:1857 / 1868
页数:12
相关论文
共 29 条
[21]  
Schröder D, 2011, LECT NOTES COMPUT SC, V6879, P298, DOI 10.1007/978-3-642-23822-2_17
[22]  
Sporny M., 2019, Verifiable credentials data model 1.0
[23]  
Steele O., W3C WORKING DRAFT
[24]   What the GDPR means for businesses [J].
Tankard C. .
Network Security, 2016, 2016 (06) :5-8
[25]   Deployment of a Blockchain-Based Self-Sovereign Identity [J].
Tokkink, Quinten S. ;
Pouwelse, Johan .
IEEE 2018 INTERNATIONAL CONGRESS ON CYBERMATICS / 2018 IEEE CONFERENCES ON INTERNET OF THINGS, GREEN COMPUTING AND COMMUNICATIONS, CYBER, PHYSICAL AND SOCIAL COMPUTING, SMART DATA, BLOCKCHAIN, COMPUTER AND INFORMATION TECHNOLOGY, 2018, :1336-1342
[27]  
Windley P., SOVRINTM PROTOCOL TO
[28]  
Windley Philip J, SOVRIN WORKS
[29]  
Zhu X, 2019, P 2 INT S BIG DAT AP, V1437, P1, DOI [10.1088/1742-6596/1437/1, DOI 10.1088/1742-6596/1437/1]