Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

Data Access Control for Secure Authentication Using Dual VC Scheme Based on CP-ABE in DID

Authors
Kim, TaehoonHwang, Yong-WoonSeo, DaeheeLee, Im-Yeong
Issue Date
Mar-2024
Publisher
World Scientific Publishing Co
Keywords
Decentralized identifier; self-sovereign identity; attribute-based encryption; dual verifiable credentials
Citation
Journal of Circuits, Systems and Computers, v.33, no.05
Journal Title
Journal of Circuits, Systems and Computers
Volume
33
Number
05
URI
https://scholarworks.bwise.kr/sch/handle/2021.sw.sch/25623
DOI
10.1142/S0218126624500944
ISSN
0218-1266
1793-6454
Abstract
In a Decentralized Identifier (DID), the Holder does not depend on a third party but controls self-identity information and is authenticated by the Verifier. Therefore, the Verifier can request verification data for access control from the Verifiable Data Registry (VDR) and credentials to authenticate the Holder. Data access control should be used when requesting data access such that only authorized Verifiers can access it. Consequently, studies on secure and efficient data access control have been conducted, and among them a scheme using Ciphertext Policy Attribute-based Encryption (CP-ABE) is underway. However, when the CP-ABE scheme is applied to the DID, the Holder's extended Self-Sovereign Identity (SSI), which proves that the Holder has approved access to the Holder's data stored in the VDR, is not ensured. Furthermore, the VDR does not verify the Verifier's data access rights, resulting in unauthorized verification and illegal access to data by the user. And issue infringement of the Holder's privacy, where Verifiers can infer the Holder by sharing and connecting the same DID-based Verifiable Presentations (VPs) of the Holder. Also, it leads to overheads in the amount of computation and search time for encryption/decryption. Therefore, in this paper, we propose a data access control for secure authentication by solving the security vulnerabilities of CP-ABE and using a CP-ABE-based dual Verifiable Credential (VC) scheme in DID.
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher Lee, Im Yeong photo

Lee, Im Yeong
College of Software Convergence (Department of Computer Software Engineering)
Read more

Altmetrics

Total Views & Downloads

BROWSE