or SP. In this case, we want to be sure that, when CP
sends Q
SP
(message 11) to SP, it includes all and only
the symmetric keys of U. This goal is reached by gen-
erating a transaction T = hid
T
, Add
CP
, Add
SP
, datai
where data = (H(q
1
||q
2
||. . . ||q
n
)) and ∀i ∈ [1, n], q
i
∈
Q
SP
.
We highlight that other action can be notarized, as
those regarding the interaction between SP and AP. In
this position paper, we do not care this aspect which
will be treated in the next steps of our research.
7 CONCLUSIONS
In this paper, a self-sovereign-based approach to
manage privacy consensus to access personal data
is provided. The solution leverages the combina-
tion of blockchain with some advanced cryptographic
schemes, like attribute-based encryption and proxy
re-encryption. As message exchange flow, our pro-
tocol resumes the scheme of federated authentication,
like SAML2 (Lockhart and Campbell, 2008) or Open-
Id Connect (Sakimura et al., 2014). So, a full imple-
mentation of our protocol can be done by extending
the features of one of the protocols mentioned earlier.
In a real-life adoption of our solution, we should also
understand who play the role of the various entities, in
particular CP, PKG and AP. While no high-level trust
is required to CP, which can be a company (as the
identity provider in public digital identity systems),
AP and PKG play a more critical role. Therefore,
they should be government institutions, or solutions
to decentralize also these function should be studied.
Observe that this problem exists also for the attribute
providers of public digital identity systems compliant
with the EU regulation (Union, 2014). As a future
work, we plan to address the above problems (i.e.,
implementation and real-life setting), together with a
careful security analysis to state more formally which
are the security features of our solution,
ACKNOWLEDGEMENTS
This paper is partially supported by the project
“SecureOpenNets-Distributed Ledgers for Secure
Open Communities”, funded by Ministry of Research
and Education (MIUR), project id ARS01 00587.
REFERENCES
Baars, D. (2016). Towards self-sovereign identity using
blockchain technology. Master’s thesis, University of
Twente.
Beimel, A. (1996). Secure schemes for secret sharing and
key distribution.
Benet, J. (2014). Ipfs-content addressed, versioned, p2p file
system. arXiv preprint arXiv:1407.3561.
Bethencourt, J., Sahai, A., and Waters, B. (2007).
Ciphertext-policy attribute-based encryption. In 2007
IEEE Symposium on Security and Privacy (SP ’07),
pages 321–334.
Blaze, M., Bleumer, G., and Strauss, M. (1998). Divert-
ible protocols and atomic proxy cryptography. In
Nyberg, K., editor, Advances in Cryptology — EU-
ROCRYPT’98, pages 127–144, Berlin, Heidelberg.
Springer Berlin Heidelberg.
Fan, K., Wang, S., Ren, Y., Li, H., and Yang, Y. (2018).
Medblock: Efficient and secure medical data shar-
ing via blockchain. Journal of Medical Systems,
42(8):136.
Goyal, V., Pandey, O., Sahai, A., and Waters, B. (2006).
Attribute-based encryption for fine-grained access
control of encrypted data. In Proceedings of the 13th
ACM Conference on Computer and Communications
Security, CCS ’06, pages 89–98, New York, NY, USA.
ACM.
Liang, K., Fang, L., Susilo, W., and Wong, D. S. (2013). A
ciphertext-policy attribute-based proxy re-encryption
with chosen-ciphertext security. In 2013 5th Interna-
tional Conference on Intelligent Networking and Col-
laborative Systems, pages 552–559. IEEE.
Lockhart, H. and Campbell, B. (2008). Security assertion
markup language (saml) v2. 0 technical overview. OA-
SIS Committee Draft, 2:94–106.
Nakamoto, S. et al. (2008). Bitcoin: A peer-to-peer elec-
tronic cash system.
Sahai, A. and Waters, B. (2005). Fuzzy identity-based
encryption. In Annual International Conference on
the Theory and Applications of Cryptographic Tech-
niques, pages 457–473. Springer.
Sakimura, N., Bradley, J., Jones, M., de Medeiros, B., and
Mortimore, C. (2014). Openid connect core 1.0 incor-
porating errata set 1. The OpenID Foundation, speci-
fication.
Union, E. (23 July 2014). Regulation EU No 910/2014
of the European Parliament and of the Coun-
cil. http://eur-lex.europa.eu/legal-content/EN/TXT/
HTML/?uri=CELEX\%3A32014R-0910&from=EN.
Zheng, Z., Xie, S., Dai, H.-N., Chen, X., and Wang, H.
(2018). Blockchain challenges and opportunities: A
survey. International Journal of Web and Grid Ser-
vices, 14(4):352–375.
Zyskind, G., Nathan, O., and Pentland, A. . (2015). De-
centralizing privacy: Using blockchain to protect per-
sonal data. In 2015 IEEE Security and Privacy Work-
shops, pages 180–184.
Self-sovereign Management of Privacy Consensus using Blockchain
431