A new Privacy Preserving and Scalable Revocation Method for Self
Sovereign Identity -- The Perfect Revocation Method does not exist yet
- URL: http://arxiv.org/abs/2211.13041v1
- Date: Wed, 23 Nov 2022 15:49:57 GMT
- Title: A new Privacy Preserving and Scalable Revocation Method for Self
Sovereign Identity -- The Perfect Revocation Method does not exist yet
- Authors: Andreas Freitag
- Abstract summary: Most of the issued credentials need the possibility of revocation.
This paper gives an overview about the available revocation methods, including a survey to define requirements.
It highlights shortcomings of the methods and introduces a new revocation method called Linked Validity Verifiable Credentials.
- Score: 0.0
- License: http://creativecommons.org/licenses/by-nc-sa/4.0/
- Abstract: Digital Identities are playing an essential role in our digital lives. Today,
used Digital Identities are based on central architectures. Central Digital
Identity providers control and know our data and, thereby, our Identity. Self
Sovereign Identities (SSI) are based on a decentralized data storage and data
exchange architecture, where the user is in sole control of his data and
identity. Most of the issued credentials need the possibility of revocation.
For a Central Digital Identity, revocation is easy. In decentral architectures,
revocation is more challenging. Revocation can be done with different methods
e.g. lists, compressed lists and cryptographic accumulators. A revocation
method must be privacy preserving and must scale. This paper gives an overview
about the available revocation methods, include a survey to define
requirements, assess different revocation groups against the requirements,
highlights shortcomings of the methods and introduce a new revocation method
called Linked Validity Verifiable Credentials.
Related papers
- Systematically Searching for Identity-Related Information in the Internet with OSINT Tools [0.0]
This paper proposes a classification of data and open-source intelligence (OSINT) tools related to identities.
In the next step, the data can be analyzed and countermeasures can be taken.
arXiv Detail & Related papers (2024-07-23T07:40:25Z) - DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity [3.479900921107504]
This paper explores enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification method.
To this end, the study proposed a novel decentralised identity method showcased in a decentralised identifier-based architectural framework.
arXiv Detail & Related papers (2024-03-08T12:49:39Z) - HFORD: High-Fidelity and Occlusion-Robust De-identification for Face
Privacy Protection [60.63915939982923]
Face de-identification is a practical way to solve the identity protection problem.
The existing facial de-identification methods have revealed several problems.
We present a High-Fidelity and Occlusion-Robust De-identification (HFORD) method to deal with these issues.
arXiv Detail & Related papers (2023-11-15T08:59:02Z) - Redactable and Sanitizable Signature Schemes: Applications and
Limitations for use in Decentralized Digital Identity Systems [8.501327327617313]
Redactable signature schemes and sanitizable signature schemes are methods that permit modification of a given digital message and retain a valid signature.
We propose implementing these protocols on a digital credential and compare them against other privacy-enhancing techniques to assess their suitability.
arXiv Detail & Related papers (2023-10-26T10:28:25Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Learning Cross-modality Information Bottleneck Representation for
Heterogeneous Person Re-Identification [61.49219876388174]
Visible-Infrared person re-identification (VI-ReID) is an important and challenging task in intelligent video surveillance.
Existing methods mainly focus on learning a shared feature space to reduce the modality discrepancy between visible and infrared modalities.
We present a novel mutual information and modality consensus network, namely CMInfoNet, to extract modality-invariant identity features.
arXiv Detail & Related papers (2023-08-29T06:55:42Z) - Unsupervised Text Deidentification [101.2219634341714]
We propose an unsupervised deidentification method that masks words that leak personally-identifying information.
Motivated by K-anonymity based privacy, we generate redactions that ensure a minimum reidentification rank.
arXiv Detail & Related papers (2022-10-20T18:54:39Z) - Towards Privacy-Preserving Person Re-identification via Person Identify
Shift [19.212691296927165]
Person re-identification (ReID) requires preserving the privacy of pedestrian images used by ReID methods.
We propose a novel de-identification method designed explicitly for person ReID, named Person Identify Shift (PIS)
PIS shifts each pedestrian image from the current identity to another with a new identity, resulting in images still preserving the relative identities.
arXiv Detail & Related papers (2022-07-15T06:58:41Z) - Style Normalization and Restitution for Generalizable Person
Re-identification [89.482638433932]
We design a generalizable person ReID framework which trains a model on source domains yet is able to generalize/perform well on target domains.
We propose a simple yet effective Style Normalization and Restitution (SNR) module.
Our models empowered by the SNR modules significantly outperform the state-of-the-art domain generalization approaches on multiple widely-used person ReID benchmarks.
arXiv Detail & Related papers (2020-05-22T07:15:10Z) - Intra-Camera Supervised Person Re-Identification [87.88852321309433]
We propose a novel person re-identification paradigm based on an idea of independent per-camera identity annotation.
This eliminates the most time-consuming and tedious inter-camera identity labelling process.
We formulate a Multi-tAsk mulTi-labEl (MATE) deep learning method for Intra-Camera Supervised (ICS) person re-id.
arXiv Detail & Related papers (2020-02-12T15:26:33Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.