DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity
- URL: http://arxiv.org/abs/2403.05271v2
- Date: Mon, 11 Mar 2024 15:20:37 GMT
- Title: DID:RING: Ring Signatures using Decentralised Identifiers For Privacy-Aware Identity
- Authors: Dimitrios Kasimatis, Sam Grierson, William J. Buchanan, Chris Eckl, Pavlos Papadopoulos, Nikolaos Pitropakis, Craig Thomson, Baraq Ghaleb,
- Abstract summary: This paper explores enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification method.
To this end, the study proposed a novel decentralised identity method showcased in a decentralised identifier-based architectural framework.
- Score: 3.479900921107504
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Decentralised identifiers have become a standardised element of digital identity architecture, with supra-national organisations such as the European Union adopting them as a key component for a unified European digital identity ledger. This paper delves into enhancing security and privacy features within decentralised identifiers by integrating ring signatures as an alternative verification method. This allows users to identify themselves through digital signatures without revealing which public key they used. To this end, the study proposed a novel decentralised identity method showcased in a decentralised identifier-based architectural framework. Additionally, the investigation assesses the repercussions of employing this new method in the verification process, focusing specifically on privacy and security aspects. Although ring signatures are an established asset of cryptographic protocols, this paper seeks to leverage their capabilities in the evolving domain of digital identities.
Related papers
- Aggregating Digital Identities through Bridging. An Integration of Open Authentication Protocols for Web3 Identifiers [0.8999666725996974]
Web3's decentralised infrastructure has upended the standardised approach to digital identity protocols like OpenID Connect.
Web2 and Web3 currently operate in silos, with selective disclosure web tokens (SD-JWTs) and Web3 dApps being reliant on verifiable-chain data.
This paper explores the integration of Web3 within the OpenID Connect framework, scrutinising established authentication protocols for their adaptability to decentralised identities.
arXiv Detail & Related papers (2025-01-23T15:48:49Z) - Distributed Identity for Zero Trust and Segmented Access Control: A Novel Approach to Securing Network Infrastructure [4.169915659794567]
This study assesses security improvements achieved when distributed identity is employed with ZTA principle.
The study suggests adopting distributed identities can enhance overall security postures by an order of magnitude.
The research recommends refining technical standards, expanding the use of distributed identity in practice, and its applications for the contemporary digital security landscape.
arXiv Detail & Related papers (2025-01-14T00:02:02Z) - A Systematisation of Knowledge: Connecting European Digital Identities with Web3 [0.8999666725996974]
The term self-sovereign identity (SSI) and decentralised identity are often used interchangeably.
This article aims to provide a clear distinction between the two concepts in relation to the revised Regulation as Regards establishing the European Digital Identity Framework (eIDAS 2.0)
arXiv Detail & Related papers (2024-09-26T22:35:25Z) - HFORD: High-Fidelity and Occlusion-Robust De-identification for Face
Privacy Protection [60.63915939982923]
Face de-identification is a practical way to solve the identity protection problem.
The existing facial de-identification methods have revealed several problems.
We present a High-Fidelity and Occlusion-Robust De-identification (HFORD) method to deal with these issues.
arXiv Detail & Related papers (2023-11-15T08:59:02Z) - Redactable and Sanitizable Signature Schemes: Applications and
Limitations for use in Decentralized Digital Identity Systems [8.501327327617313]
Redactable signature schemes and sanitizable signature schemes are methods that permit modification of a given digital message and retain a valid signature.
We propose implementing these protocols on a digital credential and compare them against other privacy-enhancing techniques to assess their suitability.
arXiv Detail & Related papers (2023-10-26T10:28:25Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Multiview Identifiers Enhanced Generative Retrieval [78.38443356800848]
generative retrieval generates identifier strings of passages as the retrieval target.
We propose a new type of identifier, synthetic identifiers, that are generated based on the content of a passage.
Our proposed approach performs the best in generative retrieval, demonstrating its effectiveness and robustness.
arXiv Detail & Related papers (2023-05-26T06:50:21Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Confidence-guided Centroids for Unsupervised Person Re-Identification [110.92876701933332]
Unsupervised person re-identification (ReID) aims to train a feature extractor for identity retrieval without exploiting identity labels.
Due to the blind trust in imperfect clustering results, the learning is inevitably misled by unreliable pseudo labels.
Confidence-Guided pseudo Label (CGL) enables samples to approach not only the originally assigned centroid but other centroids that are potentially embedded with their identity information.
arXiv Detail & Related papers (2022-11-22T00:18:54Z) - Unsupervised Text Deidentification [101.2219634341714]
We propose an unsupervised deidentification method that masks words that leak personally-identifying information.
Motivated by K-anonymity based privacy, we generate redactions that ensure a minimum reidentification rank.
arXiv Detail & Related papers (2022-10-20T18:54:39Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.