zkFaith: Soonami's Zero-Knowledge Identity Protocol

12/24/2022
by   Mina Namazi, et al.
0

Individuals are encouraged to prove their eligibility to access specific services regularly. However, providing various organizations with personal data spreads sensitive information and endangers people's privacy. Hence, privacy-preserving identification systems that enable individuals to prove they are permitted to use specific services are required to fill the gap. Cryptographic techniques are deployed to construct identity proofs across the internet; nonetheless, they do not offer complete control over personal data or prevent users from forging and submitting fake data. In this paper, we design a privacy-preserving identity protocol called "zkFaith." A new approach to obtain a verified zero-knowledge identity unique to each individual. The protocol verifies the integrity of the documents provided by the individuals and issues a zero-knowledge-based id without revealing any information to the authenticator or verifier. The zkFaith leverages an aggregated version of the Camenisch-Lysyanskaya (CL) signature scheme to sign the user's commitment to the verified personal data. Then the users with a zero-knowledge proof system can prove that they own the required attributes of the access criterion of the requested service providers. Vector commitment and their position binding property enables us to, later on, update the commitments based on the modification of the personal data; hence update the issued zkFaith id with no requirement of initiating the protocol from scratch. We show that the design and implementation of the zkFaith with the generated proofs in real-world scenarios are scalable and comparable with the state-of-the-art schemes.

READ FULL TEXT
research
02/18/2022

Leveraging Self-Sovereign Identity, Blockchain, and Zero-Knowledge Proof to Build a Privacy-Preserving Vaccination Pass

The current humanitarian health crisis popularized the debate on data pr...
research
11/09/2022

Harpocrates: Privacy-Preserving and Immutable Audit Log for Sensitive Data Operations

The audit log is a crucial component to monitor fine-grained operations ...
research
06/09/2019

A Federated Authorization Framework for Distributed Personal Data and Digital Identity

The digital identity problem is a complex one in large part because it i...
research
05/12/2018

VAMS: Verifiable Auditing of Access to Confidential Data

The sharing of personal data has the potential to bring substantial bene...
research
02/14/2018

Zero-Knowledge Password Policy Check from Lattices

Passwords are ubiquitous and most commonly used to authenticate users wh...
research
01/02/2023

Bringing data minimization to digital wallets at scale with general-purpose zero-knowledge proofs

Today, digital identity management for individuals is either inconvenien...
research
06/17/2020

ZKPs: Does This Make The Cut? Recent Advances and Success of Zero-Knowledge Security Protocols

How someone can get health insurance without sharing his health informat...

Please sign up or login with your details

Forgot password? Click here to reset