1-2hit |
Katsuyuki UMEZAWA Satoru TEZUKA
The cellular phone ownership rate continues to increase, meaning one person may now own two or more. Meanwhile, a lot of terminals that receive cellular phone services through a mass broadband communication network are being commercialized. When service is received through the cellular phone, the mobile network operator authenticates the subscriber. However, service providers other than the mobile network operators provide communication services and other services through fixed networks. In this situation, if we can use the subscriber authentication that the mobile network operator provide for the fixed network service, fixed mobile convergence (FMC) will be achieved and mobile network operators will be able to better prevent unauthorized users from using their services. In addition, services will become more convenient because users will be authenticated by swiping one cellular phone when switching from using a fixed terminal to another fixed terminal. A mechanism has been developed that allows mobile network operator to authenticate their subscribers' account when using a terminal connected to a fixed network. In addition, services can be easily switched between fixed terminals by using the proposed mechanism. Moreover, a system is constructed on the basis of the proposed mechanism, and its performance is evaluated.
Kazuo TAKARAGI Takashi KUBOTA Sven WOHLGEMUTH Katsuyuki UMEZAWA Hiroki KOYANAGI
Central bank digital currencies require the implementation of eKYC to verify whether a trading customer is eligible online. When an organization issues an ID proof of a customer for eKYC, that proof is usually achieved in practice by a hierarchy of issuers. However, the customer wants to disclose only part of the issuer's chain and documents to the trading partner due to privacy concerns. In this research, delegatable anonymous credential (DAC) and zero-knowledge range proof (ZKRP) allow customers to arbitrarily change parts of the delegation chain and message body to range proofs expressed in inequalities. That way, customers can protect the privacy they need with their own control. Zero-knowledge proof is applied to prove the inequality between two time stamps by the time stamp server (signature presentation, public key revocation, or non-revocation) without disclosing the signature content and stamped time. It makes it possible to prove that the registration information of the national ID card is valid or invalid while keeping the user's personal information anonymous. This research aims to contribute to the realization of a sustainable financial system based on self-sovereign identity management with privacy-enhanced PKI.