Privacy-Preserving On-chain Permissioning for KYC-Compliant Decentralized Applications
- URL: http://arxiv.org/abs/2510.05807v1
- Date: Tue, 07 Oct 2025 11:24:51 GMT
- Title: Privacy-Preserving On-chain Permissioning for KYC-Compliant Decentralized Applications
- Authors: Fabian Piper, Karl Wolf, Jonathan Heiss,
- Abstract summary: This paper presents a novel synthesis of Self-Sovereign Identity (SSI), Zero-Knowledge Proofs (ZKPs) and Attribute-Based Access Control.<n>We provide a comprehensive framework for permissioned dApps that aligns decentralized trust, privacy, and transparency, harmonizing blockchain principles with regulatory compliance.
- Score: 0.0
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Decentralized applications (dApps) in Decentralized Finance (DeFi) face a fundamental tension between regulatory compliance requirements like Know Your Customer (KYC) and maintaining decentralization and privacy. Existing permissioned DeFi solutions often fail to adequately protect private attributes of dApp users and introduce implicit trust assumptions, undermining the blockchain's decentralization. Addressing these limitations, this paper presents a novel synthesis of Self-Sovereign Identity (SSI), Zero-Knowledge Proofs (ZKPs), and Attribute-Based Access Control to enable privacy-preserving on-chain permissioning based on decentralized policy decisions. We provide a comprehensive framework for permissioned dApps that aligns decentralized trust, privacy, and transparency, harmonizing blockchain principles with regulatory compliance. Our framework supports multiple proof types (equality, range, membership, and time-dependent) with efficient proof generation through a commit-and-prove scheme that moves credential authenticity verification outside the ZKP circuit. Experimental evaluation of our KYC-compliant DeFi implementation shows considerable performance improvement for different proof types compared to baseline approaches. We advance the state-of-the-art through a holistic approach, flexible proof mechanisms addressing diverse real-world requirements, and optimized proof generation enabling practical deployment.
Related papers
- Binding Agent ID: Unleashing the Power of AI Agents with accountability and credibility [46.323590135279126]
BAID (Binding Agent ID) is a comprehensive identity infrastructure establishing verifiable user-code binding.<n>We implement and evaluate a complete prototype system, demonstrating the practical feasibility of blockchain-based identity management and zkVM-based authentication protocol.
arXiv Detail & Related papers (2025-12-19T13:01:54Z) - Secure Autonomous Agent Payments: Verifying Authenticity and Intent in a Trustless Environment [0.0]
Artificial intelligence (AI) agents are increasingly capable of initiating financial transactions on behalf of users or other agents.<n>Traditional payment systems assume human authorization, but autonomous, agent-led payments remove that safeguard.<n>This paper presents a blockchain-based framework that cryptographically authenticates and verifies the intent of every AI-initiated transaction.
arXiv Detail & Related papers (2025-11-08T19:53:51Z) - A Scalable, Privacy-Preserving Decentralized Identity and Verifiable Data Sharing Framework based on Zero-Knowledge Proofs [9.654506373807852]
This paper proposes a novel, comprehensive framework that integrates DIDs and VCs with efficient Zero-Knowledge Proof schemes.<n>First, it constructs a set of strong privacy-preserving protocols based on zk-STARKs.<n>Second, it designs a scalable, privacy-preserving credential revocation mechanism based on cryptographic accumulators.<n>Third, it integrates a practical social key recovery scheme, significantly enhancing system usability and security.
arXiv Detail & Related papers (2025-10-10T06:06:05Z) - Decentralized Vulnerability Disclosure via Permissioned Blockchain: A Secure, Transparent Alternative to Centralized CVE Management [0.0]
This paper proposes a decentralized, blockchain-based system for the publication of Common Vulnerabilities and Exposures ( CVEs)<n>The proposed architecture leverages a permissioned blockchain, wherein only authenticated CVE Numbering Authorities (CNAs) are authorized to submit entries.<n>We evaluate the proposed model in comparison with existing practices, highlighting its advantages in transparency, trust decentralization, and auditability.
arXiv Detail & Related papers (2025-05-01T12:12:08Z) - Data sharing in the metaverse with key abuse resistance based on decentralized CP-ABE [17.462884309974097]
Ciphertext-policy-based encryption (CP-ABE) is a promising primitive to provide confidentiality and fine-grained access control.<n>Few studies have considered CP-ABE key confidentiality and authority accountability simultaneously.<n>We introduce an open incentive mechanism to encourage honest participation in data sharing.
arXiv Detail & Related papers (2024-12-18T12:06:56Z) - Balancing Confidentiality and Transparency for Blockchain-based Process-Aware Information Systems [43.253676241213626]
We propose an architecture for blockchain-based PAISs to preserve confidentiality and transparency.<n>Smart contracts enact, enforce and store public interactions, while attribute-based encryption techniques are adopted to specify access grants to confidential information.<n>We assess the security of our solution through a systematic threat model analysis and evaluate its practical feasibility.
arXiv Detail & Related papers (2024-12-07T20:18:36Z) - Towards Credential-based Device Registration in DApps for DePINs with ZKPs [46.08150780379237]
We propose a credential-based device registration (CDR) mechanism that verifies device credentials on the blockchain.
We present a general system model, and technically evaluate CDR using zkSNARKs with Groth16 and Marlin.
arXiv Detail & Related papers (2024-06-27T09:50:10Z) - It Takes Two: A Peer-Prediction Solution for Blockchain Verifier's Dilemma [12.663727952216476]
We develop a Byzantine-robust peer prediction framework towards the design of one-phase Bayesian truthful mechanisms for the decentralized verification games.<n>Our study provides a framework of incentive design for decentralized verification protocols that enhances the security and robustness of the blockchain, decentralized AI, and potentially other decentralized systems.
arXiv Detail & Related papers (2024-06-03T21:21:17Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Healthcare Policy Compliance: A Blockchain Smart Contract-Based Approach [0.312488427986006]
Despite stringent regulations like HIPAA, significant gaps in policy compliance often remain undetected until a data breach occurs.
To bridge this gap, we propose a novel blockchain-powered, smart contract-based access control model.
Our approach integrates components of informed consent into PPAs, employing blockchain smart contracts to automate and secure policy enforcement.
arXiv Detail & Related papers (2023-12-15T21:25:07Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Regulation conform DLT-operable payment adapter based on trustless -
justified trust combined generalized state channels [77.34726150561087]
Economy of Things (EoT) will be based on software agents running on peer-to-peer trustless networks.
We give an overview of current solutions that differ in their fundamental values and technological possibilities.
We propose to combine the strengths of the crypto based, decentralized trustless elements with established and well regulated means of payment.
arXiv Detail & Related papers (2020-07-03T10:45:55Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.