Designated-Verifier Anonymous Credential for Identity Management in Decentralized Systems

被引:0
|
作者
Deng, Xudong [1 ]
Tian, Chengliang [1 ]
Chen, Fei [1 ]
Xian, Hequn [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Peoples R China
基金
中国国家自然科学基金;
关键词
This work was supported by National Natural Science Foundation of China (61702294); Applied Basic Research Project of Qingdao City (17-1-1-10-jch);
D O I
10.1155/2021/2807395
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Most of the existing identity management is the centralized architecture that has to validate, certify, and manage identity in a centralized approach by trusted authorities. Decentralized identity is causing widespread public concern because it enables to give back control of identity to clients, and the client then has the ability to control when, where, and with whom they share their credentials. A decentralized solution atop on blockchain will bypass the centralized architecture and address the single point of the failure problem. To our knowledge, blockchain is an inherited pseudonym but it cannot achieve anonymity and auditability directly. In this paper, we approach the problem of decentralized identity management starting from the designated-verifier anonymous credential (DVAC in short). DVAC would assist to build a new practical decentralized identity management with anonymity and auditability. Apart from the advantages of the conventional anonymous credential, the main advantage of the proposed DVAC atop blockchain is that the issued cryptographic token will be divided into shares at the issue phase and will be combined at the showing credential phase. Further, the smooth projective hash function (SPHF in short) is regarded as a designated-verifier zero-knowledge proof system. Thus, we introduce the SPHF to achieve the designated verifiability without compromising the privacy of clients. Finally, the security of the proposed DVAC is proved along with theoretical and experimental evaluations.
引用
收藏
页数:15
相关论文
共 50 条
  • [21] Designated-Verifier Provable Data Possession in Public Cloud Storage
    Ren, Yongjun
    Xu, Jiang
    Wang, Jin
    Kim, Jeong-Uk
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (06): : 11 - 19
  • [22] Generic constructions for universal designated-verifier signatures and identity-based signatures from standard signatures
    Shahandashti, S. F.
    Safavi-Naini, R.
    [J]. IET INFORMATION SECURITY, 2009, 3 (04) : 152 - 176
  • [23] RETRACT: Expressive Designated Verifier Anonymous Credentials
    Debes, Heini Bergsson
    Giannetsos, Thanassis
    [J]. 18TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY & SECURITY, ARES 2023, 2023,
  • [24] Universal designated-verifier proxy blind signatures for E-commerce
    Cao, TJ
    Lin, DD
    Xue, R
    [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, PT 2, PROCEEDINGS, 2005, 3802 : 1036 - 1041
  • [25] Shorter and Faster Post-Quantum Designated-Verifier zkSNARKs from Lattices
    Ishai, Yuval
    Su, Hang
    Wu, David J.
    [J]. CCS '21: PROCEEDINGS OF THE 2021 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2021, : 212 - 234
  • [26] Anonymous attribute-based designated verifier signature
    Blazy, Olivier
    Brouilhet, Laura
    Conchon, Emmanuel
    Klingler, Mathieu
    [J]. JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2022, 14 (10) : 1 - 11
  • [27] Anonymous yet Traceable Strong Designated Verifier Signature
    Kuchta, Veronika
    Sahu, Rajeev Anand
    Saraswat, Vishal
    Sharma, Gaurav
    Sharma, Neetu
    Markowitch, Olivier
    [J]. INFORMATION SECURITY (ISC 2018), 2018, 11060 : 403 - 421
  • [28] Anonymous attribute-based designated verifier signature
    Olivier Blazy
    Laura Brouilhet
    Emmanuel Conchon
    Mathieu Klingler
    [J]. Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 1 - 11
  • [29] A Certificate Revocable Anonymous Authentication Scheme with Designated Verifier
    Emura, Keita
    Miyaji, Atsuko
    Omote, Kazumasa
    [J]. 2009 INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY (ARES), VOLS 1 AND 2, 2009, : 769 - 773
  • [30] Designated-verifier proxy signatures for e-commerce from bilinear pairings
    Li, XX
    Chen, KF
    Li, SQ
    [J]. ICCC2004: PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION VOL 1AND 2, 2004, : 1249 - 1252