10 KiB
date | title | description | excerpt | header | layout | permalink | categories | tags | last_modified_at | toc | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2019-04-11 | Blockchain Identity | Why Blockchain for Identity? + Assorted Blockchain ID Initiatives | Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. |
|
single | /blockchain/ |
|
|
2023-06-09 | false |
- [curated list] Peacekeeper's Blockchain and Identity 2021-11-23
- Identity Blockchains and Energy Consumption 2021-10-19 Indicio
A decentralized network using a blockchain-based distributed ledger means you can use Peer DIDs to move most “transactions” and their cryptographic proofing off ledger. This means that for those peer-to-peer interactions, identity blockchains don’t need to do any ledger transactions at all.
* Self Sovereign Identity ≠ Blockchain 2021-11-09 Jolocom
Due to the ID-Wallet project in Germany, some articles and comments have equated Self Sovereign Identity (SSI) with blockchain technology in the last few weeks. The impression is given that SSI only works in conjunction with a blockchain. Spoiler, that’s not the case.
- [tweet thread] Technically you're right. Blockchain is not inherent to DIDs 2021-08-13 Steve Wilson
Most DID presentations (as with much SSI) open with a bit of a disclaimer that these technologies don't need blockchain. And yet the word-association is strong. Many DID block diagrams feature a blockchain. -/2
- Legitimacy and Decentralized Systems 2021-04 Windley
Why are some decentralized systems accepted and widely used while others wither? Why do some “hard forks” succeed while others fail? It all comes down to legitimacy.
- Why Distributed Ledger Technology (DLT) for Identity? 2021-04-21 Hyperledger
So why DLT? First, we can get the good parts of paper credentials—private transactions between holders and verifiers and no callback to the issuer. Second, the issuer gets a trusted, open and transparent way to publish the cryptographic material needed for those private holder-verifier transactions. Third, there is no need to have a “Trusted Third Party” participating in the interactions.
And did I mention, no private data goes on the DLT!!!
- Digital Identity and Blockchain – Its Place in Newer Identity Models 2021-04-21
In the first part of this series, we introduced the idea that traditional PKI-based digital identity solutions can potentially benefit from blockchain technology. [...] For this next part of the series, we’ll touch on the relatively new idea of self-sovereign identity, or SSI.
- Blockchain is the Least Interesting Thing About Self-sovereign Identity 2020-09-23 Riley Huges
as useful as blockchain is for SSI, it’s nowhere near as interesting as:
- The impact on the internet
- The benefits of technical standards
- The economic opportunity for early innovators
- Identity and Distributed Ledger - Today and Tomorrow - June 26 - Identiverse 2019 2019-06-26
Join our expert panel, moderated by Paul Madsen, as they discuss and debate the future of distributed identity technology and its applications in solving identity problems.
- If ledger isn’t used, then every issuer of a credential has to maintain infrastructure 2018-12-09 Phil Windley
or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy.
- Part 3: Blockchange and Identity – The Foundational Use Case GovLab 2018-11-01
The contemporary IAM literature focuses on two central types of identity. The first is foundational identity, which is usually equated with legal identity. Here, after collecting attributes, individuals are issued a unique ID that is legally recognized at the national level and can be used to access different services. Legal IDs are almost always issued by the state in a centralized fashion. National ID cards are perhaps the best example of a foundational identity.
The second type is called functional or transactional ID. In this case, a particular entity, public or private, issues individuals or customers a unique ID that is only valid for the specific purposes previously established by the issuing entity. Electoral identities, health or car insurance cards, and ecommerce login credentials are good examples.
- Blockchain Identity – Success Factors and Challenges 2018-05-16 Martin Kuppinger
When new things arrive, which are still in the pioneering stage and far from reaching maturity, there is always a lot of discussion. This is even more true for Blockchain Identity, where the massive hype around Blockchains, a long history of clever ideas failing, and a few interesting technical and security challenges come together. During my keynote at this year’s EIC, I addressed the challenges and success factors for Blockchain ID as well. That led to a discussion on Twitter about whether some of these success factors are contradictory.
- Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea 2018-02-03 Identity Woman
I decided to open a thread On Twitter for ID & security professionals to share why (/if) putting hashed PII on any immutable ledger(blockchain) is a bad Idea.
Not everyone agreed that it was bad if certain things were done right.
There were 15 direct responses and then a whole lot of subthreads. - Blockchain-Anchored Identity – A Gateway to Decentralized Apps and Services 2017-05-10 Daniel Buchner
Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services.
- Self-Sovereign Identity and the Legitimacy of Permissioned Ledgers 2016-09
This post justifies the claim that an identity system based on a permissioned distributed ledger is legitimately self-sovereign. The post also examines the claims to legitimacy that social login and distributed ledger identity systems make.
- Blockchain for Identity - Myth or Potential 2018-06-16
Authentication might definitely become simpler, by having various authenticators and IDs, from eIDs to social logins, associated with a wallet. Just one simple store to get access. Yes, there are challenges in creating secure, easy-to-use wallets, but there is potential as well.
Literature
- [NIST CYBERSECURITY WHITE PAPER] A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems 2019-06-09
Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.
- Towards Self-Sovereign Identity using Blockchain Technology 2016-10-26
Blockchain technology could function as the foundation of such system being a network for decentralized trust and exchange. Because everyone can participate as issuer or acquirer (and both), there are low adoption barriers and low costs. This allows new business opportunities for governments, banks and other authorities and more transparency and control for end-users.