Decentralized and Privacy-Preserving Key Management Model

Data centralization and the growing rate of security breaches and identity fraud have led us to seek privacy-preserving and decentralized identity management solutions. The success of decentralized models, such as Self-Sovereign Identity, hinges on the positive-sum combination of usability and security. To support this goal, we propose a decentralized system capable of performing key management operations including key generation, key backup, and key recovery. In addition we propose our preliminary solution for a decentralized identity verification protocol. To this end, we design a digital wallet that relies on Shamir’s Secret sharing scheme and blockchain technology, and we present a number of the security parameters affecting our model.

[1]  Fabrizio d'Amore,et al.  Authentication as a service: Shamir Secret Sharing with byzantine components , 2018, ArXiv.

[2]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[3]  V. P. Binu,et al.  An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation , 2014, 2014 International Conference on Data Science & Engineering (ICDSE).

[4]  Hugo Krawczyk,et al.  Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.

[5]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[6]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[7]  N. Asokan,et al.  Trusted execution environments on mobile devices , 2013, CCS.

[8]  Jean Everson Martina,et al.  Audit and backup procedures for hardware security modules , 2008, IDtrust '08.

[9]  John Bloom,et al.  A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.

[10]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .

[11]  Félix Gómez Mármol,et al.  TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.

[12]  Durgesh Kumar Mishra,et al.  Privacy Preserving k Secure Sum Protocol , 2009, ArXiv.

[13]  First A. Neha Pathak,et al.  An efficient method for privacy preserving data mining in secure multiparty computation , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).

[14]  Liu Dan,et al.  A key escrow scheme to IOT based on Shamir , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).

[15]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[16]  G. R. Blakley,et al.  Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[17]  Baruch Awerbuch,et al.  Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).

[18]  Moti Yung,et al.  How to share a function securely , 1994, STOC '94.

[19]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[20]  Wenzhe Sun,et al.  A Proposal of Key Recovery Mechanism for Personal Decryptographic Keys , 2011, 2011 International Conference on Internet Technology and Applications.

[21]  Chris J. Mitchell,et al.  Matching key recovery mechanisms to business requirements , 2005, Comput. Secur..