Redactable and Sanitizable Signature Schemes: Applications and
Limitations for use in Decentralized Digital Identity Systems
- URL: http://arxiv.org/abs/2310.17297v1
- Date: Thu, 26 Oct 2023 10:28:25 GMT
- Title: Redactable and Sanitizable Signature Schemes: Applications and
Limitations for use in Decentralized Digital Identity Systems
- Authors: Bryan Kumara, Mark Hooper, Carsten Maple, Timothy Hobson, and Jon
Crowcroft
- Abstract summary: Redactable signature schemes and sanitizable signature schemes are methods that permit modification of a given digital message and retain a valid signature.
We propose implementing these protocols on a digital credential and compare them against other privacy-enhancing techniques to assess their suitability.
- Score: 8.501327327617313
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Redactable signature schemes and sanitizable signature schemes are methods
that permit modification of a given digital message and retain a valid
signature. This can be applied to decentralized identity systems for delegating
identity issuance and redacting sensitive information for privacy-preserving
verification of identity. We propose implementing these protocols on a digital
credential and compare them against other privacy-enhancing techniques to
assess their suitability
Related papers
- SD-BLS: Privacy Preserving Selective Disclosure of Verifiable Credentials with Unlinkable Threshold Revocation [0.0]
We propose a method for selective disclosure and privacy-preserving revocation of digital credentials.
We use second-order Elliptic Curves and Boneh-Lynn-Shacham (BLS) signatures.
Our system's unique design enables extremely fast revocation checks, even with large revocation lists.
arXiv Detail & Related papers (2024-06-27T09:41:13Z) - DiVerify: Diversifying Identity Verification in Next-Generation Software Signing [6.367742522528132]
Code signing enables software developers to digitally sign their code using cryptographic keys, thereby associating the code to their identity.
Next-generation software signing such as Sigstore and OpenPubKey simplify code signing by providing streamlined mechanisms to verify and link signer identities to the public key.
We introduce Diverse Identity Verification (DiVerify) scheme, which strengthens the security guarantees of next-generation software signing by leveraging threshold identity validations and scope mechanisms.
arXiv Detail & Related papers (2024-06-21T18:53:52Z) - DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity [3.479900921107504]
This paper explores enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification method.
To this end, the study proposed a novel decentralised identity method showcased in a decentralised identifier-based architectural framework.
arXiv Detail & Related papers (2024-03-08T12:49:39Z) - Revocable Quantum Digital Signatures [57.25067425963082]
We define and construct digital signatures with revocable signing keys from the LWE assumption.
In this primitive, the signing key is a quantum state which enables a user to sign many messages.
Once the key is successfully revoked, we require that the initial recipient of the key loses the ability to sign.
arXiv Detail & Related papers (2023-12-21T04:10:07Z) - HFORD: High-Fidelity and Occlusion-Robust De-identification for Face
Privacy Protection [60.63915939982923]
Face de-identification is a practical way to solve the identity protection problem.
The existing facial de-identification methods have revealed several problems.
We present a High-Fidelity and Occlusion-Robust De-identification (HFORD) method to deal with these issues.
arXiv Detail & Related papers (2023-11-15T08:59:02Z) - Redactable Signature Schemes and Zero-knowledge Proofs: A comparative examination for applications in Decentralized Digital Identity Systems [8.501327327617313]
Redactable Signature Schemes and Zero-Knowledge Proofs are two radically different approaches to enable privacy.
This paper analyses their merits and drawbacks when applied to decentralized identity system.
arXiv Detail & Related papers (2023-10-24T15:30:33Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - FedSOV: Federated Model Secure Ownership Verification with Unforgeable
Signature [60.99054146321459]
Federated learning allows multiple parties to collaborate in learning a global model without revealing private data.
We propose a cryptographic signature-based federated learning model ownership verification scheme named FedSOV.
arXiv Detail & Related papers (2023-05-10T12:10:02Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - A new Privacy Preserving and Scalable Revocation Method for Self
Sovereign Identity -- The Perfect Revocation Method does not exist yet [0.0]
Most of the issued credentials need the possibility of revocation.
This paper gives an overview about the available revocation methods, including a survey to define requirements.
It highlights shortcomings of the methods and introduces a new revocation method called Linked Validity Verifiable Credentials.
arXiv Detail & Related papers (2022-11-23T15:49:57Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.