reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption

05/16/2018
by   Martin Schanzenbach, et al.
0

In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing identity attributes without the need for a centralised service provider. We propose a design where user attributes are stored in and shared over a name system under user-owned namespaces. Attributes are encrypted using attribute-based encryption (ABE), allowing the user to selectively authorize and revoke access of requesting parties to subsets of his attributes. We present an implementation based on the decentralised GNU Name System (GNS) in combination with ciphertext-policy ABE using type-1 pairings. To show the practicality of our implementation, we carried out experimental evaluations of selected implementation aspects including attribute resolution performance. Finally, we show that our design can be used as a standard OpenID Connect Identity Provider allowing our implementation to be integrated into standard-compliant services.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/08/2020

Data User-Based Attribute-Based Encryption

Attribute-Based Encryption (ABE) has emerged as an information-centric p...
research
05/16/2018

Practical Decentralized Attribute-Based Delegation using Secure Name Systems

Identity and trust in the modern Internet are centralized around an olig...
research
12/18/2020

Privacy Enhanced DigiLocker using Ciphertext-Policy Attribute-Based Encryption

Recently, Government of India has taken several initiatives to make Indi...
research
03/01/2019

TEEvil: Identity Lease via Trusted Execution Environments

We investigate identity lease, a new type of service in which users leas...
research
01/04/2019

Off-Policy Evaluation of Probabilistic Identity Data in Lookalike Modeling

We evaluate the impact of probabilistically-constructed digital identity...
research
05/24/2021

TradeChain: Decoupling Traceability and Identity inBlockchain enabled Supply Chains

In this work, we propose a privacy-preservation framework, TradeChain, w...
research
11/16/2020

Collusion-Resistant Identity-based Proxy Re-Encryption: Lattice-based Constructions in Standard Model

The concept of proxy re-encryption (PRE) dates back to the work of Blaze...

Please sign up or login with your details

Forgot password? Click here to reset