Skip to main content

Genuine Personal Identifiers and Mutual Sureties for Sybil-Resilient Community Growth

  • Conference paper
  • First Online:
Social Informatics (SocInfo 2020)

Part of the book series: Lecture Notes in Computer Science ((LNISA,volume 12467))

Included in the following conference series:

Abstract

Observing its lack, we introduce the notion of a genuine personal identifier—a globally unique and singular identifier of a person—and present a foundation for a decentralized, grassroots, bottom-up process by which every human being may create, own, and protect the privacy of a genuine personal identifier. Our solution is based on a web-of-trust and is designed for a distributed realization; we apply graph-theoretic notions to show that digital communities can grow indefinitely while ensuring bounded sybil penetration.

An extended version of this paper that includes proofs and further elaboration appears in [16].

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    As the public key may be quite long, one may also associate oneself with a shorter “nickname”, a hash of the public key, e.g. a 128-bit hash (as a UUID) or a 256-bit hash (as common in the crypto world).

  2. 2.

    Birth and death of agents will be addressed in future work.

  3. 3.

    We consider undirected graphs, as we require surety to be symmetric. Indeed, one may consider directed sureties.

  4. 4.

    We allow surety pledges to be made before the corresponding personal identifier declarations, as we do not see a reason to enforce order.

References

  1. Abdul-Rahman, A.: The PGP trust model. EDI-Forum: J. Electron. Commer. 10(3), 27–31 (1997)

    Google Scholar 

  2. Baird, R., et al.: Human tide: the real migration crisis (2007)

    Google Scholar 

  3. World Bank. Identification for development (ID4D) global dataset (2018)

    Google Scholar 

  4. Cardelli, L., Shahaf, G., Shapiro, E., Talmon, N.: Digital social contracts: a foundation for an egalitarian and just digital society (2020)

    Google Scholar 

  5. Fung, B., Garcia, A.: Facebook has shut down 5.4 billion fake accounts this year. CNN, November 2019

    Google Scholar 

  6. Geisler, C., Currens, B.: Impediments to inland resettlement under conditions of accelerated sea level rise. Land Use Policy 66, 322–330 (2017)

    Article  Google Scholar 

  7. Jacobovitz, O.: Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva Google Scholar, vol. 1, p. 9 (2016)

    Google Scholar 

  8. Laskus, M.: Decentralized identity trilemma (2018). http://maciek.blog/dit/?cookie-state-change=1574327093444

  9. McCarthy, N.: Facebook deleted more than 2 billion fake accounts in the first quarter of the year. Forbes, May 2019

    Google Scholar 

  10. Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. Comput. Sci. Rev. 30, 80–86 (2018)

    Article  Google Scholar 

  11. Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M.: Decentralized identifiers (DIDs) v0. 12-data model and syntaxes for decentralized identifiers (DIDs). Draft Community Group Report, 29 (2018)

    Google Scholar 

  12. Rivest, R.L., Shamir, A., Adleman, L.: A method for obtaining digital signatures and public-key cryptosystems. Commun. ACM 21(2), 120–126 (1978)

    Article  MathSciNet  Google Scholar 

  13. Searle, J.R., Willis, S., Vanderveken, D.: Foundations of Illocutionary Logic. CUP Archive (1985)

    Google Scholar 

  14. Seuken, S., Parkes, D.C.: Sybil-proof accounting mechanisms with transitive trust. In: Proceedings of the 2014 International Conference on Autonomous Agents and Multi-agent Systems, pp. 205–212. International Foundation for Autonomous Agents and Multiagent Systems (2014)

    Google Scholar 

  15. Shahaf, G., Shapiro, E., Talmon, N.: Sybil-resilient reality-aware social choice. In: IJCAI 2019, pp. 572–579 (2019)

    Google Scholar 

  16. Shahaf, G., Shapiro, E., Talmon, N.: Foundation for genuine global identities. arXiv preprint arXiv:1904.09630 (2019)

  17. Shapiro, E.: Point: foundations of e-democracy. Commun. ACM 61(8), 31–34 (2018)

    Article  Google Scholar 

  18. W3C. Verifiable credentials data model 1.0 (2019)

    Google Scholar 

  19. Yasin, A., Liu, L.: An online identity and smart contract management system. In: 2016 IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), vol. 2, pp. 192–198. IEEE (2016)

    Google Scholar 

Download references

Acknowledgements

Ehud Shapiro is the Incumbent of The Harry Weinrebe Professorial Chair of Computer Science and Biology. We thank the generous support of the Braginsky Center for the Interface between Science and the Humanities. Nimrod Talmon was supported by the Israel Science Foundation (ISF; Grant No. 630/19).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Nimrod Talmon .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Shahaf, G., Shapiro, E., Talmon, N. (2020). Genuine Personal Identifiers and Mutual Sureties for Sybil-Resilient Community Growth. In: Aref, S., et al. Social Informatics. SocInfo 2020. Lecture Notes in Computer Science(), vol 12467. Springer, Cham. https://doi.org/10.1007/978-3-030-60975-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-60975-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-60974-0

  • Online ISBN: 978-3-030-60975-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics