Information and Communications Technology and Policy

Information and Communications Technology and Policy

Information and Communications Technology and Policy ›› 2024, Vol. 50 ›› Issue (1): 59-66.doi: 10.12267/j.issn.2096-5931.2024.01.009

Previous Articles     Next Articles

Research and practice of decentralized digital identity authentication technology based on privacy protection

JIAO Zhiwei1,2, WU Zhenghao1, XU Yijia1,2, WEI Fanxing3   

  1. 1. Ant Group, Hangzhou 310020, China
    2. IIFAA, Hangzhou 310020, China
    3. CTTL Terminal Labs, China Academy of Information and Communications Technology, Beijing 100191, China
  • Received:2023-12-10 Online:2024-01-25 Published:2024-02-01

Abstract:

With the development of Web3.0, decentralized digital identity comes into being. Decentralized identity is oriented to decentralized networks, allowing users, institutions, devices and digital assets to access the network, with the characteristics of decentralization, mutual recognition, privacy and security. This paper studies the decentralized digital identity authentication system based on privacy protection, and firstly summarizes its technical architecture, authentication process and technical characteristics. Then,it presents the security protection mechanism based on terminal and the privacy protection scheme based on cryptography. The privacy protection security scheme includes DID authentication based on cryptography and identity attribute authentication. Finally, it introduces the implementation case of the visually impaired user scenario to provide ideas for decentralized digital identity application scenarios and help protect user privacy.

Key words: decentralized digital identity, terminal security, privacy security, zero-knowledge proof

CLC Number: