Redactable Signature Schemes and Zero-knowledge Proofs: A comparative examination for applications in Decentralized Digital Identity Systems
- URL: http://arxiv.org/abs/2310.15934v1
- Date: Tue, 24 Oct 2023 15:30:33 GMT
- Title: Redactable Signature Schemes and Zero-knowledge Proofs: A comparative examination for applications in Decentralized Digital Identity Systems
- Authors: Bryan Kumara, Mark Hooper, Carsten Maple, Timothy Hobson, Jon Crowcroft,
- Abstract summary: Redactable Signature Schemes and Zero-Knowledge Proofs are two radically different approaches to enable privacy.
This paper analyses their merits and drawbacks when applied to decentralized identity system.
- Score: 8.501327327617313
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Redactable Signature Schemes and Zero-Knowledge Proofs are two radically different approaches to enable privacy. This paper analyses their merits and drawbacks when applied to decentralized identity system. Redactable Signatures, though competitively quick and compact, are not as expressive as zero-knowledge proofs and do not provide the same level of privacy. On the other hand, zero-knowledge proofs can be much faster but some protocols require a trusted set-up. We conclude that given the benefits and drawbacks, redactable signatures are more appropriate at an earlier stage and zero-knowledge proofs are more appropriate at a later stage for decentralized identity systems
Related papers
- The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - A Survey and Comparative Analysis of Security Properties of CAN Authentication Protocols [92.81385447582882]
The Controller Area Network (CAN) bus leaves in-vehicle communications inherently non-secure.
This paper reviews and compares the 15 most prominent authentication protocols for the CAN bus.
We evaluate protocols based on essential operational criteria that contribute to ease of implementation.
arXiv Detail & Related papers (2024-01-19T14:52:04Z) - On Cryptographic Mechanisms for the Selective Disclosure of Verifiable Credentials [39.4080639822574]
Verifiable credentials are a digital analogue of physical credentials.
They can be presented to verifiers to reveal attributes or even predicates about the attributes included in the credential.
One way to preserve privacy during presentation consists in selectively disclosing the attributes in a credential.
arXiv Detail & Related papers (2024-01-16T08:22:28Z) - Incorporating Zero-Knowledge Succinct Non-interactive Argument of Knowledge for Blockchain-based Identity Management with off-chain computations [0.8621608193534839]
A novel blockchain-based fingerprint authentication system is proposed that integrates zk-SNARKs.
The proposed method has the potential to provide a secure and efficient solution for blockchain-based identity management.
arXiv Detail & Related papers (2023-10-30T11:24:05Z) - Redactable and Sanitizable Signature Schemes: Applications and
Limitations for use in Decentralized Digital Identity Systems [8.501327327617313]
Redactable signature schemes and sanitizable signature schemes are methods that permit modification of a given digital message and retain a valid signature.
We propose implementing these protocols on a digital credential and compare them against other privacy-enhancing techniques to assess their suitability.
arXiv Detail & Related papers (2023-10-26T10:28:25Z) - FedSOV: Federated Model Secure Ownership Verification with Unforgeable
Signature [60.99054146321459]
Federated learning allows multiple parties to collaborate in learning a global model without revealing private data.
We propose a cryptographic signature-based federated learning model ownership verification scheme named FedSOV.
arXiv Detail & Related papers (2023-05-10T12:10:02Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - Confidence-guided Centroids for Unsupervised Person Re-Identification [110.92876701933332]
Unsupervised person re-identification (ReID) aims to train a feature extractor for identity retrieval without exploiting identity labels.
Due to the blind trust in imperfect clustering results, the learning is inevitably misled by unreliable pseudo labels.
Confidence-Guided pseudo Label (CGL) enables samples to approach not only the originally assigned centroid but other centroids that are potentially embedded with their identity information.
arXiv Detail & Related papers (2022-11-22T00:18:54Z) - GERE: Generative Evidence Retrieval for Fact Verification [57.78768817972026]
We propose GERE, the first system that retrieves evidences in a generative fashion.
The experimental results on the FEVER dataset show that GERE achieves significant improvements over the state-of-the-art baselines.
arXiv Detail & Related papers (2022-04-12T03:49:35Z) - Experimental relativistic zero-knowledge proofs [4.334542470441071]
We develop a zero-knowledge protocol involving two separated verifier-prover pairs.
Security is enforced via the physical principle of special relativity.
This demonstrates the practical potential of multi-prover zero-knowledge protocols.
arXiv Detail & Related papers (2020-12-18T19:00:01Z) - FCN+RL: A Fully Convolutional Network followed by Refinement Layers to
Offline Handwritten Signature Segmentation [3.3144312096837325]
We propose an approach to locate and extract the pixels of handwritten signatures on identification documents.
The technique is based on a fully convolutional encoder-decoder network combined with a block of refinement layers for the alpha channel of the predicted image.
arXiv Detail & Related papers (2020-05-28T18:47:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.