9.6 KiB
date | title | layout | description | excerpt | header | categories | tags | redirect_from | permalink | canonical_url | last_modified_at | ||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2019-03-11 | Identity Articles, Research and Literature | single | A selection of DID related literature and top level resources for discovery of more. | A selection of DID related literature and top level resources for discovery of more. |
|
|
|
literature | literature/ | https://decentralized-id.com/literature | 2019-07-11 |
- Security without Identification: Transaction Systems to make Big Brother Obsolete - David Chaum 1985
- Establishing Identity Without Certification Authorities
- A First Look at Identity Management Schemes on the Blockchain
- ChainAnchor — Anonymous Identities for Permissioned Blokchains
- Decentralizing Privacy: Using Blockchain to Protect Personal Data
- Towards Self-Sovereign Identity using Blockchain Technology
- Self-sovereign Identity – Opportunities and Challenges for the Digital Revolution
- The Knowledge Complexity Of Interactive Proofs
- A Conceptual Analysis on Sovrin
- Blockchain for Identity Management - Details early efforts towards Blockchain-ID
- Matching Identity Management Solutions to Self Sovereign Identity Solutions
- OIX White Paper: Trust Frameworks for Identity Systems
- WEF The Known Traveller Digital Identity Concept
- Analysis and Evaluation of Blockchain-based Self-Sovereign Identity Systems
The components of SSI will be described in detail, evaluated, and visualized in a components architecture. These include standards like decentralized identifiers (DIDs), verifiable credentials (VCs), and verifiable presentations (VPs). Further, the concepts of a decentralized public key infrastructure (DPKI) and a decentralized key management system (DKMS) are introduced. Additionally, this thesis deals in detail with the trust infrastructure of SSI.
Additionally, this thesis focuses on SSI systems and their underlying DID methods. To provide an overview of existing identity systems, the SSI ecosystem is analyzed on its currently existing DID methods. Based on the presented DID methods, representative DID methods are selected and examined for further analysis and evaluation of the system. To analyze the DID methods and their systems, criteria are defined to emphasize the differences of each DID method. The results from the analysis are then used for evaluating the DID methods.
- Distributed Ledger Technology for eHealth Identity Privacy: State of The Art and Future Perspective
In the decentralized trusted identity model, the identity provider still centralized and performs the user’s identity proofing based on trusted credentials like passports or driver licenses while uses the DLT to store the identity attestation for later validation by third parties services and trusted organizations as is shown in Figure 1b [46]. The decentralized trusted identity doesn’t use the concept of identity repository which is the slight difference from the SSI model, and the identity provider will provide the receiving entity a testimony on the validity of the data while all the credentials are encrypted and stored locally in the user phone.
Reports
- EU BLOCKCHAIN OBSERVATORY AND FORUM — Workshop Report — e-Identity, Brussels, November 7, 2018
- A Comprehensive Evaluation of the Identity Management Utility Sovrin
- How Blockchain Revolutionizes Identity Management
- Digital Identity: the current state of affairs
- Blockchain: Evolving Decentralized Identity Design
- IDENTITY MATTERS
- Accenture: ID2020: DIGITAL IDENTITY with Blockchain and Biometrics
- Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledge Proofs —slideshare
- r3- Identity in Depth
- Global Blockchain Identity Management Market 2018-2022
- A Comprehensive Guide to Self Sovereign Identity - by Kaliya 'Identity Woman' Young and Heather Vescent [ϟ]
- Report launch: ‘Identity at the Margins — identification systems for refugees”
- WEF: Identity in a Digital World A new chapter in the social contract
- The Credential Highway - How Self-Sovereign Identity Unlocks Property Rights for the Bottom Billion
Why? Because the pieces of evidence that administrative agencies require to register property — things like a survey plan, a notarized will, or a state-issued identity card — may be inaccessible, or may not represent the reality of rights on the ground. As a result, land administration systems end up excluding billions of people.
Decentralized Public Key Infrastructure DPKI
- RWoT—Decentralized Public Key Infrastructure
- SCPKI: A Smart Contract-based PKI and Identity System
- KeyChains: A Decentralized Public-Key Infrastructure
- ClaimChain: Decentralized Public Key Infrastructure
- A Decentralized Public Key Infrastructure with Identity Retention
- Privacy based decentralized Public Key Infrastructure (PKI) implementation using Smart contract in Blockchain
Additional Thought around Identity
- Is putting hashed PII on any immutable ledger(blockchain) is a bad Idea
- Decentralized Identity Trilemma
There seems to exist a trilemma in decentralized identity analogous to @Zooko's triangle. None of the existing solutions are at the same time: 1) privacy-preserving, 2) Sybil-resistant 3) self-sovereign -[T]
- Maciek Laskus - BLOCKWALKS (video)
- "I designed an algorithm that mapped out people working on identity using Twitter data:" Identity list
- Proof of Thought (PoT)
- Queer Privacy
Stories about using the Internet as a tool to find out more about yourself, and as a tool to express and empower; about the dangers of Internet censorship and about the practical realities of maintaining multiple distinct digital identities.
- @SarahJamieLewis Twitter thread on Identity
Any technology which relies on the existence of, or attempts to create a, global, unique identity is oppressive by design. Stop" innovating" oppressive structures.