A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2020; you can also visit the original URL.
The file type is
In many applications, identity management (IdM) is used to associate a subject public key with an endpoint at which the subject can be contacted (telephone number, email, etc.). In decentralized applications based on distributed ledger technologies (DLTes), it is desirable for the IdM to be decentralized as well. Currently, endpoints are either verified by who needs it, which is impractical in DLT-based applications, or by a centralized authority, which contrasts with the spirit of DLTes. InarXiv:2005.00794v1 fatcat:3yauleviwzcwjppyk55la5v2j4