P2SH(signed by 2 of 2 of a
(i)
USR
and a
S E
OR by a
I P
)
becomes again MSIG1 2(a
(i)
USR
, a
I P
) and, back on the
blockchain, can be used either by USR who can re-
sume using her identity, or I P who can revoke it.
Trust is put into S E, in particular to properly per-
form the verification of whether an identity is revoked
or not, and properly close channel with the highest in-
dex k. (Note USR will refuse to sign a TX
USE-CHANNEL
with a higher index that what is justified, so S E can-
not cheat US R out of uses.) Furthermore, a hos-
tile S E may collude with USR , and not publish the
TX
OPEN
and TX
kth-USE
transactions TX
CLOSE
: US R can
then claim the reimbursement transaction from the
TX
BACKOUT
after the timelock. This would allow a user
to continue using her identity as if the transactions
that took place off-chain had never happened. In the
Lightning Network, this would cost S E the money
that had been transacted on the channel; here, as the
amounts are mostly symbolic, this attack has a low
cost. This is similar to (Augot et al., 2017a) where ex-
ists the risk that S P might accept a user identity with-
out demanding a TX
REQUEST
. Thus, the trust model ser-
vice providers have towards a group of S E’s is sim-
ilar to how web browsers trust certificate authorities
in PKIs; the system is only as secure (against SE -
US R collusion) as the least trustworthy S E.
6 CONCLUSION
Taking back existing mechanisms to our advantage –
atomic swaps and off-chain payments – we have pre-
sented two methods to reduce the costs of the pro-
posal of (Augot et al., 2017a) to the point of render-
ing it financially viable while nonetheless preserving
its advantages in terms of flexible user experience and
identity provider controls, particularly for revocation,
which can only be violated by an attacker capable of
committing Bitcoin double spending attacks. We be-
lieve that our ideas can be reused in other contexts.
REFERENCES
Abiteboul, S., Andr
´
e, B., and Kaplan, D. (2015). Managing
your digital life. Commun. ACM, 58(5):32–35.
Antonopoulos, A. M. (2015). Mastering Bitcoin. O’Reilly
Media, Sebastopol, California.
Augot, D., Chabanne, H., Chenevier, T., George, W., and
Lambert, L. (2017a). A user-centric system for veri-
fied identities on the bitcoin blockchain. In Data Pri-
vacy Management, Cryptocurrencies and Blockchain
Technology - ESORICS 2017 International Workshop,
CBT 2017, pages 390–407.
Augot, D., Chabanne, H., Cl
´
emot, O., and George, W.
(2017b). Transforming face-to-face identity proof-
ing into anonymous digital identity using the Bit-
coin blockchain. In PST2017 - International Con-
ference on Privacy, Security and Trust. See also
arxiv.org/abs/1710.02951.
Brands, S. (2000). Rethinking Public Key Infrastructures
and Digital Certificates (Building in Privacy). MIT
Press, Cambridge, MA, USA.
Dunphy, P. and Petitcolas, F. A. P. (2018). A first look
at identity management schemes on the blockchain.
CoRR, abs/1801.03294.
Garman, C., Green, M., and Miers, I. (2016). Account-
able privacy for decentralized anonymous payments.
In Financial Cryptography and Data Security - 20th
International Conference, FC 2016, pages 81–98.
Gulbrandsen, A. (2016). Bitcoin Lightning Network FAQ.
Online, https://medium.com/@AudunGulbrands1/
lightning-faq-67bd2b957d70.
Jacobovitz, O. (2016). Blockchain for identity manage-
ment. Technical Report 16-02, Lynne and William
Frankel Center for Computer Science (Ben Gurion
University). https://www.cs.bgu.ac.il/%7Efrankel/
TechnicalReports/2016/16-02.pdf.
Joseph Poon and Thaddeus Dryja (2016). The Bitcoin
Lightning Network: Scalable off-chain instant pay-
ments. Online, https://lightning.network/lightning-
network-paper.pdf.
Lundkvist, C., Heck, R., Torstensson, J., Mitton, Z.,
and Sena, M. (2017). uPort: A platform for self-
sovereign identity. https://whitepaper.uport.me/uPort
whitepaper DRAFT20170221.pdf.
Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic
cash system. Online, http://bitcoin.org/bitcoin.pdf.
Nazar
´
e, J., Hamilton, K., and Schmidt, P. (2016). Dig-
ital certificates project. online, source code avail-
able at https://github.com/digital-certificates. http:
//certificates.media.mit.edu.
Prisco, G. (2015). Estonian government partnerts with
bitnation to offer blockchain notarization services
to e-residents. https://bitcoinmagazine.com/articles/
estonian-government-partners-with-bitnation-
to-offer-blockchain-notarization-services-to-e-
residents-1448915243/.
Tobin, A., Reed, D., and Windley, P. J. (2016). The
inevitable rise of self-sovereign identity. On-
line, https://sovrin.org/wp-content/uploads/2017/07/
The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf.
Yang, D., Gavigan, J., and Wilcox-O’Hearn, Z. (2016).
Survey of confidentiality and privacy preserving tech-
nologies for blockchains. https://z.cash/static/R3
Confidentiality and Privacy Report.pdf.
ICISSP 2019 - 5th International Conference on Information Systems Security and Privacy
518