A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2021; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Survey on Blockchain-based Identity Management and Decentralized Privacy for Personal Data
2020
2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS)
In the digital revolution, even secure communication between individuals, services and devices through centralized digital entities presents considerable risks. ...
Firstly, we discussed an overview of Identity management approaches, introducing an architecture overview as well as the relevant actors in such a system and blockchain technology as solution for distributed ...
The scalability and optimization aspects for distributed IdMs is essential to uptake adoption. • Communication parties trust: The trust and reputation between attestation verifiers and relying parties ...
doi:10.1109/brains49436.2020.9223312
dblp:conf/brains/GilaniBHC20
fatcat:bqud3palbncrxetmx7g444qrk4
Towards a Blockchain based digital identity verification, record attestation and record sharing system
[article]
2020
arXiv
pre-print
In this study, we investigate the inefficiencies of traditional identity systems, and discuss how a proper implementation of Blockchain technology would result in safer, more secure, privacy respecting ...
The Covid-19 pandemic has made individuals and organizations to rethink the way of handling identity verification and credentials sharing particularly in quarantined situations. ...
For instance, individuals who have earned a particular college degree in India have to go through trusted third parties, costing them a significant amount of money and time in order to prove their degrees ...
arXiv:1906.09791v2
fatcat:i36gu3szuradfld32rerjn7qka
Federation of Attribute Providers for User Self-Sovereign Identity
2018
Journal of Information Systems Engineering & Management
for personal attributes and their need to trust in such attributes. ...
In a world where people must subject themselves to high scrutiny in every process they initiate, and in a world where the digital environment grows incessantly, we anticipate more online services asking ...
The current revocation method involves an amount of cryptocurrency controlled by both parties. A document becomes revoked when one or both parties spend that amount of currency. ...
doi:10.20897/jisem/3943
fatcat:37bt6sgruvfn5pnhauertsvmae
Security and Privacy Challenges and Potential Solutions for DLT based IoT Systems
2018
2018 Global Internet of Things Summit (GIoTS)
In this paper, we illustrate these concerns through use case examples. ...
We discuss the implications these concerns on the use of distributed ledgers within higher-level systems, such as in SOFIE, a DLT-based approach to securely and openly federate IoT systems. ...
Revocation. In a situation where access or other rights are revoked from a party, it is often crucial that the revocation event is distributed in a timely and predictable manner. ...
doi:10.1109/giots.2018.8534527
dblp:conf/giots/PaavolainenN18
fatcat:qs4w2sy3prgxhcnepfq5derbzy
Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions
2018
Sensors
access control, privacy preserving, trust and performance respectively. ...
Then, we trace the identity problem back to the origin in philosophy, analyze the Internet digital identity management solutions in the context of IoT and investigate recent surging blockchain sovereign ...
Frameworks of evaluating the distributed systems such as in [97] are indispensable in order to measure the performance of distributed systems. ...
doi:10.3390/s18124215
fatcat:pcjlwsh6mvdofhkzb5c4wrdavy
Building a Credential Exchange Infrastructure for Digital Identity: A Sociohistorical Perspective and Policy Guidelines
2022
Frontiers in Blockchain
In addition, the article defines or elaborates on key concepts including identity, credential and trust. ...
enabling trust around digital identity infrastructure and transactions, both within related ecosystems and in the broader society. ...
: through their thoughtful reading and insightful comments they have tremendously helped clarify my thinking and improve this written piece. ...
doi:10.3389/fbloc.2021.629790
fatcat:5xbmerqmxncfni46b5gci35io4
A trusted approach for decentralised and privacy-preserving identity management
2021
IEEE Access
In addition, each party must be authenticated and authorized to perform transactions on that channel. ...
In other words, all parties (including users) trust that everything works as expected. ...
His scientific activity is mainly devoted to the security, trust, and privacy management in distributed systems. He is also interested in security and privacy aspects in the Internet of Things. ...
doi:10.1109/access.2021.3099837
fatcat:3ht7rgngk5crtp77h4grgoe52y
Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey
2018
International Journal on Advanced Science, Engineering and Information Technology
The paper concludes with the open issues, main challenges and directions highlighted for future work in this area. ...
This solution would include the individual's consolidated digital identity as well as their set of verified attributes that have been cryptographically signed by various trusted issuers. ...
User devices can utilise unique hardcoded keys to perform software authentication, encryption, and decryption.
3) Trusted Third Party authentication Employing Trusted Third Party (TTP) services within ...
doi:10.18517/ijaseit.8.4-2.6838
fatcat:shrmouxcgjhs3ddtkoofguo2g4
Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data
2021
IEICE transactions on information and systems
This paper proposes a model for VC generation and revocation verification for credit scoring data. ...
Previously proposed financial identity services mostly adopted centralized servers that are prone to singlepoint-of-failure problems and performance bottlenecks. ...
Acknowledgments This research was supported by Basic Science Research Program through the National Research Foundation of Korea (NRF) funded by the Ministry of Education (No. 2019R1I1A3A01060652), and ...
doi:10.1587/transinf.2021ngp0006
fatcat:hgd5y54xgjdn7ahsfqvbnsth5a
Self-Sovereign Identity: A Systematic Map and Review
[article]
2021
arXiv
pre-print
In this model, the user maintains and controls their data. When requested by a service provider, user data is sent directly by the user, without the intermediation of third parties. ...
Thus, in Self-Sovereign Identity, the participation of known identity providers for proof of identity is reduced, which increases user privacy. ...
These processes are performed through multi-factor authentication [105] and cryptographic techniques such as digital signature and public-key cryptography [136] . ...
arXiv:2108.08338v1
fatcat:sttx2medrvcrfdvpefyrk2x57q
Privacy-preserving solutions for Blockchain: review and challenges
2019
IEEE Access
In this sense, this paper performs a systematic review of the current state of the art on privacy-preserving research solutions and mechanisms in blockchain, as well as the main associated privacy challenges ...
in this promising and disrupting technology. ...
The web of trust supported by the sovrin trust anchors provides verifiability of the target party being interacted. ...
doi:10.1109/access.2019.2950872
fatcat:kf2rl7onmrbvnozjudspxrcatu
AuthChain: A Decentralized Blockchain-based Authentication System
English
2020
International Journal of Engineering Trends and Technoloy
English
Distributed Ledger Teachnology (DLT) in general and blockchain can offer a solution by decentralizing ownership of credentials and a protocol for verifying one's record in an immutable chain of data. ...
Current online services rely blindly on authentication providers to perform identity management and authentication. ...
The CertCoin layout additionally facilitates trusted key distribution that makes it more suitable for performance conscious applications. ...
doi:10.14445/22315381/cati1p212
fatcat:ybnujesfyfgvbjwjne5lrcolmq
A Security Analysis of Blockchain-based DID Services
2021
IEEE Access
In this paper, we systemically explore key components of DID systems and analyze their possible vulnerabilities when deployed. ...
Hence, problems can occur for trust on first use [48] or blind trust before verification [49] cases, which implicate that the user has to blindly trust the other party before DID connection [47] ...
We assume the most common use case scenario, where the local user A's edge agent (EA) aims to communicate with the remote party B 's EA through DID communication and perform the wallet backup and recovery ...
doi:10.1109/access.2021.3054887
fatcat:jvcjhgeiy5aclikgv4m6gnpnlm
Self-sovereign and Decentralized identity as the future of identity management?
2020
Open Identity Summit
Therefore, it is no surprise that new approaches based on high-impact technologies, such as distributed ledgers and blockchain, have attracted major attention in the last 3-4 years, both in industry and ...
In this approach, a central authority controls identifier origination and/or issuance while power may be delegated hierarchically through roles. ...
doi:10.18420/ois2020_03
dblp:conf/openidentity/KubachSSR20
fatcat:m5xtbhoz2zbshogbwcppmckzqa
A Distributed Trust Framework for Privacy-Preserving Machine Learning
[article]
2020
arXiv
pre-print
This paper outlines a distributed infrastructure which is used to facilitate peer-to-peer trust between distributed agents; collaboratively performing a privacy-preserving workflow. ...
However, this engenders a lack of trust between data owners and data scientists. Data owners are justifiably reluctant to relinquish control of private information to third parties. ...
The FL method has many variations, such as Vanilla, Trusted Model Aggregator, and Secure Multi-party Aggregation [6] . ...
arXiv:2006.02456v1
fatcat:hhz3aqx7prhplmurt4i23u7jq4
« Previous
Showing results 1 — 15 out of 37 results