Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets

Recent years have seen an increased interest in digital wallets for a multitude of use cases including online banking, cryptocurrency, and digital identity management. Digital wallets play a pivotal role in the secure management of cryptographic keys and credentials, and for providing certain identity management services. In this paper, we examine a proof-of-concept digital wallet in the context of Self-Sovereign Identity and provide a practical decentralized key recovery solution using Shamir's secret sharing scheme and Hyperledger Indy distributed ledger technology.

[1]  Chris J. Mitchell,et al.  Matching key recovery mechanisms to business requirements , 2005, Comput. Secur..

[2]  Adi Shamir,et al.  How to share a secret , 1979, CACM.

[3]  Andrew Chi-Chih Yao,et al.  Protocols for secure computations , 1982, FOCS 1982.

[4]  N. Asokan,et al.  Trusted execution environments on mobile devices , 2013, CCS.

[5]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .

[6]  Wenzhe Sun,et al.  A Proposal of Key Recovery Mechanism for Personal Decryptographic Keys , 2011, 2011 International Conference on Internet Technology and Applications.

[7]  Yehuda Lindell,et al.  Secure Multiparty Computation for Privacy-Preserving Data Mining , 2009, IACR Cryptol. ePrint Arch..

[8]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[9]  First A. Neha Pathak,et al.  An efficient method for privacy preserving data mining in secure multiparty computation , 2013, 2013 Nirma University International Conference on Engineering (NUiCONE).

[10]  G. R. BLAKLEY Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).

[11]  Durgesh Kumar Mishra,et al.  Privacy Preserving k Secure Sum Protocol , 2009, ArXiv.

[12]  Silvio Micali,et al.  How to play ANY mental game , 1987, STOC.

[13]  Benny Pinkas,et al.  Cryptographic techniques for privacy-preserving data mining , 2002, SKDD.

[14]  Liu Dan,et al.  A key escrow scheme to IOT based on Shamir , 2013, 2013 International Conference on Communications, Circuits and Systems (ICCCAS).

[15]  Félix Gómez Mármol,et al.  TRIMS, a privacy-aware trust and reputation model for identity management systems , 2010, Comput. Networks.

[16]  V. P. Binu,et al.  An effective private data storage and retrieval system using secret sharing scheme based on secure multi-party computation , 2014, 2014 International Conference on Data Science & Engineering (ICDSE).

[17]  Moti Yung,et al.  How to share a function securely , 1994, STOC '94.

[18]  Jean Everson Martina,et al.  Audit and backup procedures for hardware security modules , 2008, IDtrust '08.