论文标题
堡垒:右提供和属性的自我主张身份验证
FORT: Right-proving and Attribute-blinding Self-sovereign Authentication
论文作者
论文摘要
如今,有大量用于在线提供和支付的服务,例如视频流订阅,汽车或停车场共享,购买票等。在线服务通常会在签署到其平台后与用户的身份直接相关的在线服务,并且用户每次愿意使用相同的凭证愿意使用服务。同样,在使用诸如参加音乐会之类的面对面服务时,用户付款后,用户通常会获得一张机票,证明他/她有权使用该服务。在这两种情况下,主要问题是系统的集中化,并且不能确保客户的隐私。所涉及的服务提供商是值得信赖的第三方,提供服务并处理有关用户的私人数据的当局。在本文中,我们设计和实施Fort,这是一个分散的系统,允许客户证明其使用特定服务(在线或面对面)的权利而无需透露敏感信息。为了实现权力下放,我们提出了一个解决方案,其中所有数据均由区块链处理。我们使用零知识证明,加密原始图,使我们能够保证客户的隐私来描述并独特地识别用户的权利,并通过使用零知识证明,加密原始词来证明这些权利的权利。此外,我们提供了堡垒的基准,该基准表明我们的协议足够有效,可以在具有低计算资源(例如智能手机或智能手表)的设备中使用,这些设备是我们用例场景中常用的设备。
Nowadays, there is a plethora of services that are provided and paid for online, like video streaming subscriptions, car or parking sharing, purchasing tickets for events, etc. Online services usually issue tokens directly related to the identities of their users after signing up into their platform, and the users need to authenticate using the same credentials each time they are willing to use the service. Likewise, when using in-person services like going to a concert, after paying for this service the user usually gets a ticket which proves that he/she has the right to use that service. In both scenarios, the main concerns are the centralization of the systems, and that they do not ensure customers' privacy. The involved Service Providers are Trusted Third Parties, authorities that offer services and handle private data about users. In this paper, we design and implement FORT, a decentralized system that allows customers to prove their right to use specific services (either online or in-person) without revealing sensitive information. To achieve decentralization we propose a solution where all the data is handled by a Blockchain. We describe and uniquely identify users' rights using Non-Fungible Tokens (NFTs), and possession of these rights is demonstrated by using Zero-Knowledge Proofs, cryptographic primitives that allow us to guarantee customers' privacy. Furthermore, we provide benchmarks of FORT which show that our protocol is efficient enough to be used in devices with low computing resources, like smartphones or smartwatches, which are the kind of devices commonly used in our use case scenario.