English  |  正體中文  |  简体中文  |  Post-Print筆數 : 27 |  Items with full text/Total items : 118786/149850 (79%)
Visitors : 81688269      Online Users : 37
RC Version 6.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: https://nccur.lib.nccu.edu.tw/handle/140.119/158785


    Title: 去中心化身分驗證的隱私強化技術:基於指定驗證者簽章及泛用環簽章的可驗證憑證
    Privacy-Enhancing Technologies for Decentralized Identity Authentication: Verifiable Credentials based on Designated Verifier Signature and Universal Ring Signature
    Authors: 鄭凱恩
    Cheng, Kai-En
    Contributors: 左瑞麟
    Tso, Raylin
    鄭凱恩
    Cheng, Kai-En
    Keywords: 去中心化身分識別符
    可驗證憑證
    隱私保護
    泛用環簽章
    指定驗證者簽章
    Decentralized Identifiers
    Verifiable Credentials
    Privacy-preserving
    Universal Ring Signature
    Designated Verifier Signature
    Date: 2025
    Issue Date: 2025-08-04 15:47:08 (UTC+8)
    Abstract: 在身分自主權(Self-Sovereign Identity, SSI)的概念逐漸受到重視後,中心化的身分驗證機制不再是使用者進行服務存取時最好的選擇。身分自主權的核心可以概括為:一,對身分屬性的存取必須在使用者的控制之下;二,使用者能夠在不同情境中有選擇地公開必要屬性、隱藏非必要屬性,而無需憑證發行者的協助。去中心化身分驗證機制因其可以提供隱私保護而受到重視,去中心化身分識別符(Decentralized Identifiers, DIDs)與可驗證憑證(Verifiable Credentials, VCs)技術就是典型的例子。利用去中心化系統能有效解決中心化架構中用戶身分被掌握在身分提供商手中的缺點。然而,當驗證者間存在共謀的疑慮時,支援選擇性揭露的JWT(Selective Disclosure for JWTs, SD-JWT)、零知識證明等現有機制仍可能讓用戶的隱私面臨風險。研究提出了一種結合去中心化身分識別符、可驗證憑證和數位簽章的隱私強化方案,保持便利性和去中心化特性的同時,即使在驗證者共謀的情況下也能確保用戶身份隱私受到保護。
    With the growing emphasis on Self-Sovereign Identity, centralized identity verification mechanisms are no longer considered optimal for service access. Decentralized identity systems have gained attention for their ability to enhance privacy, with technologies such as Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) being representative examples. These systems address key drawbacks of centralized architectures, where identity information is controlled by Identity Providers. However, when verifiers are potentially colluding, existing solutions such as SD-JWT (Selective Disclosure for JWTs) and Zero-Knowledge Proofs may still pose privacy risks. The thesis proposes a privacy-enhancing solution that integrates DIDs, VCs, and digital signatures. The proposed approach maintains both usability and decentralization while ensuring that user identity privacy is preserved even in the presence of collusion between verifiers.
    Reference: [1] Masayuki Abe, Miyako Ohkubo, and Koutarou Suzuki. 1-out-of-n signatures from a variety of keys. In International conference on the theory and application of cryptology and information security, pages 415–432. Springer, 2002.
    [2] Man Ho Au, Willy Susilo, and Yi Mu. Constant-size dynamic k-taa. In International conference on security and cryptography for networks, pages 111–125. Springer, 2006.
    [3] David Bauer, Douglas M Blough, and David Cash. Minimal information disclosure with efficiently verifiable credentials. In Proceedings of the 4th ACM workshop on Digital identity management, pages 15–24, 2008.
    [4] Dan Boneh, Xavier Boyen, and Hovav Shacham. Short group signatures. In Annual international cryptology conference, pages 41–55. Springer, 2004.
    [5] Jan Camenisch and Markus Stadler. Proof systems for general statements about discrete logarithms. Technical Report/ETH Zurich, Department of Computer Science, 260, 1997.
    [6] Brian Campbell, Chuck Mortimore, and Michael B. Jones. Security Assertion Markup Language (SAML) 2.0 Profile for OAuth 2.0 Client Authentication and Authorization Grants. RFC 7522, May 2015.
    [7] David Chaum and Torben Pryds Pedersen. Wallet databases with observers. In Annual international cryptology conference, pages 89–105. Springer, 1992.
    [8] David Chaum and Eugène Van Heyst. Group signatures. In Advances in Cryptology—EUROCRYPT’91: Workshop on the Theory and Application of Cryptographic Techniques Brighton, UK, April 8–11, 1991 Proceedings 10, pages 257–265. Springer, 1991.
    [9] Yevgeniy Dodis, Harish Karthikeyan, and Daniel Wichs. Updatable public key encryption in the standard model. In Theory of Cryptography: 19th International Conference, TCC 2021, Raleigh, NC, USA, November 8–11, 2021, Proceedings, Part III 19, pages 254–285. Springer, 2021.
    [10] European Commission. Eu digital identity wallet home, 2025.
    [11] Daniel Fett, Kristina Yasuda, and Brian Campbell. Selective Disclosure for JWTs (SD-JWT). Internet-Draft draft-ietf-oauth-selective-disclosure-jwt-14, Internet Engineering Task Force, November 2024. Work in Progress.
    [12] Amos Fiat and Adi Shamir. How to prove yourself: Practical solutions to identification and signature problems. In Conference on the theory and application of cryptographic techniques, pages 186–194. Springer, 1986.
    [13] Nikos Fotiou, Iakovos Pittaras, Spiros Chadoulos, Vasilios A Siris, George C Polyzos, Nikolaos Ipiotis, and Stratos Keranidis. Authentication, authorization, and selective disclosure for iot data sharing using verifiable credentials and zero-knowledge proofs. In International Workshop on Emerging Technologies for Authorization and Authentication, pages 88–101. Springer, 2022.
    [14] GOV.UK Wallet. Uk digital wallet, 2025.
    [15] Dick Hardt. The OAuth 2.0 Authorization Framework. RFC 6749, October 2012.
    [16] Patrick Herbke and Anish Sapkota. Decentralized credential verification. ArXiv preprint arXiv:2406.11535, 2024.
    [17] Japan Digital Agency. Japan digital identity wallet, 2025.
    [18] Emmanouil Koukoularis, Vasileios Markopoulos, and Nikos Voutsinas. A self-sovereign way to exchange educational credentials. Proceedings of European University, 95:311–319, 2023.
    [19] CD Nassar Kyriakidou, AM Papathanasiou, I Pittaras, N Fotiou, Y Thomas, and GC Polyzos. Attribute-based access control utilizing verifiable credentials for multi-tenant iot systems. In 2024 IEEE 4th International Conference on Electronic Communications, Internet of Things and Big Data (ICEIB), pages 57–62. IEEE, 2024.
    [20] Carlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari, Paolo Bellavista, and Mauro Conti. A survey on decentralized identifiers and verifiable credentials. arXiv preprint arXiv:2402.02455, 2024.
    [21] Christian Paquin, Guru-Vamsi Policharla, and Greg Zaverucha. Crescent: Stronger privacy for existing credentials. Cryptology ePrint Archive, 2024.
    [22] Blaž Podgorelec, Lukas Alber, and Thomas Zefferer. What is a (digital) identity wallet? a systematic literature review. In 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC), pages 809–818, 2022.
    [23] Ronald L Rivest, Adi Shamir, and Yael Tauman. How to leak a secret. In Advances in Cryptology—ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings 7, pages 552–565. Springer, 2001.
    [24] Denis Roio, Rebecca Selvaggini, Gabriele Bellini, Andrea D’Intino, and BV Fork-bomb. Privacy preserving selective disclosure of verifiable credentials with unlinkable threshold revocation. 2024.
    [25] Shahrokh Saeednia, Steve Kremer, and Olivier Markowitch. An efficient strong designated verifier signature scheme. In Information Security and Cryptology-ICISC 2003: 6th International Conference, Seoul, Korea, November 27-28, 2003. Revised Papers 6, pages 40–54. Springer, 2004.
    [26] Amit Sahai and Brent Waters. Fuzzy identity-based encryption. In Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22-26, 2005. Proceedings 24, pages 457–473. Springer, 2005.
    [27] Arto Salomaa. Public-key cryptography. 2013.
    [28] Claus-Peter Schnorr. Efficient signature generation by smart cards. Journal of cryptology, 4:161–174, 1991.
    [29] Xiaoqiang Sun, F Richard Yu, Peng Zhang, Zhiwei Sun, Weixin Xie, and Xiang Peng. A survey on zero-knowledge proof in blockchain. IEEE network, 35(4):198–205, 2021.
    [30] Raylin Tso. A new way to generate a ring: Universal ring signature. Computers & Mathematics with Applications, 65(9):1350–1359, 2013.
    [31] World Wide Web Consortium (W3C). Verifiable credentials data model v2.0. https://www.w3.org/TR/vc-data-model-2.0/, 19, December, 2024.
    [32] World Wide Web Consortium (W3C). Decentralized identifiers (dids) v1.0. https://www.w3.org/TR/did-core/, 19, July, 2022.
    [33] Yalan Wang, Liqun Chen, Long Meng, and Christopher JP Newton. Vcadid: Verifiable credentials with anonymous decentralized identities. Classical and post-quantum anonymous signatures, page 55, 2024.
    [34] Tobias Wich, Detlef Hühnlein, Florian Otto, and Mike Prechtl. Qualified electronic signatures with the eu digital identity wallet. In Open Identity Summit 2024, pages 151–162. Gesellschaft für Informatik eV, 2024.
    Description: 碩士
    國立政治大學
    資訊安全碩士學位學程
    112791011
    Source URI: http://thesis.lib.nccu.edu.tw/record/#G0112791011
    Data Type: thesis
    Appears in Collections:[資訊安全碩士學位學程] 學位論文

    Files in This Item:

    File Description SizeFormat
    101101.pdf2279KbAdobe PDF2View/Open


    All items in 政大典藏 are protected by copyright, with all rights reserved.


    社群 sharing

    著作權政策宣告 Copyright Announcement
    1.本網站之數位內容為國立政治大學所收錄之機構典藏,無償提供學術研究與公眾教育等公益性使用,惟仍請適度,合理使用本網站之內容,以尊重著作權人之權益。商業上之利用,則請先取得著作權人之授權。
    The digital content of this website is part of National Chengchi University Institutional Repository. It provides free access to academic research and public education for non-commercial use. Please utilize it in a proper and reasonable manner and respect the rights of copyright owners. For commercial use, please obtain authorization from the copyright owner in advance.

    2.本網站之製作,已盡力防止侵害著作權人之權益,如仍發現本網站之數位內容有侵害著作權人權益情事者,請權利人通知本網站維護人員(nccur@nccu.edu.tw),維護人員將立即採取移除該數位著作等補救措施。
    NCCU Institutional Repository is made to protect the interests of copyright owners. If you believe that any material on the website infringes copyright, please contact our staff(nccur@nccu.edu.tw). We will remove the work from the repository and investigate your claim.
    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback