reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption

被引:22
作者
Schanzenbach, Martin [1 ]
Bramm, Georg [1 ]
Schuette, Julian [1 ]
机构
[1] Fraunhofer AISEC, Garching, Germany
来源
2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE) | 2018年
关键词
identity and access management; peer-to-peer; privacy; decentralisation; name systems; attribute-based encryption;
D O I
10.1109/TrustCom/BigDataSE.2018.00134
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing identity attributes without the need for a centralised service provider. We propose a design where user attributes are stored in and shared over a name system under user-owned namespaces. Attributes are encrypted using attribute-based encryption (ABE), allowing the user to selectively authorize and revoke access of requesting parties to subsets of his attributes. We present an implementation based on the decentralised GNU Name System (GNS) in combination with ciphertext-policy ABE using type-1 pairings. To show the practicality of our implementation, we carried out experimental evaluations of selected implementation aspects including attribute resolution performance. Finally, we show that our design can be used as a standard OpenID Connect Identity Provider allowing our implementation to be integrated into standard-compliant services.
引用
收藏
页码:946 / 957
页数:12
相关论文
共 24 条
[1]  
Agrawal S., FAME FAST ATTRIBUTE
[2]  
[Anonymous], 2002, P 9 ACM C COMPUTER C
[3]  
Ben-Sasson E, 2013, LECT NOTES COMPUT SC, V8043, P90, DOI 10.1007/978-3-642-40084-1_6
[4]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[5]  
Borgh J., 2017, 2017 Global Internet of Things Summit (GIoTS), P1, DOI DOI 10.1109/GIOTS.2017.8016277
[6]  
Borgh Joakim, 2016, ATTRIBUTE BASED ENCR
[7]  
Borisov Nikita., 2015, Proceedings on Privacy Enhancing Technologies PETS '15, V2015, P4
[8]  
Deibert R, 2012, INFORM REVOL GLOB PO, P1
[9]  
Evans N. S., 2011, Proceedings of the 2011 5th International Conference on Network and System Security (NSS 2011), P316, DOI 10.1109/ICNSS.2011.6060022
[10]   Pairings for cryptographers [J].
Galbraith, Steven D. ;
Paterson, Kenneth G. ;
Smart, Nigel P. .
DISCRETE APPLIED MATHEMATICS, 2008, 156 (16) :3113-3121