Abstract
AbstractThe General Data Protection Regulation highlights the principle of data minimization, which means that only data required to successfully accomplish a given task should be processed. In this paper, we propose a Blockchain-based scheme that allows users to have control over the personal data revealed when accessing a service. The proposed solution does not rely on sophisticated cryptographic primitives, provides mechanisms for revoking the authorization to access a service and for guessing the identity of a user only in cases of need, and is compliant with the recent eIDAS Regulation. We prove that the proposed scheme is secure and reaches the expected goal, and we present an Ethereum-based implementation to show the effectiveness of the proposed solution.
Funder
Università degli Studi Mediterranea di Reggio Calabria
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference42 articles.
1. Attrapadung, N, & Imai, H (2009). Dual-policy attribute based encryption. In M. Abdalla, D. Pointcheval, P.A. Fouque, & D. Vergnaud (Eds.) Applied cryptography and network security (pp. 168–185). Berlin: Springer.
2. Bertoni, G, Daemen, J, Peeters, M, & Van Assche, G. (2009). Keccak specifications. Submission to nist (round 2), pp 320–337.
3. Bethencourt, J, Sahai, A, & Waters, B (2007). Ciphertext-policy attribute-based encryption. In 2007 IEEE Symposium on Security and Privacy (SP ’07). https://doi.org/10.1109/SP.2007.11 (pp. 321–334).
4. CEF Digital. (2019). eID Profile. https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/eIDAS+eID+Profile, Accessed 13 January 2021.
5. eIDAS eID Technical Subgroup. (2019). eIDAS SAML Message Format. https://ec.europa.eu/cefdigital/wiki/download/attachments/82773108/eIDAS%20SAML%20Attribute%20Profile%20v1.2%20Final.pdf, Accessed 13 January 2021.
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献