{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T18:50:40Z","timestamp":1770749440990,"version":"3.50.0"},"reference-count":49,"publisher":"MDPI AG","issue":"1","license":[{"start":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T00:00:00Z","timestamp":1671580800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001348","name":"A*STAR under its RIE2020 Advanced Manufacturing and Engineering (AME) Programmatic Programme","doi-asserted-by":"publisher","award":["A19E3b0099"],"award-info":[{"award-number":["A19E3b0099"]}],"id":[{"id":"10.13039\/501100001348","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Algorithms"],"abstract":"<jats:p>Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it is impossible in existing DID systems for the users to detect credential misuse. In this paper, we propose new DID authentication protocols with two properties: auditability and privacy. The former enables the detection of malicious authentication events, while the latter prevents an adversary from linking an authentication event to the corresponding user and service provider. We present two protocols that achieve auditability with varying privacy and performance guarantees. The first protocol has high performance, but it reveals information about the user. The second protocol achieves full privacy, but it incurs a higher performance overhead. We present a formal security analysis of our privacy-preserving protocols by using the Tamarin prover. We implemented them and evaluated their performance with a permissioned blockchain deployed over the Amazon AWS and a local cloud infrastructure. The results demonstrate that the first protocol is able to support realistic authentication workloads, while the second is nearly practical.<\/jats:p>","DOI":"10.3390\/a16010004","type":"journal-article","created":{"date-parts":[[2022,12,21]],"date-time":"2022-12-21T04:28:55Z","timestamp":1671596935000},"page":"4","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":17,"title":["Decentralized Identity Authentication with Auditability and Privacy"],"prefix":"10.3390","volume":"16","author":[{"given":"Bithin","family":"Alangot","sequence":"first","affiliation":[{"name":"Department of Information Systems Technology and Design (ISTD), Singapore University of Technology and Design (SUTD), Singapore 487372, Singapore"}]},{"given":"Pawel","family":"Szalachowski","sequence":"additional","affiliation":[{"name":"Department of Information Systems Technology and Design (ISTD), Singapore University of Technology and Design (SUTD), Singapore 487372, Singapore"}]},{"given":"Tien Tuan Anh","family":"Dinh","sequence":"additional","affiliation":[{"name":"Department of Information Systems Technology and Design (ISTD), Singapore University of Technology and Design (SUTD), Singapore 487372, Singapore"}]},{"given":"Souhail","family":"Meftah","sequence":"additional","affiliation":[{"name":"Institute of Infocomm Research (I2R), Agency for Science Technology and Research (A*Star), Singapore 138632, Singapore"}]},{"given":"Jeff Ivanos","family":"Gana","sequence":"additional","affiliation":[{"name":"Institute of Infocomm Research (I2R), Agency for Science Technology and Research (A*Star), Singapore 138632, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5652-3455","authenticated-orcid":false,"given":"Khin Mi Mi","family":"Aung","sequence":"additional","affiliation":[{"name":"Institute of Infocomm Research (I2R), Agency for Science Technology and Research (A*Star), Singapore 138632, Singapore"}]},{"given":"Zengpeng","family":"Li","sequence":"additional","affiliation":[{"name":"School of Cyber Science and Technology, Shandong University, Qingdao 266237, China"}]}],"member":"1968","published-online":{"date-parts":[[2022,12,21]]},"reference":[{"key":"ref_1","unstructured":"(2020, October 19). Decentralized Identity Foundation. Available online: https:\/\/identity.foundation\/."},{"key":"ref_2","unstructured":"(2021, June 21). DID Specification. Available online: https:\/\/www.w3.org\/TR\/did-core\/."},{"key":"ref_3","unstructured":"(2020, October 19). Hyperledger Indy. Available online: https:\/\/tinyurl.com\/yycca4ek."},{"key":"ref_4","unstructured":"(2020, October 19). Hyperledger Aries. Available online: https:\/\/www.hyperledger.org\/projects\/aries."},{"key":"ref_5","unstructured":"(2020, October 19). Evernym. Available online: https:\/\/www.evernym.com."},{"key":"ref_6","unstructured":"(2020, October 19). Nuggets. Available online: https:\/\/nuggets.life\/."},{"key":"ref_7","unstructured":"(2020, October 19). Blockstack. Available online: https:\/\/blockstack.org\/."},{"key":"ref_8","first-page":"934","article-title":"CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability","volume":"2020","author":"Maram","year":"2020","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_9","unstructured":"(2021, June 21). Google Last Login. Available online: https:\/\/tinyurl.com\/lqlg2xz."},{"key":"ref_10","first-page":"1","article-title":"Scalable Multi-party Computation for zk-SNARK Parameters in the Random Beacon Model","volume":"1050","author":"Bowe","year":"2017","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_11","first-page":"1366","article-title":"Untangling blockchain: A data processing view of blockchain systems","volume":"30","author":"Dinh","year":"2018","journal-title":"TKDE"},{"key":"ref_12","unstructured":"Nakamoto, S. (2019). Bitcoin: A peer-to-peer electronic cash system. Decentralized Bus. Rev., 21260."},{"key":"ref_13","first-page":"1","article-title":"Ethereum: A secure decentralised generalised transaction ledger","volume":"151","author":"Wood","year":"2014","journal-title":"Ethereum Proj. Yellow Pap."},{"key":"ref_14","unstructured":"(2021, June 21). Hyperledger Fabric. Available online: https:\/\/tinyurl.com\/ydaswf3j."},{"key":"ref_15","unstructured":"(2021, June 21). Quorum. Available online: https:\/\/www.goquorum.com."},{"key":"ref_16","unstructured":"Castro, M., and Liskov, B. (1999). Practical Byzantine fault tolerance. OSDI, USENIX."},{"key":"ref_17","unstructured":"(2020, October 19). DIDAuth. Available online: https:\/\/tinyurl.com\/y89tahad."},{"key":"ref_18","unstructured":"Micali, S., Rabin, M., and Vadhan, S. (1999, January 17\u201318). Verifiable random functions. Proceedings of the 40th Annual Symposium on Foundations of Computer Science, Washington, DC, USA."},{"key":"ref_19","unstructured":"Bitansky, N., Canetti, R., Chiesa, A., and Tromer, E. (February, January 31). From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, Berkeley, CA, USA."},{"key":"ref_20","first-page":"46","article-title":"Scalable, transparent, and post-quantum secure computational integrity","volume":"2018","author":"Bentov","year":"2018","journal-title":"IACR Cryptol. ePrint Arch."},{"key":"ref_21","unstructured":"Ali, M., Nelson, J., Shea, R., and Freedman, M.J. (2016, January 22\u201324). Blockstack: A Global Naming and Storage System Secured by Blockchains. Proceedings of the 2016 USENIX Annual Technical Conference, Denver, Colorado, USA."},{"key":"ref_22","unstructured":"Melara, M.S., Blankstein, A., Bonneau, J., Felten, E.W., and Freedman, M.J. (2015, January 12\u201314). CONIKS: Bringing Key Transparency to End Users. Proceedings of the 24th USENIX Security Symposium, Washington, DC, USA."},{"key":"ref_23","unstructured":"(2021, June 21). Key Transparency. Available online: https:\/\/tinyurl.com\/ybhedmfs."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Chu, D., Lin, J., Li, F., Zhang, X., Wang, Q., and Liu, G. (2019, January 23\u201325). Ticket Transparency: Accountable Single Sign-On with Privacy-Preserving Public Logs. Proceedings of the International Conference on Security and Privacy in Communication Systems, Orlando, FL, USA.","DOI":"10.1007\/978-3-030-37228-6_25"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1515\/popets-2018-0026","article-title":"Privacy Pass: Bypassing Internet Challenges Anonymously","volume":"3","author":"Davidson","year":"2018","journal-title":"Proc. Priv. Enhancing Technol"},{"key":"ref_26","unstructured":"Huang, S., Jeyaraman, S.I.S., Kushwah, S., Lee, C.K., Luo, Z., Raghunathan, P.M.A., Shaikh, S., Sung, Y.C., and Zhang, A. (2021, June 21). DIT: De-Identified Authenticated Telemetry at Scale. Available online: https:\/\/scontent.fsin10-1.fna.fbcdn.net\/v\/t39.8562-6\/246534149_588854725718321_8923613326138589821_n.pdf?_nc_cat=103&ccb=1-7&_nc_sid=ad8a9d&_nc_ohc=sgqd5Qn5r-YAX_F9X4W&_nc_ht=scontent.fsin10-1.fna&oh=00_AfDK48w6piGcXrn2W3zsEvHTqbVqp_6-ugYzHVoZwjNJmQ&oe=63A75882."},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Sonnino, A., Al-Bassam, M., Bano, S., Meiklejohn, S., and Danezis, G. (2018). Coconut: Threshold issuance selective disclosure credentials with applications to distributed ledgers. arXiv.","DOI":"10.14722\/ndss.2019.23272"},{"key":"ref_28","unstructured":"Zhang, Z., Kr\u00f3l, M., Sonnino, A., Zhang, L., and Rivi\u00e8re, E. (2020). EL PASSO: Privacy-preserving, Asynchronous Single Sign-On. arXiv."},{"key":"ref_29","unstructured":"Pointcheval, D., and Sanders, O. (March, January 29). Short randomizable signatures. Proceedings of the Cryptographers\u2019 Track at the RSA Conference, San Francisco, CA, USA."},{"key":"ref_30","unstructured":"Andersen, M.P., Kumar, S., AbdelBaky, M., Fierro, G., Kolb, J., Kim, H.S., Culler, D.E., and Popa, R.A. (2019, January 14\u201316). WAVE: A Decentralized Authorization Framework with Transitive Delegation. Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, USA."},{"key":"ref_31","unstructured":"Shafagh, H., Burkhalter, L., Ratnasamy, S., and Hithnawi, A. (2020, January 12\u201314). Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams. Proceedings of the 29th USENIX Security Symposium, Boston, MA, USA."},{"key":"ref_32","unstructured":"(2021, June 21). Google Trillian. Available online: https:\/\/github.com\/google\/trillian."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Panwar, G., Vishwanathan, R., Misra, S., and Bos, A. (2019, January 11\u201315). SAMPL: Scalable Auditability of Monitoring Processes using Public Ledgers. Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, London, UK.","DOI":"10.1145\/3319535.3354219"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"119445","DOI":"10.1016\/j.apenergy.2022.119445","article-title":"Blockchain based energy trading scheme for vehicle-to-vehicle using decentralized identifiers","volume":"322","author":"Kim","year":"2022","journal-title":"Appl. Energy"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Li, X., Jing, T., Li, R., Li, H., Wang, X., and Shen, D. (IEEE Internet Things J., 2022). BDRA: Blockchain and Decentralized Identifiers Assisted Secure Registration and Authentication for VANETs, IEEE Internet Things J., Early Access.","DOI":"10.1109\/JIOT.2022.3164147"},{"key":"ref_36","doi-asserted-by":"crossref","unstructured":"Poolat Parameswarath, R., Gope, P., and Sikdar, B. (2022). Decentralized Identifier-based Privacy-preserving Authenticated Key Exchange Protocol for Electric Vehicle Charging in Smart Grid. arXiv.","DOI":"10.1109\/TVT.2023.3281371"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Cecchetti, E., Zhang, F., Ji, Y., Kosba, A., Juels, A., and Shi, E. (November, January 30). Solidus: Confidential distributed ledger transactions via PVORM. Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, Dallas, TX, USA.","DOI":"10.1145\/3133956.3134010"},{"key":"ref_38","unstructured":"Narula, N., Vasquez, W., and Virza, M. (2021, January 12\u201314). zkLedger: Privacy-Preserving Auditing for Distributed Ledgers. Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18), Boston, MA, USA."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2019599.2019602","article-title":"Authenticated dictionaries: Real-world costs and trade-offs","volume":"14","author":"Crosby","year":"2011","journal-title":"ACM Trans. Inf. Syst. Secur. (TISSEC)"},{"key":"ref_40","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., and Syverson, P. (2004). Tor: The Second-Generation Onion Router, Naval Research Lab.","DOI":"10.21236\/ADA465464"},{"key":"ref_41","unstructured":"(2021, June 21). Zcash: Parameter Generation. Available online: https:\/\/z.cash\/technology\/paramgen\/."},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013, January 13\u201319). The TAMARIN prover for the symbolic analysis of security protocols. Proceedings of the International Conference on Computer Aided Verification, Saint Petersburg, Russia.","DOI":"10.1007\/978-3-642-39799-8_48"},{"key":"ref_43","unstructured":"(2022, March 18). DID Authentication Tamarin Model. Available online: https:\/\/github.com\/bithinalangot\/DIDAuthTamarin."},{"key":"ref_44","unstructured":"(2022, March 18). Go-Snark. Available online: https:\/\/github.com\/arnaucube\/go-snark."},{"key":"ref_45","unstructured":"(2022, March 18). Circom Compiler. Available online: https:\/\/github.com\/iden3\/circom."},{"key":"ref_46","unstructured":"(2022, March 18). Babyjub. Available online: https:\/\/tinyurl.com\/yc7kmcsj."},{"key":"ref_47","unstructured":"(2022, March 18). MiMC7. Available online: https:\/\/tinyurl.com\/y99c2khj."},{"key":"ref_48","unstructured":"Thomas, K., Pullman, J., Yeo, K., Raghunathan, A., Kelley, P.G., Invernizzi, L., Benko, B., Pietraszek, T., Patel, S., and Boneh, D. (2019, January 14\u201316). Protecting accounts from credential stuffing with password breach alerting. Proceedings of the 28th USENIX Security Symposium, Santa Clara, CA, USA."},{"key":"ref_49","doi-asserted-by":"crossref","unstructured":"Canetti, R. (2001, January 14\u201317). Universally composable security: A new paradigm for cryptographic protocols. Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science, Las Vegas, NV, USA.","DOI":"10.1109\/SFCS.2001.959888"}],"container-title":["Algorithms"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/1\/4\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T01:45:10Z","timestamp":1760147110000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1999-4893\/16\/1\/4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,12,21]]},"references-count":49,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2023,1]]}},"alternative-id":["a16010004"],"URL":"https:\/\/doi.org\/10.3390\/a16010004","relation":{},"ISSN":["1999-4893"],"issn-type":[{"value":"1999-4893","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,12,21]]}}}