DecentID: Decentralized and Privacy-preserving Identity Storage System using Smart Contracts

被引:13
作者
Friebe, Sebastian [1 ]
Sobik, Ingo [1 ,2 ]
Zitterbart, Martina [1 ]
机构
[1] KIT, Karlsruhe, Germany
[2] Esentri AG, Ettlingen, Germany
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
identity; decentralized; privacy; blockchain; sybil;
D O I
10.1109/TrustCom/BigDataSE.2018.00016
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Many Internet services require the registration of an account before permitting use of their services. Over time, many Internet users end up with a multitude of accounts with separated identities. A solution to this problem is offered by single-sign-on (SSO) providers, where a user can create a single identity and use this identity for multiple services. However it requires the user to trust the SSO provider. When the provider blocks access to the identities the users lose access to their subscribed services. To avoid this problem, we propose DecentID, a completely decentralized identity storage system that does not require a centralized trusted third party. Instead, a public blockchain is used as trust anchor. Identities can be created and used for different services. Each service can only read the identity attributes disclosed for it without being able to read attributes the user wants to keep secret.
引用
收藏
页码:37 / 42
页数:6
相关论文
共 9 条
[1]  
Ali M, 2016, PROCEEDINGS OF USENIX ATC '16: 2016 USENIX ANNUAL TECHNICAL CONFERENCE, P181
[2]  
Buterin V., 2014, CISC VIS NETW IND GL, V3, P2, DOI [10.5663/aps.v1i1.10138, DOI 10.5663/APS.V1I1.10138]
[3]  
Cantor S., 2015, TECH REP
[4]   The Sybil attack [J].
Douceur, JR .
PEER-TO-PEER SYSTEMS, 2002, 2429 :251-260
[5]  
Lundkvist D. C., 2017, UPORT PLATFORM SELF
[6]  
Nakamoto S, 2009, BITCOIN PEER TO PEER
[7]  
Neuman C., 2005, Internet Engineering Task Force (IETF)
[8]  
Recordon D., 2006, Proceedings of the second ACM workshop on Digital identity management, P11, DOI 10.1145/1179529.1179532
[9]   Decentralizing Privacy: Using Blockchain to Protect Personal Data [J].
Zyskind, Guy ;
Nathan, Oz ;
Pentland, Alex 'Sandy' .
2015 IEEE SECURITY AND PRIVACY WORKSHOPS (SPW), 2015, :180-184