Difference between revisions of "Vol-2599/paper5"
Jump to navigation
Jump to search
| Line 5: | Line 5: | ||
|session= | |session= | ||
}} | }} | ||
| + | = PDF = | ||
<pdf>http://ceur-ws.org/Vol-2599/paper5.pdf</pdf> | <pdf>http://ceur-ws.org/Vol-2599/paper5.pdf</pdf> | ||
| + | = Text = | ||
| + | <pre> | ||
| + | Private Digital Identity on Blockchain | ||
| + | |||
| + | Tom Hamer, Kerry Taylor, Kee Siong Ng, Alwen Tiu | ||
| + | |||
| + | College of Engineering and Computer Science, The Australian National University, | ||
| + | Canberra ACT 0200, Australia | ||
| + | tomhamer@live.com, kerry.taylor@anu.edu.au, keesiong.ng@anu.edu.au | ||
| + | alwen.tiu@anu.edu.au | ||
| + | |||
| + | |||
| + | |||
| + | Abstract. For many identification systems, including those in govern- | ||
| + | ment, finance and healthcare, it is critical that at most one identity | ||
| + | exists for each human individual within a given system. Many existing | ||
| + | approaches identify individuals through an exchange of verifiable docu- | ||
| + | ments attesting to basic identification information. However, the same | ||
| + | basic information is collected for identification in almost every system, | ||
| + | meaning that persons are linkable across different identity systems and | ||
| + | are not in control of how their identity is used. We propose Unique Self- | ||
| + | Sovereign Identity, (USI), combining Cancelable Biometrics [6] and W3C | ||
| + | Verifiable Claims [8] to achieve privacy preserving and non-linkable iden- | ||
| + | tification, with guarantees against double enrolment with any system. | ||
| + | Because our protocol is based on biometrics, it permits individuals to | ||
| + | enrol without official identification documents. Our protocol can be used | ||
| + | in a wide range of situations, offering data security for large organisa- | ||
| + | tions, access to basic services for over one billion people who lack official | ||
| + | identifying documents, and personal identity control for all individuals. | ||
| + | |||
| + | Keywords: Verifiable Claims · Blockchain · Cancelable Biometrics · | ||
| + | Homomorphic Signature | ||
| + | |||
| + | |||
| + | 1 Introduction | ||
| + | 1.1 Motivation | ||
| + | One fundamental aspect of many human identification systems is that for each | ||
| + | individual, no more than one identity exists [1]. This is often due to an unfair | ||
| + | advantage that can be gained by a malicious individual having two identities, | ||
| + | for example, they may be able to fraudulently access additional credit at a bank | ||
| + | [2]. However, preventing malicious double enrolment is difficult. Many exist- | ||
| + | ing approaches uniquely identify individuals through an exchange of verifiable | ||
| + | documents and basic identification information [3]. However, these traditional | ||
| + | identification methods have a number of fundamental drawbacks: | ||
| + | 1. Through organisations storing basic identity attributes such as name, | ||
| + | birthdate and address, individuals can be linked across multiple independent | ||
| + | uses of their identity, without consent. | ||
| + | 2. When organisations requiring identity verification store a large amount | ||
| + | of information about each individual for identification purposes, it makes the | ||
| + | |||
| + | |||
| + | Copyright c 2019 for this paper by its authors. Use permitted under Creative | ||
| + | Commons License Attribution 4.0 International (CC BY 4.0). | ||
| + | �2 Tom Hamer, Kerry Taylor, Kee Siong Ng, Alwen Tiu | ||
| + | |||
| + | system vulnerable to attacks, as it is easy for a hacker who obtains access to the | ||
| + | internal records to learn many details about each individual. Worse still, basic | ||
| + | attributes such as address cannot easily be cancelled or changed and so a fresh | ||
| + | identity is very hard to establish. | ||
| + | 3. Over 1 billion individuals worldwide lack a form of officially recognised | ||
| + | identity such as a passport [4], which makes it very difficult to enrol with service | ||
| + | providers–such as banks, which need to uniquely identify individuals. | ||
| + | We propose a decentralised, privacy-preserving identity system which can | ||
| + | identify individuals through a bijective mapping from individuals to identifiers | ||
| + | used in a specific organisational context. It is designed to give individuals con- | ||
| + | trol over their own identity and shared information but to give organisations a | ||
| + | guarantee of uniqueness. To our knowledge, such a privacy preserving biometric | ||
| + | identification system does not exist in the literature. | ||
| + | |||
| + | 1.2 Related Work | ||
| + | Biometrics are a useful tool in identification of individuals because biometric | ||
| + | signatures, such as fingerprints, are unique to each human [5]. Further, they do | ||
| + | not depend on an individual needing to hold official identity documents. Cance- | ||
| + | lable biometrics have been created as a method to protect biometric signatures; | ||
| + | rather than storing the full biometric in identification databases, biometrics are | ||
| + | non-invertibly transformed to obfuscate the original biometric signature [6], and | ||
| + | only the obfuscated version is stored. However, one problem with current can- | ||
| + | celable biometric protocols is that the individual must trust the organisation | ||
| + | receiving their biometric signature to correctly transform and securely manage | ||
| + | the biometric signatures. | ||
| + | Homomorphic signatures allow a verifier to prove that a calculation has been | ||
| + | done correctly without having to access the underlying data [7]. We propose | ||
| + | utilising homomorphic signatures as a proof mechanism to allow the individ- | ||
| + | ual to obfuscate their own biometric signature on their personal device through | ||
| + | applying a specific non-invertable transformation that is requested by the organ- | ||
| + | isation wanting to identify the individual. The authors are unaware of previous | ||
| + | research proposing the use of homomorphic signatures to prove the validity of | ||
| + | cancelable biometrics. For the first time, we propose that the combination of | ||
| + | these techniques enables self-sovereign identity. | ||
| + | The W3C, an international standards organization, has introduced Distributed | ||
| + | Identifiers (DIDs) and Verifiable Claims. DIDs are linked to DID documents, | ||
| + | which store mechanisms used to authenticate the DID, service endpoints, and | ||
| + | other claims [8]. Using DIDs, the W3C aims to create a standard for individuals | ||
| + | and organizations to control their own identity. W3C Verifiable Claims are a | ||
| + | mechanism to express credentials on the Web in way that is cryptographically | ||
| + | secure, privacy respecting, and machine-verifiable [9]. The Sovrin foundation has | ||
| + | used DID and Verifiable claims to create a Blockchain based Identity System [10], | ||
| + | which enables distributed management of public keys and revocation of verifi- | ||
| + | able claims. Similarly, we propose to facilitate transfer of obfuscated biometrics | ||
| + | using Blockchain-based verifiable claims. | ||
| + | � Private Digital Identity on Blockchain 3 | ||
| + | |||
| + | Self-sovereign identity can be defined as “the concept of individuals or or- | ||
| + | ganizations having sole ownership of their digital and analogue identities, and | ||
| + | control over how their personal data is shared and used” [11]. A number of or- | ||
| + | ganisations including The Sovrin Foundation [10], Civic Ledger [13] and uPort | ||
| + | [14] have recently launched of self-sovereign identity protocols. The Sovrin Foun- | ||
| + | dation has been involved in the development of ID2020 which aims to create an | ||
| + | open and human-centric approach to identity [12]. They suggest benefits includ- | ||
| + | ing no physical papers and the convenience of biometric authentication. Other | ||
| + | attempts, such as Civic ledger’s solution, depend on the individual holding of- | ||
| + | ficial identity documents such as passports to enrol with their system, which is | ||
| + | problematic for displaced persons and others. | ||
| + | No self-sovereign identity schemes are currently available which offer non- | ||
| + | linkability of individually-controlled identities. Where existing protocols offer | ||
| + | the capacity to use biometric signatures, they do not allow individuals to non- | ||
| + | invertably transform their biometric signature before it is sent, and therefore do | ||
| + | not protect the privacy of personal biometrics. | ||
| + | We propose the concept of Unique Self-Sovereign Identity, or USI. USI means | ||
| + | that an individual can have at most one identity in a particular context, but iden- | ||
| + | tities cannot be linked between contexts without permission from the individual. | ||
| + | Therefore, individuals can be uniquely identified but still have control over their | ||
| + | personal identifying data. | ||
| + | |||
| + | |||
| + | 2 Solution Sketch | ||
| + | |||
| + | 2.1 Our USI protocol | ||
| + | |||
| + | We define three key roles: | ||
| + | Individual: a human who wants to be identified by a Service Provider. | ||
| + | Service Provider: an organisation requiring its individual users to complete | ||
| + | identity verification for access to services. The service provider commits to re- | ||
| + | quiring a specific variety of biometric for all of its users. | ||
| + | Trusted Organisation: an organisation within the trust network of both a | ||
| + | service provider and an individual. Service providers trust these organisations | ||
| + | to ensure that the biometric signatures are accurate and individuals trust these | ||
| + | organisations to destroy their biometric signature immediately after use. Trusted | ||
| + | organisations maintain public keys for each variety of biometric signature they | ||
| + | sign, meaning that service providers are able to verify that the biometric signa- | ||
| + | ture is of the variety they require. | ||
| + | In our protocol, each individual is identified for each service provider by a | ||
| + | cancelable (non-invertibly transformed) version of their biometric signature. To | ||
| + | achieve this non-invertibility, we use a Partial Discrete Fourier Transform for | ||
| + | non-linkable biometrics [6]. We extend existing cancelable biometric schemes | ||
| + | so that the service provider never has access to the complete biometric signa- | ||
| + | ture of each individual. To enable this, we use fully homomorphic signatures [7] | ||
| + | to prove the validity and correctness of a biometric signature which is already | ||
| + | �4 Tom Hamer, Kerry Taylor, Kee Siong Ng, Alwen Tiu | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | Fig. 1: Our USI Protocol showing the interactions between an Individual repre- | ||
| + | sented by a User Device, a Trusted Organisation, and several Service Providers | ||
| + | |||
| + | |||
| + | |||
| + | non-invertibly transformed by the individual before it is sent. Finally, the solu- | ||
| + | tion uses a Blockchain W3C standard Verifiable claims system [10], where our | ||
| + | homomorphic signature acts as the proof mechanism, meaning that individual | ||
| + | biometric signatures can be revoked when needed, and requiring that the pub- | ||
| + | lic key of the Trusted Organisation is publicly available. Our protocol does not | ||
| + | address authentication, that can employ conventional means such as username | ||
| + | and password. Our protocol is as follows (see figure 1). | ||
| + | 1. The individual enrols for an identity with a trusted organisation C of | ||
| + | their choice (see Algorithm 1). C collects finger print and vein scans, ensuring | ||
| + | that the biometrics are collected accurately and are truly the biometrics of the | ||
| + | individual. The assurance process will be determined by C’s own policy, but | ||
| + | will probably include human supervision. The individual stores the biometrics | ||
| + | together with a corresponding signature which is provided by C. C must not | ||
| + | store the biometrics–and is trusted not to by the individual. C has its pub- | ||
| + | lic key available on the Blockchain Verifiable Claims system. C adds required | ||
| + | randomly generated public parameters for homomorphic signature verification | ||
| + | to the ledger, and adds the signature for the biometric to a public revocation | ||
| + | register, attesting to the validity of the biometric. | ||
| + | 2. The individual wants to enrol with a service provider Bi and Bi requires | ||
| + | proof that they have not enrolled previously with Bi . To check, Bi requests an | ||
| + | P-DFT transform [6] with the trusted organisation’s specific parameters, from | ||
| + | the individual. These parameters are derived using the public key of Bi and | ||
| + | are therefore not used by any other organisation requiring identity verification. | ||
| + | � Private Digital Identity on Blockchain 5 | ||
| + | |||
| + | The individual computes the result of the transformation and sends it to Bi , | ||
| + | with a fully homomorphic signature under that P-DFT, along with the name of | ||
| + | trusted organisation C for lookup in the Blockchain Verifiable Claims Public Key | ||
| + | register. Verifying that the calculation was done correctly does not require the | ||
| + | individual to send the initial signature from C or the individual’s raw biometric. | ||
| + | 3. Service provider Bi looks up trusted organisation C’s public key on-chain | ||
| + | and verifies the homomorphic signature against the transformed biometrics sent | ||
| + | by the individual, the public parameters, and the public key of C (see Algorithm | ||
| + | 2). If it holds as valid, and the proof of non-revocation holds, then Bi checks all | ||
| + | current biometric vectors in its database for any vectors within a thresholded | ||
| + | similarity of the provided biometric. If it finds no matches, then Bi has verified | ||
| + | that the individual has not previously enrolled. | ||
| + | |||
| + | |||
| + | Algorithm 1 Trusted Organisation Creates Verifiable Claim for Individual to | ||
| + | Store | ||
| + | 1: procedure VCgen(pk,device) | ||
| + | 2: bV ec ← retrieve(device) //retrieve processed biometric vector for individual | ||
| + | from trusted organisation’s external device | ||
| + | 3: l ← length of bVec | ||
| + | 4: V ← randomly generate l public parameters | ||
| + | 5: x ← Signsk (bVec)//trusted organisation homomorphically signs the biometric | ||
| + | vector using its secret key | ||
| + | 6: writeToChain(V) //write the public parameters V onto the Blockchain | ||
| + | 7: claim ← generate a verifiable claim from trusted organisation’s metadata [9] | ||
| + | 8: claim.proof ← generate a proof property from signature x | ||
| + | 9: addToNonRevocationRegister(claim) //add the claim to a public non- | ||
| + | revocation register | ||
| + | 10: cleanup() //critically, trusted organisation must delete bVec, the user’s raw | ||
| + | biometric vector | ||
| + | 11: return claim | ||
| + | |||
| + | |||
| + | |||
| + | |||
| + | 2.2 Features of our USI System | ||
| + | |||
| + | Self-sovereignty: The identity holder has complete control over storage and | ||
| + | use of their identity. This is provided through the use of verifiable claims, and | ||
| + | the homomorphic proof mechanism, which allows individuals to reliably store | ||
| + | their own biometric signature [9],[7]. | ||
| + | Privacy and Non-linkability: The verifier, who receives a non-invertibly trans- | ||
| + | formed version of the biometric is unable to reverse the transformation and | ||
| + | discover the individual’s actual biometric signature. Provided that the transfor- | ||
| + | mations have different parameters, cross matching of biometrics is impossible. | ||
| + | These privacy and non-linkability features are provided by definition through | ||
| + | cancelable biometrics [5]. Further work is required on the non-linkability of the | ||
| + | proof mechanism as it is in some cases possible for proofs to be linked via the | ||
| + | �6 Tom Hamer, Kerry Taylor, Kee Siong Ng, Alwen Tiu | ||
| + | |||
| + | Algorithm 2 Service Provider Enrols Individual | ||
| + | 1: procedure AddNewUser(pi , biometricVariety, similarityThreshold ) //pi is | ||
| + | unique to each service provider | ||
| + | 2: claimP res ← request verifiable claim for P-DFT biometric transform from user | ||
| + | with parameters pi | ||
| + | 3: sig ← claimP res.proof.proof V alue // extract the transformed biometric from | ||
| + | the claim presentation [9] | ||
| + | 4: transbV ec ← claimP res.credentialSubject.transf ormedBiometric // extract | ||
| + | the proof from the verifiable claim presentation [9] | ||
| + | 5: V, pk ← retrieve(biometricVariety) //get public parameters V and trusted or- | ||
| + | ganisation’s public key for the biometric typepk from Blockchain | ||
| + | 6: if not validpk (V, sig, transbV ec) or isRevoked(claimPres) then | ||
| + | 7: //if the homomorphic signature does not hold, or the claim has been revoked | ||
| + | 8: return false | ||
| + | 9: for transformedBiometric in database do | ||
| + | 10: if transbV ec.isSimilar, similarityThreshold(transf ormedBiometric) then | ||
| + | 11: return false //if a similar biometric exists already then reject. | ||
| + | 12: addNewUserToDb(transbVec) //save transformed biometric | ||
| + | 13: return true //success | ||
| + | |||
| + | |||
| + | |||
| + | public parameters. This issue may be rectified either through Gorbunov’s multi- | ||
| + | data signing scheme [7] or by having the trusted organisation issue a number of | ||
| + | public parameters to each individual, and each one could be used to establish | ||
| + | an unlinkable identity. | ||
| + | Unique Identification: An individual can create as many signed biometrics | ||
| + | or identities as they like and enrol with any trusted organisation. The trans- | ||
| + | formation will always map them back to the same identifier, with an error rate | ||
| + | that is dependant on the quality of the matching algorithm and the number of | ||
| + | individuals in the system. This is irrespective of the trusted organisation and is | ||
| + | a result of biometric classification algorithms. The error rate arises from the im- | ||
| + | precise nature of biometric feature extraction. Note that each Service Provider | ||
| + | must require the same variety of biometric from all of their clients, or unique | ||
| + | identification is impossible. [5]. | ||
| + | Decentralisation: The trusted organisations do not have to communicate or be | ||
| + | in consensus for the Unique Identification property to hold. This is enabled | ||
| + | through Blockchain technology, which allows public keys and parameters to be | ||
| + | stored without a central authority [10]. | ||
| + | Biometrically Derived: Biometrics are used, meaning that the system does | ||
| + | not depend on individuals holding previous identity documents in order to enrol. | ||
| + | |||
| + | |||
| + | 3 Conclusion | ||
| + | |||
| + | We describe a USI identity system which is capable of addressing number of sig- | ||
| + | nificant current challenges in identity management. A key area for further work | ||
| + | is improving the performance of biometric identification. The error rate could | ||
| + | � Private Digital Identity on Blockchain 7 | ||
| + | |||
| + | prove to be an obstacle due to the compounding of errors in biometric identifi- | ||
| + | cation systems [15]. The need to trust the trusted organisation’s management of | ||
| + | biometric data is a potential drawback of our protocol that could be addressed | ||
| + | by legal or social mechanisms. Personal enrolment with the trusted organisation | ||
| + | potentially exposes information about identity that could be exploited. However, | ||
| + | we believe that this system could be feasible for distributed and privacy preserv- | ||
| + | ing identification at large scale. Future work includes a reference implementation | ||
| + | and security analysis. | ||
| + | |||
| + | |||
| + | References | ||
| + | 1. UNHCR.: UNHCR Resettlement Handbook. UNHCR - the UN Refugee Agency, | ||
| + | Geneva (2011) | ||
| + | 2. Saunders, K., Zucker, B.: Counteracting Identity Fraud in the Information Age: The | ||
| + | Identity Theft and Assumption Deterrence Act. In: International Review of Law, | ||
| + | Computers & Technology 1999, 2, pp 183–192. Routledge (1999). | ||
| + | 3. Moyano, J. P., Ross, O.: KYC Optimization Using Distributed Ledger Technology. | ||
| + | Business & Information Systems Engineering, 59(6), pp 411-423. (2017). | ||
| + | 4. Kour, G. & Saabne, R.: Global Identification Challenge by the Numbers. | ||
| + | http://id4d.worldbank.org/global-dataset/visualization. Accessed 30 July 2019. | ||
| + | 5. Punithavathi, P., Subbiah, G., 2017. Can Cancelable Biometrics Preserve Privacy? | ||
| + | Biometric Technology Today, 2017(7), pp 8–11. | ||
| + | 6. Yang, W. et al.: A fingerprint and finger-vein based cancelable multi-biometric sys- | ||
| + | tem. Pattern Recognition, Volume 78, pp 242–251. (2018) | ||
| + | 7. Gorbunov, S., Vaikuntanathan, V., Wichs, D: Leveled Fully Homomorphic Signa- | ||
| + | tures from Standard Lattices. In: STOC’15 Proceedings of the forty-seventh annual | ||
| + | ACM symposium on Theory of Computing, pp 469–477. ACM, New York, NY, USA | ||
| + | (2015) | ||
| + | 8. Reed, D. et al.: 2019. DID Spec. https://w3c-ccg.github.io/did-spec/. Accessed 30 | ||
| + | July 2019. | ||
| + | 9. Sporny, M. et al.: Verifiable Credentials Data Model, https://www.w3.org/TR/vc- | ||
| + | data-model/. Accessed 30 July 2019. | ||
| + | 10. Sovrin.: Sovrin Protocol and Token White Paper. https://sovrin.org/wp- | ||
| + | content/uploads/Sovrin-Protocol-and-Token-White-Paper.pdf Accessed 30 July | ||
| + | 2019. | ||
| + | 11. Metadium.: Introduction to Self-Sovereign Identity and Its 10 Guiding Prin- | ||
| + | ciples. https://medium.com/metadium/introduction-to-self-sovereign-identity-and- | ||
| + | its-10-guiding-principles-97c1ba603872. Accessed 30 July 2019. | ||
| + | 12. Leong, C.: ID2020: Digital Identity. https://www.accenture.com/us-en/insight- | ||
| + | blockchain-id2020. Accessed 30 July 2019. | ||
| + | 13. Civic Technologies.: Civic Whitepaper. | ||
| + | https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf. Accessed 30 July 2019. | ||
| + | 14. Dunphy, P., Petitcolas, F.: A First Look at Identity Management Schemes on the | ||
| + | Blockchain. https://arxiv.org/pdf/1801.03294.pdf. Accessed 30 July 2019. | ||
| + | 15. Pato, J. N., Millett, L. I.: Biometric Recognition: Challenges and Opportunities. | ||
| + | Washington, DC: The National Academies Press. (2010) | ||
| + | </pre> | ||
| + | <headertabs/> | ||
Revision as of 06:43, 21 July 2020
| Paper | |
|---|---|
| description | |
| id | Vol-2599/paper5 |
| wikidataid | →Q117337714 |
| title | Private Digital Identity on Blockchain |
| pdfUrl | |
| dblpUrl | |
| volume | Vol-2599→Vol-2599 |
| session | → |