Abstract
Observing its lack, we introduce the notion of a genuine personal identifier—a globally unique and singular identifier of a person—and present a foundation for a decentralized, grassroots, bottom-up process by which every human being may create, own, and protect the privacy of a genuine personal identifier. Our solution is based on a web-of-trust and is designed for a distributed realization; we apply graph-theoretic notions to show that digital communities can grow indefinitely while ensuring bounded sybil penetration.
An extended version of this paper that includes proofs and further elaboration appears in [16].
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
As the public key may be quite long, one may also associate oneself with a shorter “nickname”, a hash of the public key, e.g. a 128-bit hash (as a UUID) or a 256-bit hash (as common in the crypto world).
- 2.
Birth and death of agents will be addressed in future work.
- 3.
We consider undirected graphs, as we require surety to be symmetric. Indeed, one may consider directed sureties.
- 4.
We allow surety pledges to be made before the corresponding personal identifier declarations, as we do not see a reason to enforce order.
References
Abdul-Rahman, A.: The PGP trust model. EDI-Forum: J. Electron. Commer. 10(3), 27–31 (1997)
Baird, R., et al.: Human tide: the real migration crisis (2007)
World Bank. Identification for development (ID4D) global dataset (2018)
Cardelli, L., Shahaf, G., Shapiro, E., Talmon, N.: Digital social contracts: a foundation for an egalitarian and just digital society (2020)
Fung, B., Garcia, A.: Facebook has shut down 5.4 billion fake accounts this year. CNN, November 2019
Geisler, C., Currens, B.: Impediments to inland resettlement under conditions of accelerated sea level rise. Land Use Policy 66, 322–330 (2017)
Jacobovitz, O.: Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva Google Scholar, vol. 1, p. 9 (2016)
Laskus, M.: Decentralized identity trilemma (2018). http://maciek.blog/dit/?cookie-state-change=1574327093444
McCarthy, N.: Facebook deleted more than 2 billion fake accounts in the first quarter of the year. Forbes, May 2019
Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80–86 (2018)
Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M.: Decentralized identifiers (DIDs) v0. 12-data model and syntaxes for decentralized identifiers (DIDs). Draft Community Group Report, 29 (2018)
Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)
Searle, J.R., Willis, S., Vanderveken, D.: Foundations of Illocutionary Logic. CUP Archive (1985)
Seuken, S., Parkes, D.C.: Sybil-proof accounting mechanisms with transitive trust. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, pp. 205–212. International Foundation for Autonomous Agents and Multiagent Systems (2014)
Shahaf, G., Shapiro, E., Talmon, N.: Sybil-resilient reality-aware social choice. In: IJCAI 2019, pp. 572–579 (2019)
Shahaf, G., Shapiro, E., Talmon, N.: Foundation for genuine global identities. arXiv preprint arXiv:1904.09630 (2019)
Shapiro, E.: Point: foundations of e-democracy. Commun. ACM 61(8), 31–34 (2018)
W3C. Verifiable credentials data model 1.0 (2019)
Yasin, A., Liu, L.: An online identity and smart contract management system. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 192–198. IEEE (2016)
Acknowledgements
Ehud Shapiro is the Incumbent of The Harry Weinrebe Professorial Chair of Computer Science and Biology. We thank the generous support of the Braginsky Center for the Interface between Science and the Humanities. Nimrod Talmon was supported by the Israel Science Foundation (ISF; Grant No. 630/19).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Switzerland AG
About this paper
Cite this paper
Shahaf, G., Shapiro, E., Talmon, N. (2020). Genuine Personal Identifiers and Mutual Sureties for Sybil-Resilient Community Growth. In: Aref, S., et al. Social Informatics. SocInfo 2020. Lecture Notes in Computer Science(), vol 12467. Springer, Cham. https://doi.org/10.1007/978-3-030-60975-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-60975-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-60974-0
Online ISBN: 978-3-030-60975-7
eBook Packages: Computer ScienceComputer Science (R0)