ABSTRACT
Recently, the number of entities in the digital world has increased, due to technologies like 5G and the Internet of Things (IoT). Therefore, in a software application, it is important to be able to identify and maintain entities in an interoperable, efficient, and secure way. For enhancing the identity management domain, blockchain technology has been proposed as a possible solution. We explore how blockchain technology can be used to maintain digital identities and to address some of the issues in the domain. We present the results that we obtained so far, as well as future directions and expected results for our research.
- General Data Protection Regulation (GDPR). https://gdpr-info.eu/art-5-gdpr.Google Scholar
- Andreea-Elena Panait, Ruxandra F. Olimid, and Alin Stefanescu, 2020. Identity Management on Blockchain - Privacy and Security Aspects. ArXiv, abs/2004.13107.Google Scholar
- Paul Dunphy, Luke. Garratt, and Fabien Petitcolas, 2018. Decentralizing Digital Identity: Open Challenges for Distributed Ledgers. 2018 IEEE European Symposium on Security and Privacy Workshops (EuroS&PW), London, pp. 75--78.Google ScholarCross Ref
- Garrick Hileman and Michel Rauchs, 2017. Global blockchain benchmarking study. https://www.jbs.cam.ac.uk/faculty-research/centres/alternative-finance/publications/global-blockchain.Google Scholar
- Deloitte. Breaking blockchain open, 2018. https://www2.deloitte.com/content/dam/Deloitte/cz/Documents/financial-services/cz-2018-deloitte-global-blockchain-survey.pdf.Google Scholar
- uPort, 2021. https://www.uport.me.Google Scholar
- Paul Dunphy and Fabien A. P. Petitcolas, 2018. A First Look at Identity Management Schemes on the Blockchain. IEEE Security & Privacy, 16, 4, pp. 20--29.Google ScholarCross Ref
- Julian Roos and Heiko Niedermayer, 2018. Identity Management on the Blockchain. Seminars FI / IITM SS 18, Network Architectures and Services.Google Scholar
- Andrew Tobin and Drummond Reed, 2016. The inevitable rise of self-sovereign identity. https://sovrin.org/wp-content/uploads/2018/03/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf.Google Scholar
- Alexander Mühle, Andreas Grüner, Tatiana Gayvoronskaya, and Christoph Meinel, 2018. A Survey on Essential Components of a Self-Sovereign Identity. Computer Science Review 30 (2018): 80--86.Google ScholarCross Ref
- Xiaoyang Zhu and Youakim Badr, 2018. Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors, 18(12):4215.Google ScholarCross Ref
- Reza Soltani, Uyen Trang Nguyen, and Aijun AN, 2018. A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), pp. 1129--1136. IEEE.Google Scholar
- Dirk van Bokkem, Rico Rageman, Gijs Koning, Luat Nguyen, and Naqib Zarin, 2019. Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology. arXiv:1904.12816.Google Scholar
- Christopher Allen, 2016. The path to self-sovereign identity. http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html.Google Scholar
- Sam Mire, 2019. Blockchain For Identity Management: 33 Startups To Watch In 2019. https://www.disruptordaily.com/blockchain-startups-identity-management.Google Scholar
- Alexandre Miranda Pinto, 2020. An Introduction to the use of zk-SNARKs in Blockchains, pp. 233--249(01 2020). 16. Google ScholarCross Ref
- Jeonghyuk Lee, Jungyeon Hwang, Jaekyung Choi, Hyunok Oh, and Jihye Kim, 2019. Sims: Self sovereign identity management system with preserving privacy in blockchain. IACR Cryptol. ePrint Arch. 2019, 1241.Google Scholar
- Andreea-Elena Panait, Ruxandra F. Olimid, and A Stefanescu, 2020. Analysis of uPort Open, an Identity Management Blockchain-Based Solution. In: Gritzalis S., Weippl E.R., Kotsis G., Tjoa A.M., Khalil I. (eds) Trust, Privacy and Security in Digital Business. TrustBus 2020. Lecture Notes in Computer Science, vol 12395. Springer, Cham. Google ScholarDigital Library
- Andreea-Elena Panait, 2020. Is the user identity perception influenced by the blockchain technology? IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 1--3 Google ScholarCross Ref
- Andreea-Elena Panait and Ruxandra F. Olimid, 2021. On Using zk-SNARKs and zk-STARKs in Blockchain-Based Identity Management. In: Maimut D., Oprina AG., Sauveron D. (eds) Innovative Security Solutions for Information Technology and Communications. SecITC 2020. Lecture Notes in Computer Science, vol 12596. Springer, Cham. 2020. Google ScholarCross Ref
- Nir Bitansky, Ran Canetti, Alessandro Chiesa, and Eran Tromer, 2012. From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. In: Proceedings of the 3rd Innovations in Theoretical Computer Science Conference. pp. 326--349. Google ScholarDigital Library
- Eli Ben-Sasson, Iddo Bentov, Yinon Horesh, and Michael Riabzev, 2018. Scalable, transparent, and post-quantum secure computational integrity. IACR Cryptology ePrint Archive 2018, 46.Google Scholar
- ZoKrates, 2020. Zokrates tutorial. https://zokrates.github.io.Google Scholar
- Remix, 2019. Remix Ethereum-IDE Tool. https://remix.ethereum.org.Google Scholar
- Sorin Ţeican, Andreea-Elena Drăgnoiu, 2021. A state-of-the-art blockchain approach to the ETSI implementation for long-term preservation of digital signatures/seals (LTPS) solutions. To be published.Google Scholar
- The Linux Foundation. Hyperledger IROHA, 2021. https://www.hyperledger.org/use/iroha.Google Scholar
- Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert van Renesse, and Emin Gün Sirer, 2018. Decentralization in Bitcoin and Ethereum networks. arXiv, preprint arXiv:1801.03998.Google Scholar
- Mina Protocol, 2021. https://minaprotocol.com.Google Scholar
Recommendations
Design Patterns for Blockchain-based Self-Sovereign Identity
EuroPLoP '20: Proceedings of the European Conference on Pattern Languages of Programs 2020Self-sovereign identity is a new identity management paradigm that allows entities to really have the ownership of their identity data and control their use without involving any intermediary. Blockchain is an enabling technology for building self-...
Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study
WI-IAT '21: IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent TechnologyIdentity is at the heart of digital transformation. Successful digital transformation requires confidence in and protection of digital identities. On the Internet, however, there is no unique and standard identity layer. Consequently, a variety of ...
Review of Techniques for Privacy-Preserving Blockchain Systems
BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical InfrastructurePrivacy plays a central role in many application domains that utilize blockchain technology. It is central in Personal Data Management, Electronic Health records, or systems that interact with any public institution. However, blockchains are subject to ...
Comments