who am i secure identity registration on distributed
play

Who Am I? Secure Identity Registration on Distributed Ledgers Sarah - PowerPoint PPT Presentation

Who Am I? Secure Identity Registration on Distributed Ledgers Sarah Azouvi Mustafa Al-Bassam Sarah Meiklejohn (University College London) 1 Cryptocurrencies 2 Cryptocurrencies Pseudonyms 2 Cryptocurrencies Pseudonyms tx(pk A pk B ) 2


  1. Who Am I? Secure Identity Registration on Distributed Ledgers Sarah Azouvi Mustafa Al-Bassam Sarah Meiklejohn (University College London) 1

  2. Cryptocurrencies 2

  3. Cryptocurrencies Pseudonyms 2

  4. Cryptocurrencies Pseudonyms tx(pk A pk B ) 2

  5. Blockchain for distributing benefits? 3

  6. Blockchain for distributing benefits? 3

  7. Blockchain for distributing benefits? 3

  8. Related

  9. Related PKI

  10. Related PKI Anonymous Credentials

  11. Related PKI Anonymous Credentials Identity management on Blockchains

  12. Related PKI Anonymous Credentials Identity management on Blockchains

  13. Related PKI Anonymous Credentials Identity management on Blockchains

  14. Related PKI Anonymous Credentials Identity management on Blockchains

  15. Related PKI Anonymous Credentials Identity management on Blockchains uPort

  16. Related PKI Anonymous Credentials Identity management on Blockchains uPort ChainAnchor

  17. Related PKI Anonymous Credentials Identity management on Blockchains uPort ChainAnchor MIT Digital certificates

  18. Security Registration I’m Alice pk Verification pk 5

  19. Security Registration I’m Alice pk Verification pk 6 6

  20. Security Registration I’m Alice pk Verification pk 6 6

  21. Security Passive verification I’m Alice pk pk 7 7 7

  22. Security Active verification I’m Alice pk pk 8 8 8

  23. Security Attribute integrity I’m Alice pk pk 9 9 9

  24. Security Attribute integrity I’m Alice pk pk 9 9 9

  25. Security Attribute integrity I’m Alice pk pk pk 9 9 9

  26. Security Attribute integrity I’m Alice pk pk pk 9 9 9

  27. Security Attribute privacy I’m Alice ? pk 10

  28. Our constructions 11

  29. Web of trust Registration I’m Alice, my public key is pk tx{pk R (pk,pk rev )} 12

  30. Web of trust Registration I’m Alice, my public key is pk tx{(pk R1, …,pk Rn ) (pk,pk rev1 ,…,pk revn )} 13 13

  31. Web of trust Registration I’m Alice, my public key is pk tx{(pk R1, …,pk Rn ) (pk,pk rev1 ,…,pk revn )} Verification tx? pk rev ? 13 13

  32. Web of trust • Verification: passive (on the blockchain) • Attribute integrity: partially. Registrars cannot impersonate Alice. But malicious coalition of users can collude • Privacy: no Alice + pk 14

  33. Web of trust • Verification: passive (on the blockchain) • Attribute integrity: partially. Registrars cannot impersonate Alice. But malicious coalition of users can collude • Privacy: no Alice + pk 14

  34. Blinded web of trust • Verification: active • Attribute Integrity: partially • Privacy: yes 15

  35. Casascius sk 1 , pk 1 sk 2 pk 1 sk 2 pk 2 =pk 1sk2 pk 2 =pk 1sk2 =g sk1.sk2 16

  36. Multi-Casascius 17 17 17

  37. Multi-Casascius 18 18

  38. Multi-Casascius • Verification: Passive • Attribute Integrity: Satisfied. First registrar verifies id. No registrar knows the private key. • Privacy: yes. As long as one registrar honest 19

  39. Implementation https://github.com/musalbas/trustery 20

  40. Implementation • Add attribute (di ff erent types) • Sign attribute • Add/Sign Blind attribute 21

  41. Implementation 22

  42. Conclusion • Di ff erent methods for achieving registration in public distributed ledgers • Light-weight crypto primitives • Open problem: key recovery 23

  43. Questions? 24

Recommend


More recommend