mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2026-01-07 03:25:40 -05:00
sort research
This commit is contained in:
parent
7a69168e0e
commit
b3e0931bdd
19 changed files with 194 additions and 373 deletions
|
|
@ -19,21 +19,22 @@ published: true
|
|||
|
||||
## Explainer
|
||||
|
||||
* [Can digital identity help with the world refugee crisis?](https://blog.avast.com/digital-identity-world-refugee-crisis) 2022-05-24 Avast
|
||||
> At the moment, a lack of documents isn’t too much of a hindrance to Ukrainian refugees, who are largely being welcomed in neighboring states. Dr. Dzeneta Karabegovic, PhD, an expert in migration and human rights and a childhood refugee herself, tells Avast that Ukrainians currently don’t need a passport in order to get through most borders of the European Union (EU).
|
||||
* [Fixing Aid | Can blockchain help fix the I.D. problem for a billion people?](https://www.thenewhumanitarian.org/podcast/2022/03/31/Fixing-Aid-can-blockchain-help-fix-the-ID-problem-for-a-billion-people) 2022-03-31 The New Humanitarian
|
||||
> When forced to flee your home from one moment to the next, grabbing birth certificates, school diplomas, and other papers that prove you are who you say you are might not be the first thing that comes to mind. And without those credentials, everything is more difficult when it comes to starting a new life or picking up the pieces of an old one: applying for asylum, applying for a job, or registering to receive aid and other kinds of support.
|
||||
* [Ukraine: Why centralized Identity systems can cause a problem](https://www.linkedin.com/pulse/ukraine-why-centralized-identity-systems-can-cause-problem-freitag/) 2022-02-25 Andreas Freitag
|
||||
> Let's imagine a country that has a modern digital identity infrastructure. Citizens can use it to identify themselves online and offline, communicate with authorities online, they can quickly log into private services and websites and any documents can be created and digitally signed.
|
||||
* [Blockchain Can Empower Stateless Refugees](https://www.law360.com/technology/articles/1095148/blockchain-can-empower-stateless-refugees) 2018-12-02 Law360
|
||||
> InternetBar.org Institute, or IBO, a global NGO, developed the idea for a project to pursue these goals, and presented it at the World Justice Forum V in July 2017, in a presentation titled "The Invisibles: Digital Identity for Stateless Refugees." Then, earlier this year, IBO recorded music with top musicians living in refugee camps in eight countries, in order to make these refugees owners of digital assets.
|
||||
* [Satellite and geospatial tech for humanitarian crises](https://medium.com/caribou-digital/satellite-and-geospatial-tech-for-humanitarian-crises-b90b670aba46) 2021-12-09 Caribou Digital
|
||||
> The discussion covered a broad range of topics, from specific data availability to the challenges of applying and translating technical data into usable formats to the application of geospatial data for anticipatory humanitarian response
|
||||
|
||||
## Ethics
|
||||
|
||||
* [Pro-social behaviours](https://en.wikipedia.org/wiki/Prosocial_behavior) 2023-06-14 Wikipedia
|
||||
> those intended to benefit others, or society as a whole — for example, helping, sharing, donating, co-operating, and volunteering. Within a community, they’re the behaviours that make it an attractive space to belong to, and which encourage its growth and/or development. It’s a central part of the value cycles that underpin the Communities of Practice model.
|
||||
* [Radical generosity](https://provocations.darkmatterlabs.org/radical-generosity-8063d9edc3aa) 2022-08-31 Dark Matter
|
||||
> Could we establish an alternative market economy, one that is structured around a distinct set of principles centred on care, trust, generosity, the importance of collective intelligence and deep sets of relationships; what would fall away and what would remain in place?
|
||||
* [literature] [Ethical Design of Digital Identity Environmental Implications from the Self-Sovereign Identity Movement](https://theses.ubn.ru.nl/items/5afb03ab-7a90-4303-909b-4934295859f8) 2021-06 Sanne Glastra
|
||||
> In a world that is becoming more digital, it is relevant to find some guidelines for organizations to design digital identity more ethically. A universal identity system on the internet is still missing and there are no clear standards for organizations to design digital identity. With this research, knowledge and insights have been obtained to advance organizations to design digital identity more ethically. A contribution has been made by proposing the conditions to enable improvements for a more ethical design.
|
||||
* [Sovereignty, privacy, and ethics in blockchain‑based identity management systems](https://link.springer.com/content/pdf/10.1007/s10676-020-09563-x.pdf) 2020-11-30 Georgy Ishmaev
|
||||
> Self-sovereign identity (SSI) solutions implemented on the basis of blockchain technology are seen as alternatives to existing digital identification systems, or even as a foundation of standards for the new global infrastructures for identity management systems. It is argued that ‘self-sovereignty’ in this context can be understood as the concept of individual control over identity relevant private data, capacity to choose where such data is stored, and the ability to provide it to those who need to validate it.
|
||||
|
||||
## Human Rights
|
||||
|
||||
|
|
@ -55,12 +56,17 @@ published: true
|
|||
> all states should recognise and promote universal respect for and observance of both fundamental human and digital rights in physical domain and the digital spaces environment and ensure that these rights are upheld as core elements of a free, open and representative society
|
||||
|
||||
## Inclusion
|
||||
* [Unmasking Power: Alternative Futures for Empowering Our Digital Identities](https://openresearch.ocadu.ca/id/eprint/3937/) 2022 Chopra, Shreya
|
||||
> The project is directed primarily toward design and innovation teams, and associated knowledge workers, whose efforts have significant influence on future technologies, platforms, and their impacts. This work explores how we might deconstruct power dynamics prevalent in digital service design today. Through multiple analyses, maps and models of these systems, the paper reveals multiple opportunities for change.
|
||||
* [Disrupting the Gospel of Tech Solutionism to Build Tech Justice](https://ssir.org/articles/entry/disrupting_the_gospel_of_tech_solutionism_to_build_tech_justice#) 2022-06-16 SSIR
|
||||
> What does it mean to include new voices unless we create a context in which those voices are welcome and heard? To create those conditions, leaders in civil society and the private and public sectors must challenge institutional power and center the discussion on core social justice issues such as racism and structural inequality.
|
||||
* [Over 1 Billion People Worldwide Lack Legal ID](https://www.continuumloop.com/inclusion-in-digital-identity-products/) 2022-05-17 Continuum Loop
|
||||
> Inclusion is important in all aspects of life, including digital identity products. By ensuring that everyone is included in the development process, we can create products that meet the needs of everyone [...]
|
||||
>
|
||||
> Input from many people from diverse backgrounds is essential to our work on the SSI Harm’s Task Force. I hope you’ll consider [joining us](https://wiki.trustoverip.org/display/HOME/Human+Experience+Working+Group) – whether you want to contribute or just observe, everyone is welcome!
|
||||
* [Online livelihoods and young women’s economic empowerment in Nigeria](https://medium.com/caribou-digital/online-livelihoods-and-young-womens-economic-empowerment-in-nigeria-ccbbea4020e2) 2021-10-05 Caribou Digital
|
||||
> 1) In what ways might platform work empower women?
|
||||
> 2) How can we make platforms work better for women?
|
||||
* [Decolonial Humanitarian Digital Governance](https://medium.com/berkman-klein-center/decolonial-humanitarian-digital-governance-48b35b05b110) 2021-04-16 Berkman Klein
|
||||
> Can humanitarian digital policy be decolonized?
|
||||
>
|
||||
|
|
@ -80,7 +86,10 @@ published: true
|
|||
> This research creates a functional blockchain based system, that enables identities for the use-case of Cash Transfer Programs.\
|
||||
> Results: We present a validated set of ten design decisions that represent the trade-offs that have been made and prescribe a blueprint for a technical design.\
|
||||
> Next steps: Future research should be done on how such a system could be implemented and used. This would require a process design approach that has to be developed, Also, elaborate research into user experience and user interfaces should be conducted.
|
||||
|
||||
* [literature] [Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion](https://www.frontiersin.org/articles/10.3389/fbloc.2019.00028/full) 2020-01-23 Fennie Wang, Primavera De Filippi
|
||||
> the paper will focus on two blockchain-based identity solutions as case studies: (1) Kiva's identity protocol for building credit history in Sierra Leone, and (2) World Food Programme's Building Blocks program for delivering cash aid to refugees in Jordan. Finally, the paper will explore how the combination of blockchain-based cryptocurrencies and self-sovereign identity may contribute to promoting greater economic inclusion.
|
||||
* [Empowering humans for a digital age and global economy via Self-Sovereign Identity](https://vladanlausevic.medium.com/empowering-humans-for-a-digital-age-and-global-economy-via-self-sovereign-identity-457ef947f33b) 2020-06-20 Vladan Lausevic
|
||||
|
||||
## Business
|
||||
* [What are the limits of the private sector in serving the poor?](https://medium.com/caribou-digital/what-are-the-limits-of-the-private-sector-in-serving-the-poor-3ee9a9a468fc) 2021-08-17 Caribou Digital
|
||||
> A large set of impact investor, international donor, and government anti-poverty policy is based on the notion that for-profit companies can be induced to serve the poor with life changing services like banking or schooling but the limits of the for profit model are not always taken into account
|
||||
|
|
@ -88,8 +97,6 @@ published: true
|
|||
> While Digital ID could offer benefit to humanitarian agencies and beneficiaries, alike, many questions remain to be answered. The cost effectiveness of ID solutions remains to be established. Given that many of these systems are only operating at pilot-scale, it is difficult to know what the primary drivers of cost are and how they can be mitigated. In addition, the digital ID space is fairly young and while initiatives like ID4D and ID2020 are working to drive meaningful interoperability among providers in the space, it remains to be seen what the most effective factors, in addition to open source software, open APIs, and common data formats, can be used to general meaningful interoperability.
|
||||
|
||||
## Projects
|
||||
* [Can Blockchain and Self-Sovereign Identity Systems address the Refugee Crisis](https://www.youtube.com/watch?v=ewMZQoyGxCs) 2022-08-09 ETH Global, Lyonna Lyu
|
||||
> Zora’s Metabolism hackathon is a virtual space for creative experimentation, bringing together some of the world’s best creators from a broad variety of categories and inviting them to design new digital spaces, on-chain tools, artistic experiments and more. Web3 is both one of the biggest paradigm shifts since the advent of the internet age and an ever-evolving inquiry into the societal possibilities of creative technology: no matter if you are a developer, an engineer, an architect, a musician, a theorist or seasoned NFT artist - we invite you to build hyperstructures with us with focus on NFTs, on-chain music ecosystems, a new generation of DAOs and Zora’s vast ecosystem of tools and smart contracts.
|
||||
* [Opportunities for Integrating Functional Digital ID into Humanitarian Action](https://hiplatform.org/blog/2022/5/18/opportunities-for-integrating-functional-digital-id-into-humanitarian-action) HIP 2022-05-18
|
||||
> The [Dignified Identities in Cash Assistance (DIGID)](https://hiplatform.org/digid) project was initiated by a consortium of humanitarian organizations. In 2021, a pilot project was carried out in Kenya implemented by the [Kenya Red Cross Society](https://www.redcross.or.ke/) to enable people without any form of ID to receive cash assistance in the context of the COVID-19 pandemic by means of a digital ID.
|
||||
* [Dignified Identities in Cash Assistance: Lessons Learnt from Kenya](https://cash-hub.org/wp-content/uploads/sites/3/2022/02/DIGID-Lessons-Learnt-from-Kenya-Jan-2022.pdf) 2022-02
|
||||
|
|
@ -100,6 +107,8 @@ published: true
|
|||
> The first phase was implemented by KRCS to meet the needs of the vulnerable populations without official IDs
|
||||
* [Affinidi Partners with AID:Tech — Exploring New Horizons in Digital Identity and Verifiable Credentials](https://academy.affinidi.com/affinidi-partners-with-aid-tech-exploring-new-horizons-in-digital-identity-and-verifiable-661c9e61f7e8) 2021-08-18 Affinidi
|
||||
> The relationship continues to grow, as Affinidi and AID:Tech are now collaborating on a new initiative to build infrastructure to power a verifiable credential-based [digital wallet](https://academy.affinidi.com/5-reasons-to-use-an-identity-wallet-c289ba2980cf) with multiple services geared for women in Southeast Asia to help them access government programs, banking, insurance, etc.
|
||||
* [Case Study: Gravity digital ID solution propels Dignified Identities in Cash Programing (DIGID) Project in Kenya](https://medium.com/gravity-earth/case-study-gravity-digital-id-solution-propels-dignified-identities-in-cash-programing-digid-e527bc55ae43) 2021-07-06 Gravity Earth
|
||||
> The Gravity Platform was developed through direct inputs from all types of end-users through [user consultations](https://static1.squarespace.com/static/5b75620445776e4b290c0d96/t/603d14c5775eed6fbde2883b/1614615753940/%5BFinal%5D+DIGID+Kenya+User+Consultation+Report.pdf) with local communities and NGO staff.
|
||||
* [GlobalID and Onfido to offer Authenication services to Malaysias Mycash Money](https://www.crowdfundinsider.com/2020/09/166678-global-id-verification-provider-onfido-to-offer-authentication-services-to-malaysias-mycash-money/) 2020-09-14 CrowdfundInsider
|
||||
> MyCash Money is a digital marketplace that’s focused on serving migrant workers based in Malaysia and Singapore. MyCash aims to support financial inclusion by providing convenient and secure online services to foreign workers in said countries who might not be able to access digital banking platforms or credit cards.
|
||||
* [From stateless to self sovereign. A project that gives life long identity to the worlds invisibles, beginning at birth](https://www.biometricupdate.com/202007/from-stateless-to-self-sovereign-a-project-that-gives-life-long-identity-to-the-worlds-invisibles-beginning-at-birth) 2020-07 Biometrics Update
|
||||
|
|
@ -111,10 +120,16 @@ published: true
|
|||
|
||||
* [Lost and Found: Digital identity Can Be The Difference Between Life And Death For Refugees](https://diacc.ca/2022/09/27/lost-and-found-digital-identity-can-be-the-difference-between-life-and-death-for-refugees/) 2022-09-27 DIACC
|
||||
> Most Refugees and IDPs did not have the time to properly prepare by gathering all their important documents such as passports, identity cards, driver’s licenses, and land titles or rental agreements. Fleeing your home may save your life, but fleeing without identity documents can lead to a very long wait – sometimes a decade or more – before your life is stable again.
|
||||
* [Can Blockchain and Self-Sovereign Identity Systems address the Refugee Crisis](https://www.youtube.com/watch?v=ewMZQoyGxCs) 2022-08-09 ETH Global, Lyonna Lyu
|
||||
> Zora’s Metabolism hackathon is a virtual space for creative experimentation, bringing together some of the world’s best creators from a broad variety of categories and inviting them to design new digital spaces, on-chain tools, artistic experiments and more. Web3 is both one of the biggest paradigm shifts since the advent of the internet age and an ever-evolving inquiry into the societal possibilities of creative technology: no matter if you are a developer, an engineer, an architect, a musician, a theorist or seasoned NFT artist - we invite you to build hyperstructures with us with focus on NFTs, on-chain music ecosystems, a new generation of DAOs and Zora’s vast ecosystem of tools and smart contracts.
|
||||
* [Digital Identity: Enabling dignified access to humanitarian services in migration - PrepareCenter](https://preparecenter.org/resource/digital-identity-enabling-dignified-access-to-humanitarian-services-in-migration/) 2021-06-07 PrepareCenter
|
||||
> The primary objective of the report is to inform humanitarian organizations working with migrants of the opportunities and risks in the use of digital identities in providing services throughout the migrants’ journeys.
|
||||
* [Gravity’s work with refugees in Turkey featured in latest report from Oxford Centre for Technology and Development, “Digital Identity: An Analysis for the Humanitarian Sector”](https://medium.com/gravity-earth/case-study-gravitys-work-with-refugees-in-turkey-featured-in-latest-oxford-centre-for-technology-ecb515a18464) 2021-05-25 Gravity Earth
|
||||
> “Gravity’s work is selected as a case study here because their solution included close collaboration with four other organizations from the start. It thus offered a rife example of interoperability challenges associated with digital ID systems, as well as how the same systems may be used to overcome existing coordination challenges. Moreover, Gravity has made more documentation of this project publicly available.”
|
||||
* [Can digital identity help with the world refugee crisis?](https://blog.avast.com/digital-identity-world-refugee-crisis) 2022-05-24 Avast
|
||||
> At the moment, a lack of documents isn’t too much of a hindrance to Ukrainian refugees, who are largely being welcomed in neighboring states. Dr. Dzeneta Karabegovic, PhD, an expert in migration and human rights and a childhood refugee herself, tells Avast that Ukrainians currently don’t need a passport in order to get through most borders of the European Union (EU).
|
||||
* [Blockchain Can Empower Stateless Refugees](https://www.law360.com/technology/articles/1095148/blockchain-can-empower-stateless-refugees) 2018-12-02 Law360
|
||||
> InternetBar.org Institute, or IBO, a global NGO, developed the idea for a project to pursue these goals, and presented it at the World Justice Forum V in July 2017, in a presentation titled "The Invisibles: Digital Identity for Stateless Refugees." Then, earlier this year, IBO recorded music with top musicians living in refugee camps in eight countries, in order to make these refugees owners of digital assets.
|
||||
* [Report launch: ‘Identity at the Margins — identification systems for refugees”](https://medium.com/caribou-digital/report-launch-identity-at-the-margins-identification-systems-for-refugees-69466244fa62) 2018-11-29 Caribou Digital
|
||||
> For refugees, the current state of humanitarian identity systems presents challenges. Most described having very limited visibility into and agency around the data collected about them by organizations. They were rarely offered the opportunity to exercise control over what data is collected, despite having the capacity and interest to do so. At the same time, many refugees described making active efforts to negotiate the various identities available to them, consciously weighing the benefits and constraints associated with different statuses in order to access services, employment, and to preserve their spatial mobility.
|
||||
* [Self-Sovereignty for Refugees? The Contested Horizons of Digital Identity](https://www.tandfonline.com/doi/full/10.1080/14650045.2020.1823836) 2020-10-04 Margie Cheesman
|
||||
|
|
|
|||
|
|
@ -72,6 +72,8 @@ last_modified_at: 2023-06-17
|
|||
> The ETO GRUPPE has set itself the goal of automating communication in the Internet of Things (IoT) and, on top of that, making it more secure against access and manipulation. To achieve this, these "things" - machines, devices or vehicles - must first be given a unique identity. The solution of the innovative corporate group consists of a new type of network and authentication processes that have what it takes to revolutionize the way we use the Internet today. ETO uses a network of distributed digital identities (DIDs) and verifiable credentials (VCs). A side benefit from the perspective of human Internet users: they regain data sovereignty over their personal data. The ETO solution will enable secure logins on both the Internet and the Internet of Things (IoT)
|
||||
* [Trust but Verify](https://stateofidentity.libsyn.com/trust-but-verify) 2022-04-28 Liminal Podcasts
|
||||
> Peter Padd, Co-Founder & CEO at Fortifyedge shares how he's built Zero Trust authentication software that provides IoT device OEM's with password-free authentication utilizing Tiny Machine Learning at the edge.
|
||||
* [Introducing Peaq ID - Self-Sovereign Identity For Machines](https://www.peaq.network/blog/introducing-peaq-id-self-sovereign-identity-for-machines) 2022-01-31 Peaq
|
||||
> Self-Sovereign Machine Identities (SSMIs) are digital identities that enable vehicles, machines, robots and devices to identify themselves with each other, with people and with their environment. What makes them special is that they’re decentralized identities; they enable direct, peer-to-peer identification and interaction without being dependent on centralized third-parties.
|
||||
* [Capitalizing on Self-Sovereign Identity for Machines](https://venafi.com/blog/capitalizing-self-sovereign-identity-machines-part-one) 2021-01-05 Venafi
|
||||
> By providing a means to globally define an indisputable link between a machine and its machine identity across different sites, networks and businesses, we can secure IoT like never before.
|
||||
>
|
||||
|
|
@ -95,6 +97,8 @@ last_modified_at: 2023-06-17
|
|||
> One of the challenges identified by this last paper is the overhead of using SSI, which poses a challenge for adoption on constrained IoT networks. For example, while the Long Range (LoRa) communication, often used in IoT systems, only allows payloads of up to 240 bytes, a single DID Document typically occupies 500 bytes or more. Similarly, messages using DIDComm tend to use at least 1 kilobyte, which prevents its use on constrained networks.<br>Figure 1. Binary versions of DIDComm and DID Documents are needed to allow transmission in LoRa networks. The payload, in blue, is a DID Document. The overhead, in orange, is the protocol overhead due to the message signature.
|
||||
>
|
||||
> A low-overhead approach for self-sovereign identity in IoT We present a low-overhead mechanism for self-sovereign identification and communication of IoT agents in constrained networks. Our main contribution is to enable native use of Decentralized Identifiers (DIDs) and DID-based secure communication on constrained networks, whereas previous works either did not consider the issue or relied on proxy-based architectures. We propose a new extension to DIDs along with a more concise serialization method for DID metadata. Moreover, in order to reduce the security overhead over transmitted messages, we adopted a binary message envelope. We implemented these proposals within the context of Swarm Computing, an approach for decentralized IoT. Results showed that our proposal reduces the size of identity metadata in almost four times and security overhead up to five times. We observed that both techniques are required to enable operation on constrained networks.
|
||||
* [Self-Sovereign Identity for IoT environments: A Perspective](https://ieeexplore.ieee.org/document/9119664) 2020-03-11 Geovane Fedrecheski, Jan M. Rabaey, Laisa C. P. Costa, Pablo C. Calcina Ccori, William T. Pereira, Marcelo K. Zuffo
|
||||
> This paper analyses the concept of Self-Sovereign Identity (SSI), an emerging approach for establishing digital identity, in the context of the Internet of Things (IoT). We contrast existing approaches for identity on the Internet, such as cloud-based accounts and digital certificates, with SSI standards such as Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs). To the best of our knowledge, this is the first thorough comparison of these approaches. The benefits and challenges of using DIDs and VCs to identify and authenticate IoT devices and their respective users are discussed. In the end, we establish that SSI, with its owner-centric, privacy-aware and decentrailized approach, provides a viable and attractive option for secure identification of IoT devices and users.
|
||||
* [Self-Sovereign Identity for IoT Devices](https://link.springer.com/chapter/10.1007/978-3-030-24296-1_37) 2019-06-29 Nataliia Kulabukhova, Andrei Ivashchenko, Iurii Tipikin, and Igor Minin
|
||||
> in our point of view, a lot of development groups are working in parallel on the similar topics, yet it is not clear what is going on inside. In this paper we will try to define the differences and discuss both pros and cons of using such commonly known technologies as Sovrin based upon the Hyperledger Indy technology, Civic, Jolocom, uPort and some others. Besides, we’ll tackle the idea of using the SSI for inanimate object and how it can be constructed in this way.
|
||||
|
||||
|
|
|
|||
|
|
@ -63,6 +63,13 @@ last_modified_at: 2023-06-16
|
|||
* [Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Healthcare Using Blockchain Technology](https://www.blockchainhealthcaretoday.com/index.php/journal/article/view/196) 2022-04-22 Blockchain Healthcare
|
||||
> Results: MediLinker allows users to store their personal data on digital wallets, which they control. It uses a decentralized trusted identity using Hyperledger Indy and Hyperledger Aries. Patients use MediLinker to register and share their information securely and in a trusted system with healthcare and other service providers. Results: MediLinker allows users to store their personal data on digital wallets, which they control. It uses a decentralized trusted identity using Hyperledger Indy and Hyperledger Aries. Patients use MediLinker to register and share their information securely and in a trusted system with healthcare and other service providers.
|
||||
|
||||
## Literature
|
||||
|
||||
* [Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Health Care using Blockchain Technology](https://blockchainhealthcaretoday.com/index.php/journal/article/view/196/363) 2022-03-25 Daniel Toshio Harrell, Muhammad Usman, Ladd Hanson, Mustafa Abdul-Moheeth, Ishav Desai, Jahnavi Shriram, Eliel de Oliveira, John Robert Bautista, Eric T. Meyer, Anjum Khurshid Blockchain Healthcare Today
|
||||
> we leveraged the Hyperledger Indy blockchain framework to store patient’s decentralized identifiers (DIDs) and the schemas or format for each credential type. In contrast, the credentials containing patient data are stored ‘off-ledger’ in each person’s wallet and accessible via a computer or smartphone. We used Hyperledger Aries as a middleware layer (API: Application Programming Interface) to connect Hyperledger Indy with the front-end,
|
||||
* [Blockchain, Interoperability, and Self-Sovereign Identity: Trust Me, It’s My Data](https://blockchainhealthcaretoday.com/index.php/journal/article/view/122/144) 2020-01-03 Jim St. Clair, Ann Ingraham, Dominic King, Michael B. Marchant, Fletcher Cotesworth McCraw, David Metcalf, John Squeo
|
||||
> The current interoperability processes for data exchange result in fragmentation and lack of aggregation, impacting patient identity, consent management, and access management across stakeholders. Patients lack the ability to administer and transfer consent in managing their own data. Payers risk sharing data with partners without consent. And, providers have identified “pain points” in data sharing in consent management and care coordination.
|
||||
|
||||
## Devices
|
||||
* [Rugged Identity: resilience for Identity of Things to bad latency, signal, power, physical integrity. Mars, war zones, bad neighbors, Great Firewalls.](https://iiw.idcommons.net/11C/_Rugged_Identity:_resilience_for_Identity_of_Things_to_bad_latency,_signal,_power,_physical_integrity.) 2021-05-06 Phil Wolff
|
||||
> Problem: So, what happens when you can’t call home to conduct an identity conversation? You’re on Mars and the latency is long. You’re in Haiti and the bandwidth is very limited during a storm. You’re in a war zone and your signal is noisy due to interference.
|
||||
|
|
|
|||
|
|
@ -24,8 +24,8 @@ last_modified_at: 2023-06-16
|
|||
## Literature
|
||||
* [Designing a Framework for Digital KYC Processes Built on Blockchain-Based Self-Sovereign Identity](https://arxiv.org/pdf/2112.01237.pdf) 2021-11-11 Vincent Schlatt, Johannes Sedlmeir, Simon Feulner, Nils Urbach
|
||||
> We demonstrate how blockchain-based self-sovereign identity (SSI) can solve the challenges of KYC. We follow a rigorous design science research approach to create a framework that utilizes SSI in the KYC process, deriving nascent design principles that theorize on blockchain’s role for SSI.
|
||||
* [zkKYC A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs](https://bafybeie5ixj4dkim3lgivkw56us6aakh6bc3dhlsx5zzohrkzgo3ywqqha.ipfs.dweb.link/zkKYC-v1.0.pdf) 2021-06 Pieter Pauwels
|
||||
> The proposed solution concept, zkKYC, removes the need for the customer to share any personal information with a regulated business for the purpose of KYC, and yet providesthe transparency to allow for a customer to be identified if and when that is ruled necessary by adesignated governing entity (e.g. regulator, law enforcement).
|
||||
* [zkKYC: A solution concept for KYC without knowing your customer, leveraging self-sovereign identity and zero-knowledge proofs](https://eprint.iacr.org/2021/907) 2021-07-05 Pieter Pauwels
|
||||
> The proposed solution concept, zkKYC, removes the need for the customer to share any personal information with a regulated business for the purpose of KYC, and yet provides the transparency to allow for a customer to be identified if and when that is ruled necessary by a designated governing entity (e.g. regulator, law enforcement). This approach breaks the traditional privacy vs. transparency trade-off and provides structured transparency, resulting in a net positive outcome for all parties involved.
|
||||
|
||||
## Standards
|
||||
* [eKYC & Identity Assurance WG](https://openid.net/wg/ekyc-ida/) OpenID
|
||||
|
|
|
|||
|
|
@ -212,8 +212,6 @@ last_modified_at: 2023-06-18
|
|||
> Pravici PocketCred (formerly VeriCred) is built on Blockchain technology, specifically to address credential issuance and verification, such as one for COVID-19 vaccines. We at Pravici have been working to build a digital pass that citizens can carry in their mobile device or digital card to prove that they have taken a test or vaccine. Our software application features user-friendly creation of schemas* and proof templates, as well as QR code technology for credential issuance and verificatio
|
||||
|
||||
### NHS - Digital Staff Passport
|
||||
* [NHS England Transformation Directorate - Digital staff passport](https://transform.england.nhs.uk/information-governance/guidance/digital-staff-passport/) 2022-06-22
|
||||
> This guidance provides a summary of the information governance (IG) steps which need to be taken so that the Digital Staff Passport can be set up safely and efficiently within an NHS organisation. This allows authorised staff to temporarily work at another NHS organisation more quickly and safely. Digital Staff Passports are not available in social care organisations.
|
||||
* [Real World] [Building an SSI Ecosystem: Digital Staff Passports at the NHS](https://www.windley.com/archives/2021/05/building_an_ssi_ecosystem_digital_staff_passports_at_the_nhs.shtml) 2021-05-11 Phil Windley
|
||||
> How does a functioning credential ecosystem get started? This post goes deep on Manny Nijjar’s work to create a program for using digital staff passports in the sprawling UK NHS bureaucracy.
|
||||
* [NHS Staffpassport; Based on Evernym Verity built by Sitekit/Condatis; A 12 month experience](https://iiw.idcommons.net/22C/_NHS_Staffpassport;_Based_on_Evernym_Verity_built_by_Sitekit/Condatis;_A_12_month_experience) 2021-05-06 Chris Eckl, Richard Astley
|
||||
|
|
|
|||
|
|
@ -73,6 +73,8 @@ last_modified_at: 2023-06-18
|
|||
### Events
|
||||
* [Event tickets as verifiable credentials](https://lissi-id.medium.com/event-tickets-as-verifiable-credentials-31f4a10b28cc) 2022-09-22 Lissi
|
||||
> This article explains how verifiable credentials can be used to benefit event organizers and visitors alike based on a practical usage of the Lissi team.
|
||||
* [literature] [Exploring the use of self-sovereign identity for event ticketing systems](https://link.springer.com/article/10.1007/s12525-022-00573-9) 2022-07-30 Simon Feulner, Johannes Sedlmeir, Vincent Schlatt, Nils Urbach
|
||||
> Our findings demonstrate that SSI-based event ticketing can enable efficient secondary market control by facilitating a practical implementation of the centralized exchange model. To generalize our results, we derive design principles for the efficient, reliable, and privacy-oriented ticket and identity verification and the use of revocation registries.
|
||||
|
||||
### Notarization
|
||||
* [Digital Notarization Can Kickstart Digital ID Ecosystems (with Dan Gisolfi)](https://northernblock.io/digital-notarization-can-kickstart-digital-id-ecosystems-with-dan-gisolfi/) 2022-09-08 Northern Block
|
||||
|
|
@ -106,6 +108,8 @@ last_modified_at: 2023-06-18
|
|||
### Account Managment
|
||||
* [Transferable Accounts Putting Passengers at Risk](https://www.windley.com/archives/2022/06/transferable_accounts_putting_passengers_at_risk.shtml) 2022-06 Phil Windley
|
||||
> The non-transferability of verifiable credential is one of their super powers. This post examines how that super power can be used to reduce fraud and increase safety in a hired car platform.
|
||||
* [Inventories, Not Identities: Why multisigs are the future of online accounts](https://myhub.ai/items/inventories-not-identities-why-multisigs-are-the-future-of-online-by-kei-kreutler-gnosis) 2021-11-20 Gnosis
|
||||
> Embracing more than the normative individual as a fundamental unit of account, such a paradigm could better serve the creation of resilient, accountable, and mutualistic institutions leading into the twenty-first century.
|
||||
|
||||
### Security
|
||||
* [Hackers Gaining Power of Subpoena Via Fake “Emergency Data Requests”](https://krebsonsecurity.com/2022/03/hackers-gaining-power-of-subpoena-via-fake-emergency-data-requests/) 2022-03
|
||||
|
|
@ -145,6 +149,8 @@ last_modified_at: 2023-06-18
|
|||
> ready to market by end of end of 2022 offering increased flexibility, control, ease of use and speed when managing the access of video distribution ecosystem data, independent of the technology used. Divitel video carrier customers will be offered the option to include this blockchain module on top of their ecosystems.
|
||||
|
||||
### Property Management
|
||||
* [A Decentralised Real Estate Transfer Verification Based on Self-Sovereign Identity and Smart Contracts](https://arxiv.org/pdf/2207.04459.pdf) 2022-07-10 Abubakar-Sadiq Shehu, Anto ́nio Pinto, Manuel E. Correia1
|
||||
> SSI technology enable methods for acquiring verified credential (VC) that are verifiable on a decentralised blockchain registry to identify both real estate owner(s) and real estate property. Second, the smart contracts are used to negotiate the secure transfer of real estate property deeds on the marketplace. To assess the viability of our proposal we define an application scenario and compare our work with other approaches.
|
||||
* [A brighter future for tenant/landlord relationships](https://domilabs.io/tenant-landlord-relationships/) 2021-05-26 Domi Labs
|
||||
> it’s hard to keep track since some call, some… email, and still others send you a message on WhatsApp.” Going through all of these disparate messages is its own fulltime job!
|
||||
>
|
||||
|
|
@ -159,3 +165,16 @@ last_modified_at: 2023-06-18
|
|||
> [Pravici](https://pravici.com/), an Evernym customer and startup based out of Chandler, Arizona, is looking to flip the equation. Their solution, Tokenized Loyalty Points (TLP), uses verifiable credential technology to give individual consumers control over their data, while empowering them to direct how their favorite brands can use this data for loyalty and other campaigns.
|
||||
* [Check out the latest version of our beta prototype in the Appstore for #verifiablecredentials for #LoyaltyPrograms](https://twitter.com/_XPID_/status/1323371035484250113) 2020-11-03 XPID
|
||||
> https://apps.apple.com/us/app/id1458328593 When #sovereign #decentralized #identity becomes a reality, your #Loyalty and #loyaltyrewards #Wallet will be on XPID. #SSI
|
||||
|
||||
### Business
|
||||
* [Sellafield DLT Field Lab Harnessing the power of distributed ledger technology: how Digital Catapult’s Field Lab methodology can transform your business](https://condatis.com/wp-content/uploads/2022/08/Digital_Catapult_Sellafield_DLT_Field_Labs_Report_Final-July-22-ver-2.pdf) 2022-07 Condatis
|
||||
> The nuclear sector presents an exciting opportunity to implement advanced digital technologies for driving operational improvements and cultural transformation. Our DLT Field Labs showed how some of the challenges that seemed perplexing at the start of our journey have been deciphered through innovation and collaboration.
|
||||
* [Industry-Grade Self-Sovereign Identity: On the Realisation of a Fully Distributed Self-Sovereign Identity Architecture](https://repository.tudelft.nl/islandora/object/uuid%3A32711378-2f6f-452e-b65c-1866c471e934) 2021-08-30 Chotkan, Rowdy TU Delft
|
||||
> revocation acceptance is at the discretion of individual clients, making our mechanism fully adhere to the principles of Self-Sovereignty. This revocation and verification structure is part of our Industry-Grade Self-Sovereign Identity (IG-SSI) architecture. IG-SSI is a purely academic fully distributed SSI scheme with intrinsic equality across the network. Furthermore, communication is facilitated peer-to-peer, requiring no specialised infrastructure.
|
||||
* [Exploring Potential Impacts of Self-Sovereign Identity on Smart Service Systems](https://www.tib-op.org/ojs/index.php/bis/article/view/68) 2021-04-29 Daniel Richter Dresden, Jürgen Anke
|
||||
> At the core of our conceptual analysis is the service process, which we extract from a reference model. Based on a SWOT analysis, we identify areas for transformation and derive an SSI-enabled interaction model for an electric vehicle charging service. The evaluation of the new process shows that SSI can reduce complexity of integration with partners and can provide a better customer experience through simplified registration and authentication.
|
||||
* [literature] [Decentralized SSI Governance, the missing link in automating business decisions](https://identity-economy.de/decentralized-ssi-governance-the-missing-link-in-automating-business-decisions) 2021-01-15 Rieks Joosten, Sterre den Breeijen, Drummond Reed Evernym, TNO
|
||||
> * Self-sovereign identity could save time and money on bureaucratic processes (form filling and validation) by automating business decisions.
|
||||
> * Business decisions require governance to ensure the data used for making them qualifies (is valid) for that purpose, and continuously remains compliant with laws, regulations, and company policies (which regularly change).
|
||||
> * Companies could share this governance burden by supporting communities that support the provisioning of SSI-related assurances for their specific purposes.
|
||||
> * Such (focused) assurance communities could be supported by tools like credential catalogs and accreditation credentials. We hope this paper inspires SSI proponents to develop not only real SSI infrastructure, but also assurance mechanisms for exchanging qualified data.
|
||||
|
|
|
|||
|
|
@ -27,10 +27,14 @@ last_modified_at: 2023-06-15
|
|||
> 9. Projects underway at [Spain](https://alastria.io/en/id-alastria/) and other member nations in EU
|
||||
> 10. Substantial funding behind Indy based technology stack deployments are being seen
|
||||
> 11. Germany has 3 major streams active in the identity space
|
||||
* [literature] [Legal Identity, Development and Democracy in Northern Europe](https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4110873) 2022-06-01 Jaap van der Straaten :: SSRN
|
||||
> In circles of identity management scholars and practitioners, the general consensus is that the region of northern Europe provides a good practice example [...] Out of the eighteen countries included in northern Europe in this paper, one has no national ID; another denies it has, and seven countries only have a voluntary ID. The extent of national ID coverage is hardly known. Also in the European Union, only six in ten countries have a mandatory ID. It does not matter.
|
||||
|
||||
|
||||
## EU
|
||||
|
||||
* [End-To-End Encryption is Too Important to Be Proprietary](https://doctorow.medium.com/end-to-end-encryption-is-too-important-to-be-proprietary-afdf5e97822) 2022-05-02 Cory Doctorow
|
||||
> The EU’s Digital Markets Act (DMA) is set to become law; it will require the biggest tech companies in the world (Apple, Google and Facebook, and maybe a few others) to open up their instant messaging services (iMessage, Facebook Messenger, Whatsapp, and maybe a few others) so that smaller messaging services can plug into them. These smaller services might be run by startups, nonprofits, co-ops, or even individual tinkerers.
|
||||
* [The European Digital Identity Regulation](https://www.european-digital-identity-regulation.com/) 2023-04-08
|
||||
> The Regulation amends Regulation (EU) 910/2014 on electronic identification and trust services for electronic transactions in the internal market (‘the eIDAS Regulation’). This amendment is required, as digitalisation of all functions of society has increased dramatically. The provision of both public and private services is increasingly becoming digital after the COVID-19 pandemic.
|
||||
* [Commission puts forward declaration on digital rights and principles for everyone in the EU](https://ec.europa.eu/commission/presscorner/detail/en/ip_22_452) 2022-01-26 EU Commission
|
||||
|
|
@ -57,8 +61,6 @@ last_modified_at: 2023-06-15
|
|||
> The European Digital Identity will be available to EU citizens, residents, and businesses who want to identify themselves or provide confirmation of certain personal information. It can be used for both online and offline public and private services across the EU.
|
||||
>
|
||||
> Every EU citizen and resident in the Union will be able to use a personal digital wallet.
|
||||
* [Overview of Member States' eID strategies](https://ec.europa.eu/digital-building-blocks/wikis/download/attachments/364643428/eID_Strategies_v4.0.pdf) 2021-04-07
|
||||
> With this in mind, the following report provides an overview of the national approaches to electronic identification, describing how the 27 Member States are rolling out eID solutions to ensure that digital services can be securely accessed both at national and at European level. The report focusses on the approaches towards eID outlined in national strategy documents, together with other supporting documentation and web resources, with the aim of offering a thorough understanding of the eID state of play across Europe. This understanding of national strategies can feed into discussions on future EU-level action on eID.
|
||||
* [A trusted and secure European e-ID - Regulation](https://digital-strategy.ec.europa.eu/en/library/trusted-and-secure-european-e-id-regulation) 2021-05-28
|
||||
> By offering a European Digital Identity framework based on the revision of the current one, at least 80% of citizens should be able to use a digital ID solution to access key public services by 2030.
|
||||
> [...]
|
||||
|
|
@ -68,8 +70,10 @@ last_modified_at: 2023-06-15
|
|||
> – that natural and legal persons are empowered to use digital identity solutions,
|
||||
> – that these solutions are linked to a variety of attributes and allow for the targeted sharing of identity data limited to the needs of the specific service requested,
|
||||
> – acceptance of qualified trust services in the EU and equal conditions for their provision.
|
||||
* [End-To-End Encryption is Too Important to Be Proprietary](https://doctorow.medium.com/end-to-end-encryption-is-too-important-to-be-proprietary-afdf5e97822) 2022-05-02 Cory Doctorow
|
||||
> The EU’s Digital Markets Act (DMA) is set to become law; it will require the biggest tech companies in the world (Apple, Google and Facebook, and maybe a few others) to open up their instant messaging services (iMessage, Facebook Messenger, Whatsapp, and maybe a few others) so that smaller messaging services can plug into them. These smaller services might be run by startups, nonprofits, co-ops, or even individual tinkerers.
|
||||
* [Overview of Member States' eID strategies](https://ec.europa.eu/digital-building-blocks/wikis/download/attachments/364643428/eID_Strategies_v4.0.pdf) 2021-04-07
|
||||
> With this in mind, the following report provides an overview of the national approaches to electronic identification, describing how the 27 Member States are rolling out eID solutions to ensure that digital services can be securely accessed both at national and at European level. The report focusses on the approaches towards eID outlined in national strategy documents, together with other supporting documentation and web resources, with the aim of offering a thorough understanding of the eID state of play across Europe. This understanding of national strategies can feed into discussions on future EU-level action on eID.
|
||||
* [The growth factors of self-sovereign identity solutions in Europe](https://www.researchgate.net/publication/349899411_The_growth_factors_of_self-sovereign_identity_solutions_in_Europe) 2020-10 Adrian Doerk
|
||||
> This thesis introduces the concept of self-sovereign identity and analysis the factors required to achieve adoption of the concept. It describes the basic components of a self-sovereign identity system and provides the reader with an overview of important conceptual theories to understand the differences to traditional identity systems and the unique approach taken instead. It then dives into the status quo of the discussions around business, technology, legal and governance aspects. It further examines the central factors for the user and describes a know your costumer use-case as well as the current efforts and challenges for higher education certificates for learners. Furthermore, it depicts the diffusion factors of the innovation. While the legal aspects are mainly concerned with regulations from the European Union, the findings in this thesis can be applied globally.
|
||||
|
||||
### See [EBSI]({% link _posts/government/europe/2023-06-08-ebsi.md %}), [eIDAS]({% link _posts/government/europe/2020-01-06-eIDAS.md %}), and [eSSIF-Lab]({% link _posts/history/2023-06-08-essif-lab.md%})
|
||||
|
||||
|
|
|
|||
|
|
@ -7,7 +7,7 @@ excerpt: >
|
|||
permalink : /government/europe/united-kingdom/
|
||||
canonical_url: https://decentralized-id.com/government/europe/united-kingdom/
|
||||
categories: ["Regional"]
|
||||
tags: ["Europe","UK"]
|
||||
tags: ["Europe","UK","NHS","Digital Staff Passport","Real World"]
|
||||
last_modified_at: 2023-06-09
|
||||
toc: false
|
||||
---
|
||||
|
|
@ -59,11 +59,18 @@ toc: false
|
|||
> Shaw adds: “The vital point to make is this: innovations in health technology must ensure self-sovereign identity.
|
||||
* [Lord Holmes discusses state of digital identity in the UK](https://www.biometricupdate.com/202107/lord-holmes-discusses-state-of-digital-identity-in-the-uk) 2021-07
|
||||
> [The next iteration of the framework](https://www.biometricupdate.com/202103/uk-government-runs-new-digital-id-system-pilot-for-public-services) mentioned earlier is due to be published this summer and I look forward to that. It will be essential for that work to not only be underpinned by the twelve guiding principles but also to swiftly ‘sandbox’, stand up parallel proofs in specific sectors and proceed with pace.
|
||||
* [Building an SSI Ecosystem: Digital Staff Passports at the NHS](https://www.windley.com/archives/2021/05/building_an_ssi_ecosystem_digital_staff_passports_at_the_nhs.shtml) 2021-05
|
||||
> How does a functioning credential ecosystem get started? This post goes deep on Manny Nijjar’s work to create a program for using digital staff passports in the sprawling UK NHS bureaucracy.
|
||||
* [Digital identity in the UK in 2021 with TrueProfile.io’s René Seifert](https://www.ubisecure.com/podcast/digital-identity-uk-2021-ssi-trueprofile-rene-seifert/) 2021-01-20 (podcast)
|
||||
> In episode 37, René Seifert talks about the current status of identity in the UK; the government’s recent call for evidence and DIU (digital identity unit); the resultant six guiding principles – including privacy and inclusivity; the potential of self-sovereign identity to solve some of these issues; TrueProfile.io and the importance of verified credentials in an HR context; plus the ethical, political and technical challenges of ‘immunity passports’.
|
||||
|
||||
## Digital Staff Passport - NHS
|
||||
|
||||
* [NHS England Transformation Directorate - Digital staff passport](https://transform.england.nhs.uk/information-governance/guidance/digital-staff-passport/) 2022-06-22
|
||||
> This guidance provides a summary of the information governance (IG) steps which need to be taken so that the Digital Staff Passport can be set up safely and efficiently within an NHS organisation. This allows authorised staff to temporarily work at another NHS organisation more quickly and safely. Digital Staff Passports are not available in social care organisations.
|
||||
* [Literature] [Implementing Self-Sovereign Identity (SSI) for a digital staff passport at UK NHS](https://cpb-us-e1.wpmucdn.com/wordpressua.uark.edu/dist/5/444/files/2018/01/BCoE2022SS1FINAL.pdf) 2022-01 Mary Lacity Walton, Erran Carmel
|
||||
> Self-sovereign identity (SSI) is an idea, a movement, and a decentralized approach for establishing trust online. Many standards-making bodies, open-source working groups, and organizations have been working on SSI and verifiable credentials for years. Although production-ready solutions remain in the developmental stage, business executives, professionals, and students need to start learning about what’s ahead. Business practitioners want to know what is unique about SSI. Is there anything idiosyncratic about managing an SSI project compared to other digital projects? How can we apply SSI to deliver business value? We help to answer those questions by explaining SSI through a case study at UK National Health Service (NHS). NHS developed a digital staff passport to verify health professionals’ qualifications and credentials so that healthcare staff could be moved around quickly during COVID-19. While SSI provides some unique capabilities, it does not require unique project management practices. Like all digital projects, the aim was to build capabilities and design for interoperability to avoid vendor lock-in. Building on its early success, NHS intends to expand the application to enable its strategic people plan.
|
||||
* [Building an SSI Ecosystem: Digital Staff Passports at the NHS](https://www.windley.com/archives/2021/05/building_an_ssi_ecosystem_digital_staff_passports_at_the_nhs.shtml) 2021-05
|
||||
> How does a functioning credential ecosystem get started? This post goes deep on Manny Nijjar’s work to create a program for using digital staff passports in the sprawling UK NHS bureaucracy.
|
||||
|
||||
## Organization
|
||||
* [6 months of KI Identity Assurance in the UK](https://kantarainitiative.org/2022/09/29/6-months-of-ki-identity-assurance-in-the-uk/) 2022-09-29 Kantara Initiative
|
||||
> We believe it is vital that certification bodies work with DCMS and UKAS in a spirit of partnership – bringing together the cumulative value of dozens of great minds! To this end, we have been encouraged by the proactive approach of DCMS in creating forums where the 5 certification bodies can discuss ideas and feedback on the program in action.
|
||||
|
|
|
|||
|
|
@ -8,19 +8,75 @@ header:
|
|||
image: /images/literature-christian-wiediger-unsplash.webp
|
||||
categories: ["Literature"]
|
||||
tags: ["Literature"]
|
||||
toc: true
|
||||
toc_sticky: false
|
||||
redirect_from: literature
|
||||
permalink: literature/
|
||||
canonical_url: 'https://decentralized-id.com/literature'
|
||||
last_modified_at: 2023-06-18
|
||||
last_modified_at: 2023-06-19
|
||||
---
|
||||
|
||||
## Papers
|
||||
|
||||
* [Toward a Post-Quantum Zero-Knowledge Verifiable Credential System for Self-Sovereign Identity](https://eprint.iacr.org/2022/1297) 2022-12-07 Simone Dutto, Davide Margaria, Carlo Sanna, Andrea Vesco of LNKS Foundation & Politecnico di Torino
|
||||
> We describe the two main ZKP VCs schemes based on classical cryptographic assumptions, that is, the signature scheme with efficient protocols of Camenisch and Lysyanskaya, which is based on the strong RSA assumption, and the BBS+ scheme of Boneh, Boyen and Shacham, which is based on the strong Diffie-Hellman assumption. Since these schemes are not quantum-resistant, we select as one of the possible post-quantum alternatives a lattice-based scheme proposed by Jeudy, Roux-Langlois, and Sander, and we try to identify the open problems for achieving VCs suitable for selective disclosure, non-interactive renewal mechanisms, and efficient revocation.
|
||||
* [Self-Sovereign Identity in a World of Authentication: Architecture and Domain Usecases](https://arxiv.org/pdf/2209.11647.pdf) 2022-09-23 Morgan Reece & Sudip Mittal Mississippi State University
|
||||
> In this paper, we describe the SSI framework architecture as well as possible use cases across domains like healthcare, finance, retail, and government. The paper also contrasts SSI and its decentralized architecture with the current widely adopted model of Public Key Infrastructure (PKI).
|
||||
* [Towards the classification of Self-Sovereign Identity properties](https://arxiv.org/pdf/2112.04155.pdf) 2022-08-19 ŠPELACUCKO, ŠEILA BECIROVIC, AIDA KAMIŠALIC, SAŠA MRDOVIC, MUHAMED TURKANOVI
|
||||
> The paper provides an overview of the SSI properties, focusing on an in-depth analysis, furthermore presenting a comprehensive collection of SSI properties that are important for the implementation of the SSI system. In addition, it explores the SSI process flow and highlights the steps in which individual properties are important.
|
||||
* [Distributed Attestation Revocation in Self-Sovereign Identity](https://arxiv.org/abs/2208.05339) 2022-08-10 Rowdy Chotkan, Jérémie Decouchant, Johan Pouwelse
|
||||
> the first fully distributed SSI revocation mechanism that does not rely on specialised trusted nodes. Our novel gossip-based propagation algorithm disseminates revocations throughout the network and provides nodes with a proof of revocation that enables offline verification of revocations. We demonstrate through simulations that our protocol adequately scales to national levels.
|
||||
* [SSI4Web: A Self-sovereign Identity (SSI) Framework for the Web](https://www.researchgate.net/publication/363698387_SSI4Web_A_Self-sovereign_Identity_SSI_Framework_for_the_Web) 2022-07 Sadek Ferdous, Andrei Ionita
|
||||
> a framework for integrating Self-sovereign Identity (SSI) for providing web services in a secure passwordless manner with much more user control and greater flexibility. We provide its architecture, discuss its implementation details, sketch out its use-case with an analysis of its advantages and limitations.
|
||||
* [Self-sovereign Identity: A Conceptual Framework & Ecosystem Design](http://liu.diva-portal.org/smash/record.jsf?pid=diva2%3A1668615&dswid=816) 2022-06-16 Gabriele Tripi, Linköping University.
|
||||
> the findings are presented as two parts of a whole, the first being the conceptual framework that describes a set of essential factors that an ecosystem requires in order to fulfill the goals of self-sovereign identity and interoperability. The second is a set of visualizations of how the framework can be used to design systems and interactions, inside and between the systems, to create an ecosystem.
|
||||
* [Building a Credential Exchange Infrastructure for Digital Identity: A Sociohistorical Perspective and Policy Guidelines](https://www.frontiersin.org/articles/10.3389/fbloc.2021.629790/full) 2022-02-14 Mawaki Chango
|
||||
> Credential Exchange Infrastructures based on open standards are emerging with work ongoing across many different jurisdictions, in several global standards bodies and industry associations, as well as at a national level. This article addresses the technology advances on this topic, particularly around identification mechanisms, through the Self-sovereign identity model.
|
||||
* [A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme](https://www.mdpi.com/1424-8220/22/3/1271) 2022-02-03 Mpyana Mwamba Merlec, Mainul Islam,Youn Kyu Lee, Hoh Peter
|
||||
> This system guarantees the authenticity and integrity of user credentials and e-portfolio data. Decentralized identifiers and verifiable credentials are used for user profile identification, authentication, and authorization, whereas verifiable claims are used for e-portfolio credential proof authentication and verification. We have designed and implemented a prototype of the proposed scheme using a Quorum consortium blockchain network. Based on the evaluations, our solution is feasible, secure, and privacy-preserving. It offers excellent performance.
|
||||
* [How to protect privacy in a datafied society? A presentation of multiple legal and conceptual approaches](https://link.springer.com/article/10.1007/s13347-022-00497-4) 2022-01-29 Oskar J. Gstrein, Anne Beaulieu
|
||||
> serves as a key resource to analyse the usefulness of the approaches in the context of the increasing datafication of both private and public spheres.
|
||||
* [NSSIA: A New Self-Sovereign Identity Scheme with Accountability](https://arxiv.org/pdf/2206.04911.pdf) 2022
|
||||
> This thesis proposes a conceptual framework for the design of an ecosystem that supports self-sovereign identity. The research reviews theory, methodology, and technology from subjects such as design, identity, and distributed systems. Through the design process, a set of elements and functions supporting interactions within an ecosystem were developed. The design is revolved around the ideas of privacy, security, distribution, and interoperability. The findings are presented as two parts of a whole, the first being the conceptual framework that describes a set of essential factors that an ecosystem requires in order to fulfill the goals of self-sovereign identity and interoperability. The second is a set of visualizations of how the framework can be used to design systems and interactions, inside and between the systems, to create an ecosystem.
|
||||
* [Digital Identities and Verifiable Credentials](https://link.springer.com/article/10.1007/s12599-021-00722-y) 2021-10-04 Johannes Sedlmeir, Reilly Smethurst, Alexander Rieger, Gilbert Fridgen
|
||||
> Verifiable credentials and digital wallets offer a convenient, secure, and privacy-oriented alternative to current physical and digital identity management systems. A recent example – COVID-19 vaccination certificates – highlights this. The verification of paper-based vaccination certificates is often error-prone and time-consuming, especially when many certificates have to be verified in a short period of time, e.g., at a football match or when boarding a plane. Moreover, to establish a sufficient level of authenticity, paper-based vaccination certificates are typically disclosed with additional personal information and identity documents, such as a physical ID card. This requirement to disclose a considerable amount of personal information raises privacy concerns, it is inconvenient, and it increases the total verification time.
|
||||
* [A Truly Self-Sovereign Identity System](https://arxiv.org/abs/2007.00415) 2021-09-28 Quinten Stokkink, Georgy Ishmaev, Dick Epema, Johan Pouwelse
|
||||
> we argue that without addressing privacy at the network level, SSI systems cannot deliver on this promise. In this paper we present the design and analysis of our solution TCID, created in collaboration with the Dutch government. TCID is a system consisting of a set of components that together satisfy seven functional requirements to guarantee the desirable system properties.
|
||||
* [Self-Sovereign Identity: A Systematic Map and Review](https://arxiv.org/abs/2108.08338) 2021-08-18 Frederico Schardong, Ricardo Custódio
|
||||
> This study presents a rigorous systematic mapping and systematic literature review covering theoretical and practical advances in Self-Sovereign Identity. We identified and aggregated evidence from publications to answer four research questions, resulting in a classification scheme used to categorize and review publications. Open challenges are also discussed, providing recommendations for future work.
|
||||
* [Global Identity through Blockchain](https://www.researchgate.net/publication/353141617_Global_Identity_through_Blockchain) 2021-05 Rishabh Garg
|
||||
> Cumbrous documentation, unsolicited expenses, undue involvement of intermediaries, and frequent data hacks, are some of the major roadblocks that deprive millions of individuals from having an official identity in India. The present project aims to introduce a DLT enabled All-inclusive ID card to ensure organized and sustainable change at all levels and spheres of life.
|
||||
* [SURF: Technical exploration Ledger-based Self Sovereign Identity](https://www.surf.nl/files/2021-05/technical-exploration-surf-ledger-based-self-sovereign-identity.pdf) 2021-05 Identity Economy DE
|
||||
> This report begins by describing SSI and its concepts, standards and components in more detail in chapter two. Chapter three describes the project activities that were conducted. In chapter four, we describe the technology stack we selected in more detail, to set the stage for chapter five, where we describe the SURF deployment we set up for further testing. In chapter six, we present the findings, both when evaluating the standards and platforms, our experiments with the technical setup we deployed and while testing our use cases.
|
||||
>
|
||||
> Unfortunately, our time was limited and, at the same, time more insight also brought additional questions and ideas. Chapter seven therefore contains a number of suggestions for further work that could be conducted.
|
||||
>
|
||||
> Chapter eight wraps up the document with a number of conclusions on SSI and its applicability in the context of SURF. We have also provided links to online resources including the git repositories, where we have made all our code and deployment information available, as well as some demonstration videos.
|
||||
* [Self-sovereign identity](https://www.researchgate.net/publication/351078806_Self-sovereign_identity/link/608391b6907dcf667bbd9fb9/download)2021-04 Alexandra Giannopoulou Internet Policy Review
|
||||
> The concept of self-sovereign identity (SSI) describes an identity management system created to operate independently of third-party public or private actors, based on decentralised technological architectures, and designed to prioritise user security, privacy, individual autonomy and self-empowerment.
|
||||
* [Self-Sovereign Identity as the Basis for Universally Applicable Digital Identities](https://link.springer.com/article/10.1365/s40702-021-00711-5) 2021-02-22 Tobias Ehrlich, Daniel Richter, Michael Meisel, Jürgen Anke
|
||||
> This paper addresses the role of digital identities for a functioning digital economy and outlines requirements for their management. [...] The concept of Self-Sovereign Identities (SSI) and the associated standards “Verifiable Credentials” and “Decentralized Identifiers” is a promising approach to improve the situation. They allow the flexible exchange of tamper-proof digital proofs between users and systems. Therefore, they form the foundation for building trust relationships in the digital space. This paper introduces the SSI paradigm and discusses the barriers that prevent the wide-scale adoption of this concept.
|
||||
* [Decentralized and Self-Sovereign Identity: Systematic Mapping Study](https://ieeexplore.ieee.org/document/9558805?cmid=296e8b0d-a3de-4224-a628-b90d777ae944) 2021 Špela Čučko Muhamed Turkanović
|
||||
> The results suggest that validation research and solution proposals prevail, addressing decentralized identity in a general matter. Papers mainly propose systems/solutions, architectures, and frameworks, focusing on authentication, security, privacy, and trust, while there are hardly any studies researching usability, user experience, patterns, and good practices.
|
||||
* [Digital identity for development: The quest for justice and a research agenda](https://www.tandfonline.com/doi/full/10.1080/02681102.2021.1859669) 2020-12-29 Silvia Masiero
|
||||
> we first propose a framework to map the theoretical link between digital identity and human development, articulated in three dimensions linking digital identity to expected development outcomes. Secondly, we present the seven papers in this collection in terms of how they problematise such a link, observing how each of them uses empirical data to increase existing knowledge on this connection and question it.
|
||||
* [The Contested Horizons of Digital Identity](https://www.tandfonline.com/doi/full/10.1080/14650045.2020.1823836) 2020-10 Margie Cheesman
|
||||
> I identify a series of competing logics in the debates around SSI’s emancipatory potential, which relate to four issues: (i) the neutrality of the technology, (ii) the capacities of refugees, (iii) global governance and the nation state, and (iv) new economic models for digital identity. SSI is simultaneously the potential enabler of new modes of empowerment, autonomy and data security for refugees and a means of maintaining and extending bureaucratic and commercial power.
|
||||
* [Towards a Modelling Framework for Self-Sovereign Identity Systems](https://arxiv.org/pdf/2009.04327.pdf) 2020-09-10 Iain Barclay, Maria Freytsis†, Sherri Bucher, Swapna Radha, Alun Preece, Ian Taylor
|
||||
> Modelling self-sovereign identity systems seeks to provide stakeholders and software architects with tools to enable them to communicate effectively, and lead to effective and well-regarded system designs and implementations. This paper draws upon research from Actor-based Modelling to guide a way forward in modelling self-sovereign systems, and reports early success in utilising the iStar 2.0 framework to provide a representation of a birth registration case study.
|
||||
* [Beyond Consent: A Right-to-Use License for Mutual Agency](https://ieeexplore.ieee.org/document/9031549) 2019-12 Lisa LeVasseur; Eve Maler
|
||||
> What's needed is a method to enable true mutual agency between any two parties in an Internet-enabled relationship. We propose a right-to-use license for access permissions as a practical alternative to consent and contract as used today, and a taxonomy that classifies important types of permissions. We also examine new data sharing scenarios, including decentralized identity, that may support their use.
|
||||
* [Analysis and Evaluation of Blockchain-based Self-Sovereign Identity Systems](https://wwwmatthes.in.tum.de/pages/hhh5oin2o5sw/Master-s-Thesis-Martin-Schaeffner) 2019-11-19 Martin Schaeffner
|
||||
> The components of SSI will be described in detail, evaluated, and visualized in a components architecture. These include standards like decentralized identifiers (DIDs), verifiable credentials (VCs), and verifiable presentations (VPs). Further, the concepts of a decentralized public key infrastructure (DPKI) and a decentralized key management system (DKMS) are introduced. Additionally, this thesis deals in detail with the trust infrastructure of SSI.
|
||||
>
|
||||
> Additionally, this thesis focuses on SSI systems and their underlying DID methods. To provide an overview of existing identity systems, the SSI ecosystem is analyzed on its currently existing DID methods. Based on the presented DID methods, representative DID methods are selected and examined for further analysis and evaluation of the system. To analyze the DID methods and their systems, criteria are defined to emphasize the differences of each DID method. The results from the analysis are then used for evaluating the DID methods.
|
||||
* [A Decentralized Digital Identity Architecture](https://www.frontiersin.org/articles/10.3389/fbloc.2019.00017/full) 2019-11-05 Geoff Goodell, Tomaso Aste
|
||||
> Although this article shall focus on challenges related to identity systems for adult persons in the developed world, we argue that the considerations around data protection and personal data that are applicable in the humanitarian context, such as those elaborated by the International Committee of the Red Cross (Kuner and Marelli, 2017; Stevens et al., 2018), also apply to the general case. We specifically consider the increasingly commonplace application of identity systems “to facilitate targeting, profiling and surveillance” by “binding us to our recorded characteristics and behaviors” (Privacy International, 2019). Although we focus primarily upon the application of systems for digital credentials to citizens of relatively wealthy societies, we hope that our proposed architecture might contribute to the identity zeitgeist in contexts such as humanitarian aid, disaster relief, refugee migration, and the special interests of children as well.
|
||||
* [Self Sovereign Digital Identity on the Blockchain: A Discourse Analysis](https://www.slideshare.net/eraser/self-sovereign-digital-identity-on-the-blockchain-a-discourse-analysis) 2019-04 Onat Kibaroglu
|
||||
if you want understand the history of self-sovereign intellectual ideas its a good read.
|
||||
> A key aim of this paper then, is to bring a discussion that must be (but currently is not) taking place in an academic context, due to its inherent multidisciplinary nature and complexities, into that particular realm of debate. This ‘history of self-sovereignty’, thus can be read as an experimental discourse analysis that discerns the contemporary usage of the concept
|
||||
* [A Survey on Essential Components of a Self-Sovereign Identity](https://arxiv.org/abs/1807.06346) 2018-07-17 Alexander Mühle, Andreas Grüner, Tatiana Gayvoronskaya, Christoph Meinel
|
||||
> We further distinguish two major approaches, namely the Identifier Registry Model and its extension the Claim Registry Model. [...] We will provide a more coherent view of verifiable claims in regards to blockchain based SSI and clarify differences in the used terminology. Storage solutions for the verifiable claims, both on- and off-chain, are presented with their advantages and disadvantages.
|
||||
* [Matching Identity Management Solutions to Self Sovereign Identity Solutions](https://www.linkedin.com/pulse/matching-identity-management-solutions-self-sovereign-tommy-koens) 2018-05-01 Tommy Koens
|
||||
> We created an analysis of nearly 50 (blockchain based) digital identity management solutions, and matched these against Self Sovereign Identity (SSI) management principles and additional requirements. The document can be found here: [https://www.slideshare.net/secret/uafcwzQQWH86SW](https://www.slideshare.net/TommyKoens/matching-identity-management-solutions-to-selfsovereign-identity-principles)
|
||||
* [A First Look at Identity Management Schemes on the Blockchain](https://arxiv.org/pdf/1801.03294.pdf) 2018-01-10 Paul Dunphy, Fabien A. P. Petitcolas
|
||||
|
|
@ -42,10 +98,34 @@ last_modified_at: 2023-06-18
|
|||
* [The Knowledge Complexity Of Interactive Proofs](https://dl.acm.org/doi/10.1145/22145.22178) 1985 Shafi Goldwasser, Silvio Micali, and Charles Rackoff
|
||||
> In this paper a computational complexity theory of the “knowledge” contained in a proof is developed. Zero-knowledge proofs are defined as those proofs that convey no additional knowledge other than the correctness of the proposition in question. Examples of zero-knowledge proof systems are given for the languages of quadratic residuosity and 'quadratic nonresiduosity. These are the first examples of zero-knowledge proofs for languages not known to be efficiently recognizable.
|
||||
|
||||
### Establishing Self Sovereign Identity - Frontiers Research Topic
|
||||
|
||||
* [Establishing Self Sovereign Identity](https://www.frontiersin.org/research-topics/11806/establishing-self-sovereign-identity-with-blockchain#articles)
|
||||
> • How will society transition from today’s vast, vulnerable identity data silos to SSI?
|
||||
> - Will social media giants and governments embrace or resist SSI?
|
||||
> - Will SSI play a role in activism by civil society organisations?
|
||||
> - What are the incentives and commercial models that will encourage SSI adoption?
|
||||
> - What kinds of governance structures need to be established for SSI?
|
||||
> The purpose of this Research Topic is to generate a rich resource for identity practitioners, researchers, technologists, potential adopters and many more to explore, understand, advance and enrich this subject.
|
||||
* [Editorial: Establishing Self Sovereign Identity with Blockchain](https://www.frontiersin.org/articles/10.3389/fbloc.2022.955868/full) 2022-08-19 Frontiers
|
||||
> This topic is a resource for those seeking to understand the building blocks and challenges of creating and growing SSI identity networks. Developing an SSI system is not straightforward; it takes a journey of collaboration and compromise.
|
||||
* [Exploring Value Propositions to Drive Self-Sovereign Identity Adoption](https://www.frontiersin.org/articles/10.3389/fbloc.2021.611945) 2021-03-04 Mick Lockwood
|
||||
> Original Research This paper presents research exploring the balancing of interactive friction and value proposition in the context of Self-Sovereign Identity (SSI) technology adoption. This work extends a related investigation of a full agency engagement with a
|
||||
* [An Accessible Interface Layer for Self-Sovereign Identity](https://www.frontiersin.org/articles/10.3389/fbloc.2020.609101) 2021-03-02 Mick Lockwood
|
||||
> Original Research The mechanisms and evolving standards collectively known as Self-Sovereign Identity (SSI) offer the prospect of a decentralised Internet by providing a central pillar for a Human-Centred Data Ecosystem (HCDE).
|
||||
* [Development of a Mobile, Self-Sovereign Identity Approach for Facility Birth Registration in Kenya](https://www.frontiersin.org/articles/10.3389/fbloc.2021.631341/full) 2021-01-15 Maria Freytsis1, Iain Barclay, Swapna Krishnakumar Radha, Adam Czajka, Geoffery H. Siwo, Ian Taylor, Sherri Bucher
|
||||
> This paper describes the development of a smartphone-based prototype system that allows interaction between families and health workers to carry out the initial steps of birth registration and linkage of mothers-baby pairs in an urban Kenyan setting using verifiable credentials, decentralized identifiers, and the emerging standards for their implementation in identity systems.
|
||||
* [Distributed Ledger Technologies, Value Accounting, and the Self Sovereign Identity](https://www.frontiersin.org/articles/10.3389/fbloc.2020.00029) 2020-06-23 Sarah Manski
|
||||
> Review Technological activists are designing blockchains and other distributed ledger technologies to challenge extractive value-accounting and identity management in global capitalism.
|
||||
|
||||
## Reports
|
||||
* [Self-sovereign identity as future privacy by design solution in digital identity?](https://iapp.org/resources/article/white-paper-self-sovereign-identity/) 2022-08 International Association of Privacy Professionals (White Paper)
|
||||
> With ongoing research in the field and growing awareness of the potential for privacy protection of SSI solutions, the concepts of privacy by default and privacy by design are increasingly adopted for new architectures using distributed ledger technology. It will, however, need the private sector to follow a SSI market roadmap, and to implement and use the opportunities of SSI to complete this (r)evolution of digital identity
|
||||
* [Self-Sovereign Identities (SSI) – user-focused concept for data-efficient identity management](https://assets.bosch.com/media/global/research/eot/bosch-eot-ssi-principle_en.pdf) 2021-11-18 Bosch
|
||||
> “Since offering users control and sovereignty over their own data is a highly desirable goal, we are working with innovation partners to establish an identity system that works without any central data collector and is operated equally by many participants,” says Dr. Nik Scharmann, Project Director of the “Economy of Things” (EoT) strategic advance engineering project at Bosch Research.
|
||||
* [Digital Identity: the current state of affairs](https://www.bbvaresearch.com/wp-content/uploads/2018/02/Digital-Identity_the-current-state-of-affairs.pdf) 2018-02 BBVA Research
|
||||
> As public identities have been created by different authorities, and since a global public or private identity is not a realistic option in the short term, interoperability and the collaboration between different entities to offer complete solutions is decisive. In the long run, to become a trusted identity provider across different industries could represent a big business opportunity for financial institutions
|
||||
* [Blockchain: Evolving Decentralized Identity Design](https://www.gartner.com/doc/3834863/blockchain-evolving-decentralized-identity-design) 2017-12-01
|
||||
> Decentralized identity is evolving into self-sovereign identity networks and verification services. While efforts are underway to establish standards for these ecosystems, technical professionals should identify processes that will be affected and plan for integration scenarios in coming years.
|
||||
* [A Comprehensive Guide to Self Sovereign Identity](https://www.amazon.com/Comprehensive-Guide-Self-Sovereign-Identity-ebook/dp/B07Q3TXLDP) 2019-04-06 Kaliya Identity Woman Young and Heather Vescent [[Related](https://www.thepaypers.com/expert-opinion/10-things-you-need-to-know-about-self-sovereign-identity-part-1/774556)]
|
||||
> Self Sovereign Identity technologies give individuals and companies the ability to control and manage their own digital identifiers. This technology is gaining momentum as it solves previously unsolvable challenges. With the emergence of SSI open standards, a new layer of the internet emerges for the identity of people and organizations. SSI represents a new paradigm -- it changes the identity game completely.
|
||||
> Self Sovereign Identity technologies give individuals and companies the ability to control and manage their own digital identifiers. This technology is gaining momentum as it solves previously unsolvable challenges. With the emergence of SSI open standards, a new layer of the internet emerges for the identity of people and organizations. SSI represents a new paradigm -- it changes the identity game completely.
|
||||
|
|
|
|||
|
|
@ -91,6 +91,8 @@ Disambiguating between Evernym, Sovrin, and Indy
|
|||
|
||||
### Literature
|
||||
|
||||
* [Sovrin: An Identity Metasystem for Self-Sovereign Identity](https://www.frontiersin.org/articles/10.3389/fbloc.2021.626726/full) 2021-07-28 Phillip J. Windley
|
||||
> presents the architecture of an identity metasystem called the Sovrin Network that aims to improve the user experience, increase flexibility, and reduce overall costs while supporting better privacy and security. We discuss the problems of online identity on the modern internet, discuss the nature of digital relationships, explore the architectures of identity systems, and detail the combination of these concepts into a comprehensive metasystem for solving the problems of online identity.
|
||||
* [A Comprehensive Evaluation of the Identity Management Utility Sovrin](https://dutchblockchaincoalition.org/assets/images/default/Blockchain-Sovrin-rapport.pdf) 2018-10-16 Dutch Blockchain Coalition
|
||||
> The Dutch Blockchain Coalition (DBC) considers that ‘reliable identification and authentication are basic conditions for virtually all applications of blockchain’[1]. However, currently most identity management solutions are under central governance. Examples can be found in most social media platforms such as Facebook and Google accounts. Additionally, this extends to real world examples, such as a passport or a driver’s license provided by government. Although these solutions seem to work in practice, there is an essential issue. Namely, the owner of the identity is not in control of his/her identity. For example, a social media platform may decide to remove an account based on its own policy, leaving the identity owner with a virtual gap in its existence. Additionally, identifiers (such as a passport) provide a lot of -arguably too much- information about the identity holder, even though only a single attribute (e.g. the date of birth) needs to be known. Indeed, identity owners are no longer in control of their identity when using centralized identity management solutions
|
||||
* [A Conceptual Analysis on Sovrin](https://www.researchgate.net/publication/323144927_A_Conceptual_Analysis_on_Sovrin) 2018-01 Rieks Joosten, TNO
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue