Taehoon Kim , Dahee Seo , Im-Yeong Lee , Su-Hyun Kim
{"title":"在去中心化标识符中使用基于属性的签名实现隐私和可追溯性的新方法","authors":"Taehoon Kim , Dahee Seo , Im-Yeong Lee , Su-Hyun Kim","doi":"10.1016/j.hcc.2025.100326","DOIUrl":null,"url":null,"abstract":"<div><div>This paper proposes a novel scheme that enhances privacy and ensures accountability by mitigating signature-based correlation risks in decentralized identifiers (DIDs). Existing DIDs often rely on traditional digital signatures, making them vulnerable to attacks that link user identities across transactions. Our proposed scheme leverages attribute-based signatures (ABS) to provide anonymous authentication, preventing such correlation and protecting user privacy. To deter the abuse of anonymity, it incorporates a traceability mechanism, enabling authorized entities to trace a user’s DID when necessary. The scheme’s security, including anonymity and traceability, is formally proven under the random oracle model.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100326"},"PeriodicalIF":3.0000,"publicationDate":"2025-05-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A novel approach to privacy and traceability using attribute-based signature in decentralized identifier\",\"authors\":\"Taehoon Kim , Dahee Seo , Im-Yeong Lee , Su-Hyun Kim\",\"doi\":\"10.1016/j.hcc.2025.100326\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This paper proposes a novel scheme that enhances privacy and ensures accountability by mitigating signature-based correlation risks in decentralized identifiers (DIDs). Existing DIDs often rely on traditional digital signatures, making them vulnerable to attacks that link user identities across transactions. Our proposed scheme leverages attribute-based signatures (ABS) to provide anonymous authentication, preventing such correlation and protecting user privacy. To deter the abuse of anonymity, it incorporates a traceability mechanism, enabling authorized entities to trace a user’s DID when necessary. The scheme’s security, including anonymity and traceability, is formally proven under the random oracle model.</div></div>\",\"PeriodicalId\":100605,\"journal\":{\"name\":\"High-Confidence Computing\",\"volume\":\"5 4\",\"pages\":\"Article 100326\"},\"PeriodicalIF\":3.0000,\"publicationDate\":\"2025-05-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"High-Confidence Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2667295225000303\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"High-Confidence Computing","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2667295225000303","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
A novel approach to privacy and traceability using attribute-based signature in decentralized identifier
This paper proposes a novel scheme that enhances privacy and ensures accountability by mitigating signature-based correlation risks in decentralized identifiers (DIDs). Existing DIDs often rely on traditional digital signatures, making them vulnerable to attacks that link user identities across transactions. Our proposed scheme leverages attribute-based signatures (ABS) to provide anonymous authentication, preventing such correlation and protecting user privacy. To deter the abuse of anonymity, it incorporates a traceability mechanism, enabling authorized entities to trace a user’s DID when necessary. The scheme’s security, including anonymity and traceability, is formally proven under the random oracle model.