POSTER: Using Verifiable Credentials for Authentication of UAVs in Logistics

被引:0
|
作者
Watanabe, Ken [1 ]
Sako, Kazue [1 ]
机构
[1] Waseda Univ, Dept Comp Sci & Commun Engn, 3-4-1 Okubo,Shinjuku Ku, Tokyo, Japan
关键词
Verifiable Credential; Selective Disclosure; Authentication Protocol; UAV;
D O I
10.1007/978-3-031-41181-6_45
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Verifiable Credentials (VCs) have been widely adopted as a format for asserting information through use of digital signature technique, and offer versatile usages. The World Wide Web Consortium (W3C) has standardized the data model for VCs [1], and the motivation for this study is to verify the applicability of its data model through a concrete, realistic scenario. For verification, we have chosen a scenario where Unmanned Aerial Vehicles (UAVs) collaborate to deliver packages. As a contribution of this study, we demonstrate how we can selectively disclose attributes of UAVs yet ensure its mission under an authorized contract. Furthermore, we propose a method for issuing receipts through use of VCs and Verifiable Presentations (VPs) that guarantees completion of delivery while UAVs remain anonymous. For this function, we developed a new format for VP, namely 'VP with Message.' These features have been implemented through a demo application.
引用
收藏
页码:710 / 715
页数:6
相关论文
共 50 条
  • [21] Requirements and Secure Serialization for Selective Disclosure Verifiable Credentials
    Kalos, Vasilis
    Polyzos, George C.
    ICT SYSTEMS SECURITY AND PRIVACY PROTECTION (SEC 2022), 2022, 648 : 231 - 247
  • [22] EVOKE: Efficient Revocation of Verifiable Credentials in IoT Networks
    Mazzocca, Carlo
    Acar, Abbas
    Uluagac, Selcuk
    Montanari, Rebecca
    PROCEEDINGS OF THE 33RD USENIX SECURITY SYMPOSIUM, SECURITY 2024, 2024, : 1279 - 1295
  • [23] Distributed access control for information-centric networking architectures using verifiable credentials
    Alzahrani, Bander
    Fotiou, Nikos
    Albeshri, Aiiad
    Almuhaimeed, Abdullah
    Alsubhi, Khalid
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2023, 22 (02) : 467 - 478
  • [24] On the interoperability of verifiable credentials: simple universal verifier (SUV)
    Kaiiali, Mustafa
    Sette, Ioram Schechtman
    Wazan, Ahmad Samer
    Chadwick, David W.
    Alfandi, Omar
    ANNALS OF TELECOMMUNICATIONS, 2025,
  • [25] Cryptographic Requirements of Verifiable Credentials for Digital Identification Documents
    Richter, Maximilian
    Bertram, Magdalena
    Seidensticker, Jasper
    Margraf, Marian
    2023 IEEE 47TH ANNUAL COMPUTERS, SOFTWARE, AND APPLICATIONS CONFERENCE, COMPSAC, 2023, : 1663 - 1668
  • [26] Distributed access control for information-centric networking architectures using verifiable credentials
    Bander Alzahrani
    Nikos Fotiou
    Aiiad Albeshri
    Abdullah Almuhaimeed
    Khalid Alsubhi
    International Journal of Information Security, 2023, 22 : 467 - 478
  • [27] Giving Motivation for Using Secure Credentials through User Authentication by Game
    Takada, Tetsuji
    Hattori, Yumeji
    PROCEEDINGS OF THE WORKING CONFERENCE ON ADVANCED VISUAL INTERFACES AVI 2020, 2020,
  • [28] Using Intel SGX to Protect Authentication Credentials in an Untrusted Operating System
    Conde, Rafael C. R.
    Maziero, Carlos A.
    Will, Newton C.
    2018 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2018, : 163 - 168
  • [29] Cryptanalysis of a Handover Authentication Scheme Using Credentials Based on Chameleon Hashing
    Yoon, Eun-Jun
    Khan, Muhammad Khurram
    Yoo, Kee-Young
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (12) : 3400 - 3402
  • [30] Verifiable Contracting A Use Case for Onboarding and Contract Offering in Financial Services with eIDAS and Verifiable Credentials
    Goncalves, Sergio Manuel Nobrega
    Tomasi, Alessandro
    Bisegna, Andrea
    Pellizzari, Giulio
    Ranise, Silvio
    COMPUTER SECURITY, ESORICS 2020 INTERNATIONAL WORKSHOPS, 2020, 12580 : 133 - 144