Decentralized Proof-Of-Unique-Human
Total Page:16
File Type:pdf, Size:1020Kb
UniqueID: Decentralized Proof-of-Unique-Human Mohammad-Javad Hajialikhani Mohammad-Mahdi Jahanara Department of Computer Engineering Department of Computer Engineering Sharif University of Technology Sharif University of Technology [email protected] [email protected] Abstract—Bitcoin and Ethereum are novel mechanisms for such a ledger. A monetary system can be reduced to statements decentralizing the concept of money and computation. Extending in forms of “X has c coins” and “X gives Y c coins”. decentralization to the human identity concept, we can think of Bitcoin [1] just records these statements -transactions- in its using blockchain for creating a list of verified human identities with a one-person-one-ID property. UniqueID is a Decentralized Blockchain. Nature of identity verification is very close to Autonomous Organization(DAO) for maintaining human identi- this record logic because identity is simply some information ties such that every physical human entity can have no more that about you, and some claims about the correctness of those one account. One part of this identity is simply the user’s claim information by other people. on one of his unique, permanent, and measurable characteristics UniqueID aims to bring online and decentralized one- -biometrics. Blockchain has proved its integrity as a platform for storing and performing computations on such claims. The person-one-account system based on biometric data for rec- biggest challenge here is to ensure that the user has submitted ognizing people, human verifiers for identity verification pro- his own valid biometric data. Human verifiers can check if there cesses, and blockchain for recording data. Similar to Bitcoin is any inconsistency in other users’ data, by peer-to-peer checks. which incentivizes people who contribute their computational For preventing bad behavior and centralization in the verification power to network with new Bitcoins, UniqueID uses a token process, UniqueID benefits from novel governance mechanisms to choose verifiers and punish unjust ones. Also, there are incentives system and a novel governance mechanism to incentivize for honest verifiers and users by newly generated tokens. We human verifiers and distributing operations while preventing show how the users’ privacy can be preserved by using state- the creation of a monopoly of power and bad behavior. of-the-art cryptographic techniques, and so they can use their Recently there have been efforts in order to create decen- identity without any concerns for votings, financial and banking tralized identity verification systems with different approaches. purposes, social media accounts, reputation systems etc. [3–5] are examples of such systems. To the best of our I. INTRODUCTION knowledge, among all the systems which provide a unique Identity verification has always been an important prob- account for every person, none of them are permissionless, lem in online systems. While identity is a key to solve a fully decentralized, and permanent at the same time. wide range of challenges, including Sybil attacks [16] and Identity is also an important problem, not just in the digital accountable votings, there is no universal system for holding world. Roots of many nation-wide issues are identity-related human identities. Identity databases are usually created and issues. Over 1 billion people do not have any identity docu- managed by governments or financial institutions privately. ment, and can not participate in financial and legal transactions Social media and messengers solved the problem partially [6]. Old institutions for democracy are changing too slowly by relying on other systems such as E-mail, mobile phone and are not efficient, because of bureaucratic and paper-based number, credit card information, and other reputable social identities leads to costly votings [7]. Universal basic income, as a novel idea, can be executed only in the existence of a arXiv:1806.07583v1 [cs.CR] 20 Jun 2018 media accounts. These methods are not suitable for highly critical applications(e.g. voting) and prone to violating users worldwide identity system [8]. privacy. Currently, there is not any system for assigning every II. PROBLEM SPECIFICATION online human exactly one account, which can be used for In this section, we define our problem formally. logging into other systems as well. Centralized models for identity verification are all prone to A. Problem Statement misuses, fake identities, and political conflicts. Identity is a The simplest formulation of our problems is: political concept, and nation-states will come against every Create a decentralized system for assigning exactly one public system that aims to collect their citizen identities. Moreover, key to every human, without violating users’ privacy. we need to make sure that such an authority does not create This definition may create some debates. First, we must fake identities, or excluding a specific group of people from define words like user, human, and decentralized as we see the system in favor of itself. in next section. We can see this system as maintaining and Blockchain brings us a decentralized way for recording managing a list of valid public keys without trusting any specific data in an immutable ledger -which the correctness centralized authority. By system, we mean a socio-economic of data is also guaranteed by computer code, based on pre- entity where some group of people, encouraged by economic specified rules. Decentralized money is a direct application of incentives, form a specific structure toward achieving a goal. B. Terminology money they need, in order to do X in the system?” X can be making one fake identity, making infinite fake identities, 1) Human: When we want to design an identity system for preventing someone from entering the system (censorship) and humans, we must tackle two questions: any other unwanted incident. We analyze our system from this 1. What makes an entity a human? point of view in section 6. 2. What makes this human persistent over time? How can we 3) Incentives: We can see this kind of system as a form of say one person is the same over time? the cooperative game, where people interact with each other The first question is crucial, to determine who can enter the for reaching a shared goal. For this reason, there must be system. Can we name a strong Artificial Intelligence a human? enough incentives for parties to participate. Formally speaking, It seems that all of us have some consensus on a definition of we should determine the amount of effort, energy and other a human. It’s a combination of some specific body properties resources every party has to put, and how many tokens he gets (e.g. shape, face, etc.) and intellectual abilities (e.g. memory, back. Analysing this market can give us the equilibrium and language, etc.). the prediction of what will happen at the end. In the case of The second question is harder, and a famous unsolved problem Bitcoin, e.g., there are always incentives for some group of in philosophy [9]. If we want to map the identity of a person people (miners) for running full nodes and miner equipment to any of his properties, we lose something. for example, if for earning new Bitcoins, so the system will be alive as long we define personal identity over time as a person’s body, it is as these coins are paid to them. known that all body cells are replaced after some time. But 4) Privacy: we just need some properties that are persistent over time for Privacy is the ability of an individual or group most people (without any fundamental philosophical reason). to have control over all the information about themselves We can name three of these properties: and to whom they express. Privacy and data protection are of the most important challenges in every blockchain-based • Biometrics: Some specific human body structures have system because it is known that decentralized systems are proven to be persistent and unique over time. Finger- inherently transparent, and all data can be accessed by any prints, DNA and iris scan are examples of proper bio- node. As shown in recent researches, many cryptocurrencies metrics. are at the risk of linking transactions and other data leaks. This • Memory: The average human brain can memorize some transparency and lack of privacy is a cost of high security data and recognize it over time. Persistence of memory and immutability of them. We need more consideration for is almost true for all people. preserving privacy in a permanent identity system which can • Trust: This is less clear than the previous properties. be used for critical purposes. Cryptographic advancements, Trust is how other people know and recognize one such as functional cryptography, program obfuscation, and person. Basically, it is a combination of some mind-body ring signatures can be used for enhancing privacy in UniqueID. properties. However here, judging over these properties We will discuss privacy concerns and imaginable solutions in is up to others. Trust is how other people see someone depth in next chapter. as persistent and unique over time. Human judgment can make some errors, but it works well in many situations. III. UNIQUEID DESIGN 2) Decentralized: Defining decentralization, especially in a In this section, we come up with a detailed explanation of rigorous form is very hard mostly because it takes different how UniqueID works and solves the decentralized proof-of- forms in different contexts [10]. We focus on decentralization unique-human problem. First, we provide an overall flow of in its political form here: there is no specific entity -state, the system, and then we cover the concepts and components corporation- or person who can affect the system, creating or which our system consists of. removing identities. One side of this decentralization is the inability of an entity in changing ledger information: account A.