zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
- URL: http://arxiv.org/abs/2401.11735v2
- Date: Fri, 27 Sep 2024 22:37:36 GMT
- Title: zkLogin: Privacy-Preserving Blockchain Authentication with Existing Credentials
- Authors: Foteini Baldimtsi, Konstantinos Kryptos Chalkias, Yan Ji, Jonas Lindstrøm, Deepak Maram, Ben Riva, Arnab Roy, Mahdi Sedaghat, Joy Wang,
- Abstract summary: zkLogin is a novel technique that leverages identity tokens issued by popular platforms to authenticate transactions.
At the heart of zkLogin lies a signature scheme allowing the signer to sign using their existing OpenID accounts.
ZkLogin provides strong security and privacy guarantees.
- Score: 2.8023129538522853
- License:
- Abstract: For many users, a private key based wallet serves as the primary entry point to blockchains. Commonly recommended wallet authentication methods, such as mnemonics or hardware wallets, can be cumbersome. This difficulty in user onboarding has significantly hindered the adoption of blockchain-based applications. We develop zkLogin, a novel technique that leverages identity tokens issued by popular platforms (any OpenID Connect enabled platform e.g., Google, Facebook, etc.) to authenticate transactions. At the heart of zkLogin lies a signature scheme allowing the signer to sign using their existing OpenID accounts and nothing else. This improves the user experience significantly as users do not need to remember a new secret and can reuse their existing accounts. zkLogin provides strong security and privacy guarantees. Unlike prior works, zkLogin's security relies solely on the underlying platform's authentication mechanism without the need for any additional trusted parties (e.g., trusted hardware or oracles). As the name suggests, zkLogin leverages zero-knowledge proofs (ZKP) to ensure that the sensitive link between a user's off-chain and on-chain identities is hidden, even from the platform itself. zkLogin enables a number of important applications outside blockchains. It allows billions of users to produce \textit{verifiable digital content leveraging their existing digital identities}, e.g., email address. For example, a journalist can use zkLogin to sign a news article with their email address, allowing verification of the article's authorship by any party. We have implemented and deployed zkLogin on the Sui blockchain as an additional alternative to traditional digital signature-based addresses.
Related papers
- Quantum digital signature based on single-qubit without a trusted third-party [45.41082277680607]
We propose a brand new quantum digital signature protocol without a trusted third party only with qubit technology to further improve the security.
We prove that the protocol has information-theoretical unforgeability. Moreover, it satisfies other important secure properties, including asymmetry, undeniability, and expandability.
arXiv Detail & Related papers (2024-10-17T09:49:29Z) - BlockFound: Customized blockchain foundation model for anomaly detection [47.04595143348698]
BlockFound is a customized foundation model for anomaly blockchain transaction detection.
We introduce a series of customized designs to model the unique data structure of blockchain transactions.
BlockFound is the only method that successfully detects anomalous transactions on Solana with high accuracy.
arXiv Detail & Related papers (2024-10-05T05:11:34Z) - The Latency Price of Threshold Cryptosystem in Blockchains [52.359230560289745]
We study the interplay between threshold cryptography and a class of blockchains that use Byzantine-fault tolerant (BFT) consensus protocols.
Existing approaches for threshold cryptosystems introduce a latency overhead of at least one message delay for running the threshold cryptographic protocol.
We propose a mechanism to eliminate this overhead for blockchain-native threshold cryptosystems with tight thresholds.
arXiv Detail & Related papers (2024-07-16T20:53:04Z) - VELLET: Verifiable Embedded Wallet for Securing Authenticity and Integrity [0.6144680854063939]
This paper proposes a new protocol to enhance the security of embedded wallets.
Our VELLET protocol introduces a wallet verifier that can match the audit trail of embedded wallets on smart contracts.
arXiv Detail & Related papers (2024-04-05T03:23:19Z) - Generative AI-enabled Blockchain Networks: Fundamentals, Applications,
and Case Study [73.87110604150315]
Generative Artificial Intelligence (GAI) has emerged as a promising solution to address challenges of blockchain technology.
In this paper, we first introduce GAI techniques, outline their applications, and discuss existing solutions for integrating GAI into blockchains.
arXiv Detail & Related papers (2024-01-28T10:46:17Z) - Contract Wallet Using Emails [0.0]
We propose a new construction for contract wallets, smart contract applications that allow users to control their crypto assets.
Users can manipulate their crypto assets by simply sending emails with no need to manage keys.
Unless the sender domain server forges the emails, the crypto assets remain secure in the proposed system.
arXiv Detail & Related papers (2023-12-07T09:48:25Z) - BlockChain I/O: Enabling Cross-Chain Commerce [2.391161450948918]
We present BlockChain I/O, a framework for cross-chain commerce.
We show how to use BlockChain I/O to implement a cross-chain marketplace.
We also discuss how its desirable properties continue to hold in the end-to-end system.
arXiv Detail & Related papers (2023-08-04T06:51:50Z) - PBL: System for Creating and Maintaining Personal Blockchain Ledgers [3.5897534810405403]
This work presents a novel architecture for creating and maintaining personal blockchain ledgers.
Our system utilizes independent modular services, enabling individuals to securely store their data in a personal blockchain ledger.
Using rigorous mathematical methods, we prove that our system produces append-only, immutable, tamper-evident, tamper-resistant ledgers.
arXiv Detail & Related papers (2023-05-08T14:17:27Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - Analysis of Arbitrary Content on Blockchain-Based Systems using BigQuery [0.0]
We develop and apply a cloud-based approach for quickly discovering and classifying content on public blockchains.
Our method can be adapted to different blockchain systems and offers insights into content-related usage patterns and potential cases of abuse.
To the best of our knowledge, the presented study is the first to systematically analyze non-financial content stored on the blockchain.
arXiv Detail & Related papers (2022-03-17T15:12:38Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.