Enhancing User Privacy in Decentralized Identity Management: A Comparative Analysis of Zero-Knowledge Proofs and Anonymization Techniques on Blockchain Infrastructures

Authors

  • Mahammad Shaik Technical Lead - Software Application Development, Charles Schwab, Austin, Texas, USA Author
  • Maksim Muravev DevOps Engineer, Wargaming Ltd, Nicosia, Cyprus Author
  • Maksym Parfenov Senior Software Engineer, Spacemesh, Miedziana 54/20, Wrocław 53-44, Poland Author
  • Denis Saripov Frontend Engineer, Yandex, Durmitorska 19, Savski venac, Belgrade 11000, Serbia Author

Keywords:

Blockchain technology, Self-sovereign identity

Abstract

Rising digital identity management requires strong privacy and security. Online interactions need centralised identity management systems, but their flaws and lack of user control over personal data pose security threats. Common data breaches allow centralized authority to modify or exploit IDs. Blockchain's unchangeable ledger and universal consensus enable self-sovereign identification. These systems safeguard identities and provide dependents optional verification. BC-IMS privacy issues remain. A research examines ZKPs and anonymity. BC-IMS weighs these approaches' pros and cons.

References

Ahmad, A., & Zhao, Y. (2020, June). The evolution of identity management: From centralized systems to self-sovereign identity and zero-knowledge proofs. In 2020 17th International Conference on Mobile Data Management (MDM) (pp. 272-279). IEEE. IEEE Xplore

Androulaki, E., et al. (2018, April). Certiorari: A scalable blockchain-based attestation platform. In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies (pp. 149-163). ACM

Banger, M., et al. (2020). A comprehensive guide to zero-knowledge proofs (ZKPs). IT Security Demand. Online

Ben-Sasson, E., et al. (2014, March). Efficient zero-knowledge proofs of knowledge for arithmetic circuits. In 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS) (pp. 453-462). IEEE. IEEE Xplore

Bentov, I., et al. (2014, August). Zcash: A decentralized anonymous payment system. In Watershed Moments in Computing (pp. 161-178). Springer, Cham. DOI

Chase, M., & Lysyanskaya, A. (2004, May). Efficient constructions of perfectly secure indistinguishability obfuscation. In International Colloquium on Automata, Languages, and Programming (pp. 553-566). Springer, Berlin, Heidelberg. DOI

Chen, J., et al. (2017, May). Towards practical accountable attribute-based encryption with short ciphertexts. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 105-122). IEEE. IEEE Xplore

Christofides, M., & Saeed, M. (2019, July). Post-quantum cryptography for blockchain: a survey on current state-of-the-art and future directions. In 2019 International Conference on Security, Privacy and Applied Computing in Electronics and Informatics (SPECTRUM) (pp. 1-8). IEEE. IEEE Xplore

Erlich, J., & Cohen, A. (2011, August). A fast framework for computationally private authentication. In Proceedings of the 17th ACM Conference on Computer and Communications Security (pp. 197-208). ACM

Faust, S., et al. (2017, April). zk-SNARKs for efficient cryptocurrency transactions. In Proceedings of the 2017 Symposium on Security and Privacy (SP) (pp. 1017-1032). IEEE Xplore

Gilad, Y., et al. (2016, May). Proofs of partial knowledge for privacy-preserving applications. In European Symposium on Cryptology (pp. 348-376). Springer, Berlin, Heidelberg. DOI

Green, M., & Maheshwari, A. (2015, May). Fast computation of cryptographic pairings. In Cryptology ePrint Archive. Report 2015/454.

Downloads

Published

30-10-2020

How to Cite

[1]
Mahammad Shaik, Maksim Muravev, Maksym Parfenov, and Denis Saripov, “Enhancing User Privacy in Decentralized Identity Management: A Comparative Analysis of Zero-Knowledge Proofs and Anonymization Techniques on Blockchain Infrastructures”, J. Sci. Tech., vol. 1, no. 1, pp. 193–217, Oct. 2020, Accessed: Apr. 29, 2025. [Online]. Available: https://tsbpublisher.org/jst/article/view/72