Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
133 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
46 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

LinkDID: A Privacy-Preserving, Sybil-Resistant and Key-Recoverable Decentralized Identity Scheme (2307.14679v2)

Published 27 Jul 2023 in cs.CR

Abstract: Decentralized identity mechanisms endeavor to endow users with complete sovereignty over their digital assets within the Web3 ecosystem. Unfortunately, this benefit frequently comes at the expense of users' credential and identity privacy. Additionally, existing schemes fail to resist Sybil attacks that have long plagued Web3, and lack reasonable key recovery mechanisms to regain control of digital assets after loss. In this work, we propose LinkDID, a privacy-preserving, Sybil-resistant, and key-recoverable decentralized identity scheme that supports selective disclosure of credentials for arbitrary predicates while maintaining privacy for credentials and identities. Through an identifier association mechanism, LinkDID can privately and forcibly aggregate users' identifiers, providing Sybil resistance without relying on any external data or collateral from benign users. To enable key recovery, LinkDID permits users to establish proofs of ownership for identifiers with lost keys and request an update of corresponding keys from the decentralized ledger. We provide a detailed theoretical analysis and security proofs of LinkDID, along with an exhaustive performance evaluation that shows its ability to complete interactions in less than 10 seconds on consumer-grade devices.

Definition Search Book Streamline Icon: https://streamlinehq.com
References (34)
  1. Revocable and Offline-Verifiable Self-Sovereign Identities. In Proceedings of 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2020), pages 1020–1027. IEEE, 2020.
  2. Password-Protected Secret Sharing. In Proceedings of the 18th ACM SIGSAC conference on Computer and Communications Security (CCS 2011), pages 433–444. ACM, 2011.
  3. Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies. In Proceedings of 2017 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW 2017), pages 23–26. IEEE, 2017.
  4. Casper the Friendly Finality Gadget. arXiv preprint arXiv:1710.09437, 2017.
  5. Signature Schemes and Anonymous Credentials from Bilinear Maps. In Proceedings of 24th Annual International Cryptology Conference (Crypto 2004), pages 56–72, Santa Barbara, California, USA, 2004. Springer.
  6. Hyperplonk: Plonk with Linear-Time Prover and High-Degree Custom Gates. In Proceedings of 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques (EuroCrypt 2023), pages 499–530, Lyon, France, 2023. Springer.
  7. Dusk. Dusk-Network/Plonk. https://github.com/dusk-network/plonk, 2023.
  8. Plonk: Permutations over Lagrange-bases for Oecumenical Noninteractive Arguments of Knowledge. Cryptology ePrint Archive, 2019.
  9. Poseidon: A New Hash Function for Zero-Knowledge Proof Systems. In USENIX Security Symposium, volume 2021. USENIX, 2021.
  10. Round-Optimal Password-Protected Secret Sharing and T-PAKE in the Password-Only Model. In Proceedings of 20th International Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt 2014), pages 233–253, Kaoshiung, Taiwan, ROC, 2014. Springer.
  11. Constant-Size Commitments to Polynomials and their Applications. In Proceedings of 16th International Conference on the Theory and Application of Cryptology and Information Security (AsiaCrypt 2010), pages 177–194, Singapore, 2010. Springer.
  12. Holonym: A Decentralized Zero-Knowledge Smart Identity Bridge. https://holonym.io/whitepaper.pdf, 2022.
  13. Sovrin: Digital Identities in the Blockchain Era. https://sovrin.org/wp-content/uploads/AnonCred-RWC.pdf, 2023.
  14. Michael Kuperberg. Blockchain-Based Identity Management: A Survey from the Enterprise and Ecosystem Perspective. IEEE Transactions on Engineering Management, 67(4):1008–1027, 2019.
  15. CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. In Proceedings of 2021 IEEE Symposium on Security and Privacy (S&P 2021), pages 1348–1366. IEEE, 2021.
  16. Mir-Protocol. Mir-Protocol/Plonky2. https://github.com/mir-protocol/plonky2, 2023.
  17. uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain. In Proceedings of 2020 IEEE International Symposium on Systems Engineering (ISSE 2020), pages 1–7. IEEE, 2020.
  18. BIP 39: Mnemonic Code for Generating Deterministic Keys (2013). https://github.com/bitcoin/bips/blob/master/bip-0039, 2013.
  19. Sybil Attacks on Identity-Augmented Proof-of-Stake. Computer Networks, 199:108424, 2021.
  20. New Secure Approach to Backup Cryptocurrency Wallets. In Proceedings of 2019 IEEE Global Communications Conference (GlobeCom 2019), pages 1–6. IEEE, 2019.
  21. Decentralized Identifiers (DIDs) 1.0. World Wide Web Consortium (W3C), 2022.
  22. Verifiable Credentials Data Model 1.1. World Wide Web Consortium (W3C), 2022.
  23. Protecting Accounts from Credential Stuffing with Password Breach Alerting. In USENIX Security Symposium, pages 1556–1571. USENIX, 2019.
  24. Trust in Blockchain Cryptocurrency Ecosystem. IEEE Transactions on Engineering Management, 67(4):1196–1212, 2019.
  25. Friedhelm Victor. Address Clustering Heuristics for Ethereum. In Proceedings of 24th International Conference Financial Cryptography and Data Security (FC 2020), pages 617–633, Kota Kinabalu, Malaysia, 2020. Springer.
  26. An Airdrop that Preserves Recipient Privacy. In Proceedings of 24th International Conference Financial Cryptography and Data Security (FC 2020), pages 444–463, Kota Kinabalu, Malaysia, 2020. Springer.
  27. Decentralized Autonomous Organizations: Concept, Model, and Applications. IEEE Transactions on Computational Social Systems, 6(5):870–878, 2019.
  28. Decentralized Society: Finding Web3’s Soul. http://dx.doi.org/10.2139/ssrn.4105763, 2022.
  29. Blockchain-Enabled Accountability Mechanism against Information Leakage in Vertical Industry Services. IEEE Transactions on Network Science and Engineering (TNSE), 8(2):1202–1213, 2020.
  30. Decentralized Blacklistable Anonymous Credentials with Reputation. Computers & Security, 85:353–371, 2019.
  31. Caulk: Lookup Arguments in Sublinear Time. In Proceedings of the 29th ACM SIGSAC Conference on Computer and Communications Security (CCS 2022), pages 3121–3134. ACM, 2022.
  32. DECO: Liberating Web Data using Decentralized Oracles for TLS. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, pages 1919–1938. ACM, 2020.
  33. ZKCrypto. ZKCrypto/BLS12-381. https://github.com/zkcrypto/bls12_381, 2023.
  34. ZKCrypto. ZKCrypto/Jubjub. https://github.com/zkcrypto/jubjub, 2023.
Citations (1)

Summary

We haven't generated a summary for this paper yet.

X Twitter Logo Streamline Icon: https://streamlinehq.com