Binding of Endpoints to Identifiers by On-Chain Proofs [article]

Diego Pennino, Maurizio Pizzonia, Andrea Vitaletti, Marco Zecchini
2020 arXiv   pre-print
In many applications, identity management (IdM) is used to associate a subject public key with an endpoint at which the subject can be contacted (telephone number, email, etc.). In decentralized applications based on distributed ledger technologies (DLTes), it is desirable for the IdM to be decentralized as well. Currently, endpoints are either verified by who needs it, which is impractical in DLT-based applications, or by a centralized authority, which contrasts with the spirit of DLTes. In
more » ... s paper, we show two DLT-based protocols to prove the association between a subject and an endpoint in a decentralized manner, contributing in filling the gap of the current IdM approaches with respect to decentralization. Our protocols are compatible with a wide variety of endpoints. We analyze the security of our protocols and evaluate their performance and cost against the common approaches.
arXiv:2005.00794v1 fatcat:3yauleviwzcwjppyk55la5v2j4