Enhancing User Privacy in Decentralized Identity Management: A Comparative Analysis of Zero-Knowledge Proofs and Anonymization Techniques on Blockchain Infrastructures
Keywords:
Blockchain technology, Self-sovereign identityAbstract
Rising digital identity management requires strong privacy and security. Online interactions need centralised identity management systems, but their flaws and lack of user control over personal data pose security threats. Common data breaches allow centralized authority to modify or exploit IDs. Blockchain's unchangeable ledger and universal consensus enable self-sovereign identification. These systems safeguard identities and provide dependents optional verification. BC-IMS privacy issues remain. A research examines ZKPs and anonymity. BC-IMS weighs these approaches' pros and cons.
References
Ahmad, A., & Zhao, Y. (2020, June). The evolution of identity management: From centralized systems to self-sovereign identity and zero-knowledge proofs. In 2020 17th International Conference on Mobile Data Management (MDM) (pp. 272-279). IEEE. IEEE Xplore
Androulaki, E., et al. (2018, April). Certiorari: A scalable blockchain-based attestation platform. In Proceedings of the 11th ACM Conference on Emerging Networking Experiments and Technologies (pp. 149-163). ACM
Banger, M., et al. (2020). A comprehensive guide to zero-knowledge proofs (ZKPs). IT Security Demand. Online
Ben-Sasson, E., et al. (2014, March). Efficient zero-knowledge proofs of knowledge for arithmetic circuits. In 2014 IEEE 55th Annual Symposium on Foundations of Computer Science (FOCS) (pp. 453-462). IEEE. IEEE Xplore
Bentov, I., et al. (2014, August). Zcash: A decentralized anonymous payment system. In Watershed Moments in Computing (pp. 161-178). Springer, Cham. DOI
Chase, M., & Lysyanskaya, A. (2004, May). Efficient constructions of perfectly secure indistinguishability obfuscation. In International Colloquium on Automata, Languages, and Programming (pp. 553-566). Springer, Berlin, Heidelberg. DOI
Chen, J., et al. (2017, May). Towards practical accountable attribute-based encryption with short ciphertexts. In 2017 IEEE Symposium on Security and Privacy (SP) (pp. 105-122). IEEE. IEEE Xplore
Christofides, M., & Saeed, M. (2019, July). Post-quantum cryptography for blockchain: a survey on current state-of-the-art and future directions. In 2019 International Conference on Security, Privacy and Applied Computing in Electronics and Informatics (SPECTRUM) (pp. 1-8). IEEE. IEEE Xplore
Erlich, J., & Cohen, A. (2011, August). A fast framework for computationally private authentication. In Proceedings of the 17th ACM Conference on Computer and Communications Security (pp. 197-208). ACM
Faust, S., et al. (2017, April). zk-SNARKs for efficient cryptocurrency transactions. In Proceedings of the 2017 Symposium on Security and Privacy (SP) (pp. 1017-1032). IEEE Xplore
Gilad, Y., et al. (2016, May). Proofs of partial knowledge for privacy-preserving applications. In European Symposium on Cryptology (pp. 348-376). Springer, Berlin, Heidelberg. DOI
Green, M., & Maheshwari, A. (2015, May). Fast computation of cryptographic pairings. In Cryptology ePrint Archive. Report 2015/454.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.