$\require{mediawiki-texvc}$

연합인증

연합인증 가입 기관의 연구자들은 소속기관의 인증정보(ID와 암호)를 이용해 다른 대학, 연구기관, 서비스 공급자의 다양한 온라인 자원과 연구 데이터를 이용할 수 있습니다.

이는 여행자가 자국에서 발행 받은 여권으로 세계 각국을 자유롭게 여행할 수 있는 것과 같습니다.

연합인증으로 이용이 가능한 서비스는 NTIS, DataON, Edison, Kafe, Webinar 등이 있습니다.

한번의 인증절차만으로 연합인증 가입 서비스에 추가 로그인 없이 이용이 가능합니다.

다만, 연합인증을 위해서는 최초 1회만 인증 절차가 필요합니다. (회원이 아닐 경우 회원 가입이 필요합니다.)

연합인증 절차는 다음과 같습니다.

최초이용시에는
ScienceON에 로그인 → 연합인증 서비스 접속 → 로그인 (본인 확인 또는 회원가입) → 서비스 이용

그 이후에는
ScienceON 로그인 → 연합인증 서비스 접속 → 서비스 이용

연합인증을 활용하시면 KISTI가 제공하는 다양한 서비스를 편리하게 이용하실 수 있습니다.

A Security Analysis of Blockchain-Based Did Services 원문보기

IEEE access : practical research, open solutions, v.9, 2021년, pp.22894 - 22913  

Kim, Bong Gon (Stony Brook University, Stony Brook, NY, USA) ,  Cho, Young-Seob (Electronics and Telecommunications Research Institute, Daejeon, South Korea) ,  Kim, Seok-Hyun (Electronics and Telecommunications Research Institute, Daejeon, South Korea) ,  Kim, Hyoungshick (Sungkyunkwan University, Suwon, South Korea) ,  Woo, Simon S. (Sungkyunkwan University, Suwon, South Korea)

Abstract AI-Helper 아이콘AI-Helper

Decentralized identifiers (DID) has shown great potential for sharing user identities across different domains and services without compromising user privacy. DID is designed to enable the minimum disclosure of the proof from a user’s credentials on a need-to-know basis with a contextualized ...

참고문헌 (83)

  1. 10.1109/CIC.2018.00033 

  2. 10.1109/HICSS.2016.345 

  3. Tompa, Martin, Woll, Heather. How to share a secret with cheaters. Journal of cryptology : the journal of the International Association for Cryptologic Research, vol.1, no.3, 133-138.

  4. 10.1109/ICDCS.2019.00119 

  5. RFC6840 Clarifications and Implementation Notes for DNS Security (DNSSEC) weiler 2013 

  6. 10.1109/NCA.2019.8935025 

  7. Decentralized Identifier Resolution (Did Resolution) V0 2 2020 

  8. Crypto Obfuscator For Net (V2020) 2020 

  9. 10.1007/978-3-540-89556-5_4 

  10. Huaqun Wang, Futai Zhang, Yanfei Sun. Cryptanalysis of a Generalized Ring Signature Scheme. IEEE transactions on dependable and secure computing, vol.6, no.2, 149-151.

  11. arXiv 1808 06254 SABRE: Protecting bitcoin against routing attacks apostolaki 2018 

  12. Proc IEEE InfoCom Enhancing cache robustness for content-centric networking xie 2012 2426 

  13. Wallet Query Language 2020 

  14. Walkthrough India 2020 

  15. Did Documents 2020 

  16. SOFSEM Formal analysis of Facebook connect single sign-on authentication protocol miculan 2011 11 22 

  17. Verifiable Data Registry 2020 

  18. Hyperledger Ursa Explainer 2020 

  19. Hyperledger Aries Explainer 2020 

  20. Meet Connect Me the First Sovrin-Based Digital Wallet 2020 

  21. Microservice Architecture Aligning Principles Practices and Culture nadareishvili 2016 

  22. Server-Side Request Forgery (SSRF) 2020 

  23. 10.1109/BDCloud.2018.00137 

  24. Proc IEEE Eur Symp Secur Privacy (EuroS P) Redactable blockchain–or–rewriting history in bitcoin and friends ateniese 2017 111 

  25. RADIUS Securing Public Access to Private Resources hassell 2002 

  26. Brassard, G., Chaum, D., Crepeau, C.. Minimum disclosure proofs of knowledge. Journal of computer and system sciences, vol.37, no.2, 156-189.

  27. Proc Project Athena Tech Plan Kerberos authentication and authorization system miller 1988 

  28. Chameleon hashing and signatures krawczyk 1998 

  29. 10.14722/ndss.2019.23066 

  30. SAML: The secret to centralized identity management simon 2004 

  31. arXiv 1904 03487 Exploring the attack surface of blockchain: A systematic overview saad 2019 

  32. 10.1109/BLOC.2019.8751229 

  33. The Path to Self-Sovereign Identity allen 2020 

  34. 10.1109/SP.2017.29 

  35. Kim, Eunsoo, Cho, Young-Seob, Kim, Bedeuro, Ji, Woojoong, Kim, Seok-Hyun, Woo, Simon S., Kim, Hyoungshick. Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?. IEEE internet of things magazine, vol.3, no.4, 82-87.

  36. Proc Int Conf Res Secur Standardisation Vision: A critique of immunity passports and W3C decentralized identifiers halpin 2020 10.1007/978-3-030-64357-7_7 148 

  37. Art 4 GDPR Definitions 2020 

  38. Eisenstadt, Marc, Ramachandran, Manoharan, Chowdhury, Niaz, Third, Allan, Domingue, John. COVID-19 Antibody Test/Vaccination Certification: There's an App for That. IEEE open journal of engineering in medicine and biology, vol.1, 148-155.

  39. Peer DID Method 1 0 Specification 2020 

  40. Enhancing the privacy of decentralized identifiers with ring signatures biswas 2020 

  41. Part of the Original Why i wrote PGP zimmermann 1991 1 

  42. 10.1007/3-540-45831-X_4 

  43. Mediators and Relays 2020 

  44. Cross-Domain Messaging 2020 

  45. Tourani, Reza, Misra, Satyajayant, Mick, Travis, Panwar, Gaurav. Security, Privacy, and Access Control in Information-Centric Networking: A Survey. IEEE Communications surveys and tutorials, vol.20, no.1, 566-600.

  46. Cory Wright's blog Understanding kaminsky’s dns bug wright 2008 

  47. Decentralized Identifier Resolution (Did Resolution) V0 2 2020 

  48. 10.1145/3243734.3243785 

  49. Proc APWG Symp Electron Crime Res (eCrime) Inside a phisher’s mind: Understanding the anti-phishing ecosystem through phishing kit analysis oest 2018 1 

  50. Do, Q., Martini, B., Choo, K.K.R.. Exfiltrating data from Android devices. Computers & security, vol.48, 74-91.

  51. Smali/Baksmali Explainer gruver 2020 

  52. Conti, Mauro, Dragoni, Nicola, Lesyk, Viktor. A Survey of Man In The Middle Attacks. IEEE Communications surveys and tutorials, vol.18, no.3, 2027-2051.

  53. Decentralized identifiers (DIDs) v1 0 Core architecture data model and representations reed 2020 

  54. Proc Surveill Cultures A Global Surveill Soc A critical review of 10 years of privacy technology danezis 2010 1 

  55. Verifiable credentials data model 1 0 Expressing verifiable information on the web 2020 

  56. Aries RFC 0004 Agents 2020 

  57. DKMS (Decentralized Key Management System) Design and Architecture V4 reed 2020 

  58. Aries RFC 0005 Did Communication hardman 2020 

  59. Universal Resolver 2020 

  60. Implementing Threshold Schemes sprenkels 2020 

  61. 10.1109/COMPSAC.2018.10299 

  62. Karami, A., Guerrero-Zapata, M.. An ANFIS-based cache replacement method for mitigating cache pollution attacks in Named Data Networking. Computer networks, vol.80, 51-65.

  63. Proc Int Conf Wireless Netw (ICWN) Implementation and performance analysis of PBKDF2, Bcrypt, Scrypt algorithms ertaul 2016 66 

  64. 10.6028/NIST.FIPS.202 

  65. Shamir’s Secret-Sharing for Mnemonic Codes 2020 

  66. Proc Annu Cryptol Conf Cryptographic extraction and key derivation: The HKDF scheme krawczyk 2010 631 

  67. 10.1109/INFCOM.1999.749260 

  68. A Protocol and Token for SelfSovereign Identity and Decentralized Trust 2020 

  69. Microsoft Corp The laws of identity cameron 2005 5 8 

  70. A Decentralized Open Source Solution for Digital Identity and Access Management 2020 

  71. Uport Specs 2020 

  72. Decentralized identity and access management framework for Internet of Things devices omar 2020 

  73. Blind Trust Before Verification gultsch 2020 

  74. 10.1109/ISCC50000.2020.9219594 

  75. 10.1145/2885990.2885999 

  76. 10.1109/Blockchain.2019.00004 

  77. Shamir, Adi. How to share a secret. Communications of the ACM, vol.22, no.11, 612-613.

  78. Trust on First Use 2020 

  79. Did Exchange Protocol 1 0 2020 

  80. Input Metadata Properties 2020 

  81. Proc IEEE Secur Privacy The provable security of ed25519: Theory and practice brendel 2020 1 

  82. Did Url Dereferencing 2020 

  83. Did Url Syntax 2020 

LOADING...
섹션별 컨텐츠 바로가기

AI-Helper ※ AI-Helper는 오픈소스 모델을 사용합니다.

AI-Helper 아이콘
AI-Helper
안녕하세요, AI-Helper입니다. 좌측 "선택된 텍스트"에서 텍스트를 선택하여 요약, 번역, 용어설명을 실행하세요.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.

선택된 텍스트

맨위로