BLS-MT-ZKP: A novel approach to selective disclosure of claims from digital credentials (2402.15447v3)
Abstract: Digital credentials represent crucial elements of digital identity on the Internet. Credentials should have specific properties that allow them to achieve privacy-preserving capabilities. One of these properties is selective disclosure, which allows users to disclose only the claims or attributes they must. This paper presents a novel approach to selective disclosure BLS-MT-ZKP that combines existing cryptographic primitives: Boneh-Lynn-Shacham (BLS) signatures, Merkle hash trees (MT) and zero-knowledge proof (ZKP) method called Bulletproofs. Combining these methods, we achieve selective disclosure of claims while conforming to selective disclosure requirements. New requirements are defined based on the definition of selective disclosure and privacy spectrum. Besides selective disclosure, specific use cases for equating digital credentials with paper credentials are achieved. The proposed approach was compared to the existing solutions, and its security, threat, performance and limitation analysis was done. For validation, a proof-of-concept was implemented, and the execution time was measured to demonstrate the practicality and efficiency of the approach.
- Digital identities and verifiable credentials. In Business & Information Systems Engineering, volume 63, pages 603–613. Springer, 2021.
- Formalising linked-data based verifiable credentials for selective disclosure. In 2022 IEEE European Symposium on Security and Privacy Workshops (EuroSPW), pages 52–65, 2022.
- Verifiable credentials implementation guidelines 1.0, 09 2019.
- Cerberus: A blockchain-based accreditation and degree verification system. In IEEE Transactions on Computational Social Systems. IEEE, 2022.
- A minimal disclosure signature authentication scheme based on consortium blockchain. In 2022 IEEE International Conference on Blockchain (Blockchain), pages 516–521, 2022.
- Authenticated selective disclosure of credentials in hybrid-storage blockchain. In International Conference on Parallel and Distributed Systems, 2023.
- Pp-trust-x: A system for privacy preserving trust negotiations. In TSEC, 2007.
- Identity-based long running negotiations. 2008.
- Constant-size commitments to polynomials and their applications. In international conference on the theory and application of cryptology and information security, 2010.
- D. W. Kravitz. Exploration and impact of blockchain-enabled adaptive non-binary trust models. 2019.
- An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Advances in Cryptology—EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings 20, pages 93–118. Springer, 2001.
- Dynamic accumulators and application to efficient revocation of anonymous credentials. In Advances in Cryptology—CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18–22, 2002 Proceedings 22, pages 61–76. Springer, 2002.
- A signature scheme with efficient protocols. In Security in Communication Networks: Third International Conference, SCN 2002 Amalfi, Italy, September 11–13, 2002 Revised Papers 3, pages 268–289. Springer, 2003.
- Signature schemes and anonymous credentials from bilinear maps. In Annual international cryptology conference, pages 56–72. Springer, 2004.
- Efficient attributes for anonymous credentials. In ACM Transactions on Information and System Security, 2012.
- Antoine Rondelet. A note on anonymous credentials using bls signatures, 2020.
- Zklaims: Privacy-preserving attribute-based credentials using non-interactive zero-knowledge techniques. In Proceedings of the 16th International Joint Conference on e-Business and Telecommunications SECRYPT - Volume 1, pages 325–332, 2019.
- Privacy-preserving identity management system. In IACR Cryptology ePrint Archive, 2021.
- Ralph C Merkle. Method of providing digital signatures, 1982. US Patent 4,309,569.
- Compact multi-signatures for smaller blockchains. In International Conference on the Theory and Application of Cryptology and Information Security, pages 435–464. Springer, 2018.
- Bls signatures, 2022.
- Blockchain-based verifiable credential sharing with selective disclosure. In 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pages 959–966. IEEE, 2020.
- Zhiji Li. A verifiable credentials system with privacy-preserving based on blockchain. In Journal of Information Security, volume 13, 2022.
- MATTR Limited. Mattrglobal/bbs-signatures: An implementation of bbs+ signatures for node and browser environments, 2020.
- Georg Becker. Merkle signature schemes, merkle trees and their cryptanalysis. In Ruhr-University Bochum, Tech. Rep, volume 12, page 19. Citeseer, 2008.
- Michael Szydlo. Merkle tree traversal in log space and time. In Advances in Cryptology-EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. Proceedings 23, pages 541–554. Springer, 2004.
- Herding, second preimage and trojan message attacks beyond merkle-damgård. In Selected Areas in Cryptography: 16th Annual International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers 16, pages 393–414. Springer, 2009.
- Certificate Transparency. RFC 6962, June 2013.