decentralized-id.github.io/_posts/blockchain/2019-04-11-blockchain-identity.md
⧉ infominer 4eae83bddb sort
2023-06-15 12:28:33 +05:30

7.0 KiB
Raw Blame History

date title description excerpt header layout permalink categories tags last_modified_at toc
2019-04-11 Blockchain Identity Why Blockchain for Identity? + Assorted Blockchain ID Initiatives Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate.
image caption teaser
/images/blockchain-id-header.webp [NIST Cybersecurity (DRAFT) Blockchain Identity Management Approaches](https://arxiv.org/pdf/1908.00929.pdf) /images/blockchain-Tumisu_3019121.webp
single /blockchain/
Blockchain ID
NIST
Identiverse
Authenteq
Blockstack
Civic
Microsoft
Datum
ProCivis
2023-06-09 false
  • [curated list] Peacekeeper's Blockchain and Identity 2021-11-23
  • Identity Blockchains and Energy Consumption 2021-10-19 Indicio A decentralized network using a blockchain-based distributed ledger means you can use Peer DIDs to move most “transactions” and their cryptographic proofing off ledger. This means that for those peer-to-peer interactions, identity blockchains dont need to do any ledger transactions at all.
  • [NIST CYBERSECURITY WHITE PAPER] A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems 2019-06-09

    Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.

  • Identity and Distributed Ledger - Today and Tomorrow - June 26 - Identiverse 2019 2019-06-26

    Join our expert panel, moderated by Paul Madsen, as they discuss and debate the future of distributed identity technology and its applications in solving identity problems.

  • Phil Windley (@windley) 2018-12-09

    If ledger isnt used, then every issuer of a credential has to maintain infrastructure or contract service provider to respond to DID resolution & revocation requests. And, credential issuers would know when the credential was used, impacting privacy.

  • Part 3: Blockchange and Identity The Foundational Use Case GovLab 2018-11-01

    The contemporary IAM literature focuses on two central types of identity. The first is foundational identity, which is usually equated with legal identity. Here, after collecting attributes, individuals are issued a unique ID that is legally recognized at the national level and can be used to access different services. Legal IDs are almost always issued by the state in a centralized fashion. National ID cards are perhaps the best example of a foundational identity.

    The second type is called functional or transactional ID. In this case, a particular entity, public or private, issues individuals or customers a unique ID that is only valid for the specific purposes previously established by the issuing entity. Electoral identities, health or car insurance cards, and ecommerce login credentials are good examples.

  • Blockchain Identity Success Factors and Challenges 2018-05-16 Martin Kuppinger

    When new things arrive, which are still in the pioneering stage and far from reaching maturity, there is always a lot of discussion. This is even more true for Blockchain Identity, where the massive hype around Blockchains, a long history of clever ideas failing, and a few interesting technical and security challenges come together. During my keynote at this years EIC, I addressed the challenges and success factors for Blockchain ID as well. That led to a discussion on Twitter about whether some of these success factors are contradictory.

  • Blockchain-Anchored Identity A Gateway to Decentralized Apps and Services 2017-05-10 Daniel Buchner

    Blockchains possess unique properties that can be used to build systems that significantly impact our world. Perhaps no area of utilization, besides raw value exchange, is as intriguing as decentralized identity. In this talk we will discuss how blockchain-anchored decentralized identity can be used as a substrate for secure, user-centric apps and services.

  • Towards Self-Sovereign Identity using Blockchain Technology 2016-10-26

    Blockchain technology could function as the foundation of such system being a network for decentralized trust and exchange. Because everyone can participate as issuer or acquirer (and both), there are low adoption barriers and low costs. This allows new business opportunities for governments, banks and other authorities and more transparency and control for end-users.

  • Self-Sovereign Identity and the Legitimacy of Permissioned Ledgers 2016-09

    This post justifies the claim that an identity system based on a permissioned distributed ledger is legitimately self-sovereign. The post also examines the claims to legitimacy that social login and distributed ledger identity systems make.

  • Blockchain for Identity - Myth or Potential 2018-06-16

    Authentication might definitely become simpler, by having various authenticators and IDs, from eIDs to social logins, associated with a wallet. Just one simple store to get access. Yes, there are challenges in creating secure, easy-to-use wallets, but there is potential as well.