A novel approach to privacy and traceability using attribute-based signature in decentralized identifier

Taehoon Kim , Dahee Seo , Im-Yeong Lee , Su-Hyun Kim

High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (4) : 100326 -100326.

PDF
High-Confidence Computing ›› 2025, Vol. 5 ›› Issue (4) :100326 -100326. DOI: 10.1016/j.hcc.2025.100326
Research Articles
research-article

A novel approach to privacy and traceability using attribute-based signature in decentralized identifier

Author information +
History +
PDF

Abstract

This paper proposes a novel scheme that enhances privacy and ensures accountability by mitigating signature-based correlation risks in decentralized identifiers (DIDs). Existing DIDs often rely on traditional digital signatures, making them vulnerable to attacks that link user identities across transactions. Our proposed scheme leverages attribute-based signatures (ABS) to provide anonymous authentication, preventing such correlation and protecting user privacy. To deter the abuse of anonymity, it incorporates a traceability mechanism, enabling authorized entities to trace a user’s DID when necessary. The scheme’s security, including anonymity and traceability, is formally proven under the random oracle model.

Keywords

Decentralized identifier / Attribute-based signature / Privacy / Anonymous authentication / Traceability

Cite this article

Download citation ▾
Taehoon Kim, Dahee Seo, Im-Yeong Lee, Su-Hyun Kim. A novel approach to privacy and traceability using attribute-based signature in decentralized identifier. High-Confidence Computing, 2025, 5(4): 100326-100326 DOI:10.1016/j.hcc.2025.100326

登录浏览全文

4963

注册一个新账户 忘记密码

CRediT authorship contribution statement

Taehoon Kim: Writing - review & editing, Writing - original draft, Validation, Formal analysis, Conceptualization. Dahee Seo: Validation, Formal analysis, Conceptualization. Im-Yeong Lee: Writing - review & editing, Writing - original draft, Validation, Conceptualization. Su-Hyun Kim: Writing - review & editing, Writing - original draft, Conceptualization.

Declaration of competing interest

The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

Acknowledgement

This work was supported by the IITP (Institute of Information & Communications Technology Planning & Evaluation)-ITRC (Information Technology Research Center) grant funded by the Korea government (Ministry of Science and ICT) (IITP-2025-RS-2024-00438056) and the Technology Innovation Program (RS-2024-00443436) funded by the Ministry of Trade, Industry & Energy (MOTIE, Korea)

References

[1]

S.K. Singh, A. Azzaoui, K.-K.R. Choo, L.T. Yang, J.H. Park, Articles a comprehensive survey on blockchain for secure IoT-enabled smart city beyond 5G: Approaches, processes, challenges, and opportunities, Hum.-Centric Comput. Inf. Sci. 13 (2023) 1-39.

[2]

N. Kübler, Electronic identity: Risk or opportunity for digital authentication?, Tech. rep., University of Zurich, 2021.

[3]

A. M.V.V. Sai, C. Wang, Z. Cai, Y. Li, Navigating the digital twin network landscape: A survey on architecture, applications, privacy and security, High-Confid. Comput. 4 (4) (2024) 100269.

[4]

O. Avellaneda, A. Bachmann, A. Barbir, J. Brenan, P. Dingle, K.H. Duffy, E. Maler, D. Reed, M. Sporny, Decentralized identity: Where did it come from and where is it going? IEEE Commun. Stand. Mag. 3 (4) (2019) 10-13.

[5]

D. Reed, M. Sporny, D. Longley, C. Allen, R. Grant, M. Sabadello, J. Holt,Decentralized identifiers (dids) v1.0, Tech. rep., W3C Cambridge, MA, USA, 2020.

[6]

M. Sporny, D. Longley, D. Chadwick, O. Steele, Verifiable credentials data model v2.0, Tech. rep., W3C Cambridge, MA, USA, 2024.

[7]

M. Schanzenbach, G. Bramm, J. Schütte, reclaimID: Secure, self-sovereign identities using name systems and attribute-based encryption, in: 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/12th IEEE International Conference on Big Data Science and Engineering (TrustCom/BigDataSE), IEEE, 2018, pp. 946-957.

[8]

N.A. Karthikeyan, Cryptographic implementation of issuer policy for self sovereign identity systems, Master’s thesis, University of Twente, 2021.

[9]

M.M. Islam, M.K. Islam, M. Shahjalal, M.Z. Chowdhury, Y.M. Jang, A lowcost cross-border payment system based on auditable cryptocurrency with consortium blockchain: Joint digital currency, IEEE Trans. Serv. Comput. 16 (3) (2022) 1616-1629.

[10]

D. Bosk, D. Frey, M. Gestin, G. Piolle, Hidden issuer anonymous credential, Proc. Priv. Enhancing Technol. 2022 (2022) 571-607.

[11]

Z. Liu, X. Ma, J. Bai, M. Xiao, F. Tang, Privacy-preserving vehicular cloud computing based on blockchain and decentralized identifier, Int. J. Netw. Secur. 25 (5) (2023) 849-858.

[12]

G. Yang, D.S. Wong, X. Deng, H. Wang, Anonymous signature schemes, in: Public Key Cryptography-PKC 2006: 9 th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings 9, Springer, 2006, pp. 347-363.

[13]

R. Zhang, H. Imai, Strong anonymous signatures, in: Information Security and Cryptology: 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers 4, Springer, 2009, pp. 60-71.

[14]

M.N.S. Perera, T. Nakamura, M. Hashimoto, H. Yokoyama, C.-M. Cheng, K. Sakurai, A survey on group signatures and ring signatures: Traceability vs. anonymity, Cryptography 6 (1) (2022) 1-22.

[15]

Y. He, Z. Zhou, Y. Pan, F. Chong, B. Wu, K. Xiao, H. Li, Review of data security within energy blockchain: A comprehensive analysis of storage, management, and utilization, High-Confid. Comput. (2024) 100233.

[16]

V.O. Nyangaresi, G.K. Yenurkar, Anonymity preserving lightweight authentication protocol for resource-limited wireless sensor networks, High-Confid. Comput. 4 (2) (2024) 100178.

[17]

S. Bistarelli, F. Micheli, F. Santini, A survey on decentralized identifier methods for self sovereign identity, in: ITASEC, CINI Cybersecurity National Lab, 2023, pp. 1-15.

[18]

C. Mazzocca, A. Acar, S. Uluagac, R. Montanari, P. Bellavista, M. Conti, A survey on decentralized identifiers and verifiable credentials, 2024, pp. 1-30, http://dx.doi.org/10.48550/arXiv.2402.02455, arXiv preprint arXiv: 2402.02455.

[19]

M. Sabadello, D. Zagidulin, Decentralized identifier resolution (DID resolution) v0.3, Tech. rep., W3C Cambridge, MA, USA, 2024.

[20]

M. Sabadello, K.D. Hartog, C. Lundkvist, C. Franz, A. Elias, A. Hughes, J. Jordan, D. Zagidulin, Introduction to did auth, Tech. rep., W3C Cambridge, MA, USA, 2018.

[21]

X. Zhu, D. He, Z. Bao, M. Luo, C. Peng, An efficient decentralized identity management system based on range proof for social networks, IEEE Open J. Comput. Soc. 4 (2023) 84-96.

[22]

J. Yin, Y. Xiao, Q. Pei, Y. Ju, L. Liu, M. Xiao, C. Wu, SmartDID: a novel privacy-preserving identity based on blockchain for IoT, IEEE Internet Things J. 10 (8) (2022) 6718-6732.

[23]

Z. Bao, D. He, M.K. Khan, M. Luo, Q. Xie, Pbidm: Privacy-preserving blockchain-based identity management system for industrial internet of things, IEEE Trans. Ind. Informatics 19 (2) (2022) 1524-1534.

[24]

J. Li, K. Kim, Attribute-based ring signatures, 2008, Cryptology ePrint Archive, Paper 2008/394-409, URL https://eprint.iacr.org/2008/394.

[25]

G. Shanqing, Y. Zeng, Attribute-based signature scheme, in: 2008 International Conference on Information Security and Assurance (ISA 2008), IEEE, 2008, pp. 509-511.

[26]

N. Kaaniche, M. Laurent,Attribute-based signatures for supporting anonymous certification, in: Computer Security-ESORICS 2016: 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part I 21, Springer, 2016, pp. 279-300.

[27]

Q. Su, R. Zhang, R. Xue, P. Li, Revocable attribute-based signature for blockchain-based healthcare system, IEEE Access 8 (2020) 127884-127896.

[28]

Z. Kang, J. Li, J. Shen, J. Han, Y. Zuo, Y. Zhang, TFS-ABS: Traceable and forward-secure attribute-based signature scheme with constant-size, IEEE Trans. Knowl. Data Eng. 35 (9) (2023) 9514-9530.

[29]

Y.W. Hwang, T. Kim, D. Seo, I.-Y. Lee, A study on the traceable attribute-based signature scheme provided with anonymous credentials, Connect. Sci. 36 (1) (2024) 1-24.

[30]

R. Song, LinkDID: A privacy-preserving, sybil-resistant and key-recoverable decentralized identity scheme, 2023, pp. 1-20, http://dx.doi.org/10.48550/arXiv.2307.14679, arXiv preprint arXiv:2307.14679.

[31]

D. Johnson, A. Menezes, S. Vanstone, The elliptic curve digital signature algorithm (ECDSA), Int. J. Inf. Secur. 1 (2001) 36-63.

[32]

B. Lynn, et al., The pairing-based cryptography (PBC) library, 2010.

PDF

276

Accesses

0

Citation

Detail

Sections
Recommended

/