• Aucun résultat trouvé

Privacy-preserving KYC on Ethereum

N/A
N/A
Protected

Academic year: 2021

Partager "Privacy-preserving KYC on Ethereum"

Copied!
20
0
0

Texte intégral

(1)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 1/20

Privacy-preserving KYC on Ethereum

Alex Biryukov, Dmitry Khovratovich, Sergei Tikhomirov

SnT, University of Luxembourg

9 May 2018

(2)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

Outline

Introduction

A decentralized KYC-compliant identity

(3)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 3/20

Identity is data that represents a user

Identity is used for:

I Authentication: proves the user is who they claim to be;

I Authorization: ensure the user is eligible for an action. In cryptographic terms, user is represented by a

(4)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

Centrally managed identity

I Prevalent model today

I User delegate identity management to companies, get access using password

(5)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 5/20

Decentralized identity

I Putting users in charge of managing their data

I Can be implemented using blockchains

I Does it respect privacy?

(6)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

Bitcoin

I A decentralized digital currency [Nakamoto 2008]

(7)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 7/20

Ethereum: generalized blockchain

I A blockchain-based application platform [Buterin 2014]

(8)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

Ethereum tokens

I A popular use case for smart contracts

I A fungible unit of value maintained by a smart contract

I ERC20 is the de-facto standard token API

(9)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 9/20

ERC20 functions

I transfer – send tokens to an address

I approve – allow other user to transfer my tokens

(10)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

A decentralized KYC-compliant identity

Our identity management design for financial services is:

I Decentralized (on-chain)

I Privacy-preserving

I Can be made compliant

(11)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 11/20

Cryptographic accumulator

I A cryptographic primitive: absorbs algebraic objects

I Provides interface to verify whether a value was accumulated

(12)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

Accumulator-based identity workflow (1/2)

I A KYC Provider publishes a contract with an empty accumulator

I A User interacts with the Provider (possibly offline) and gets their value accumulated

(13)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 13/20

Accumulator-based identity workflow (2/2)

To prove eligibility, a user submits an (atomic) zero-knowledge proof of the statement:

I I know the private key corresponding to msg.sender;

(14)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

KYC Provider interface

I add(user, token) – makes user eligible

I remove(user, token) – makes user not eligible

(15)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 15/20

Use case 1: compliant exchange

I An exchange verifies users before making transactions

(16)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

Use case 2: compliant token

I A token verifies users before making transactions

(17)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 17/20

Implementation details

I A PoC implementation (not privacy-preserving): joint 1st prize at the Luxblock hackathon in May 2017

I (The team also included: Daniel Feher, Dmitry Khovratovich, Aleksei Udovenko, Maciej Zurad)

I Accumulator implementation depends on new opcodes: currently Ethereum does not natively support all required cryptographic operations

(18)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work

Conclusion and future work

I Ethereum provides ways to encode and enforce digital agreements

I Cryptography allows for additional eligibility checks which minimally impact the users’ privacy

(19)

Privacy-preserving KYC on Ethereum Biryukov, Khovratovich, Tikhomirov Introduction A decentralized KYC-compliant identity Conclusion and future work 19/20

Research question

(20)

Références

Documents relatifs

In our context, the blockchain orchestration tool automates the deployment of blockchain infrastructure (nodes, network) and smart contracts in a given environment.. Here, we focus

The solution achieves the following functionalities: (1) it enables users to store their private data securely; (2) it enables users, from the same or different OSNs, to compute

Our system makes use of a number of different concepts and technologies, including a private, permissioned blockchain for ac- cess control, and containerisation as a method of

The protocol Semi-Honest-k-Shares is a real privacy preserving reputation protocol (Definition 10) under the semi-honest model, since: 1) Semi-Honest-k- Shares has the same

A KYC contract provides an API to other contracts so that external services can determine if a given user is KYC-approved for using a given token.. A KYC provider (a governmental

Thus preserving user privacy while computing robust reputation is a real and important issue that this paper addresses. Our proposition combines techniques and algorithms coming

Idemix is an ABC protocol based on a Camenisch-Lysyanskaya (CL) signature scheme [12], that provides a solution for strong privacy-preserving authentication with a disclosure method

The corresponding verifier disclosure contains a credential trace and a credential template which contain all the information such as the attribute names and values and the