mirror of
https://github.com/Decentralized-ID/decentralized-id.github.io.git
synced 2024-12-14 18:14:27 -05:00
3427 lines
177 KiB
JSON
3427 lines
177 KiB
JSON
{
|
|
"2018 Identity Landsacpe brought to you by: One World Identity": {
|
|
"Description": "A snapshot of the identity landscape by oneworldidentity.com",
|
|
"Link": [
|
|
"https://oneworldidentity.com/wp-content/uploads/2018/10/companies.png"
|
|
],
|
|
"Tags": [
|
|
"owi",
|
|
"identification",
|
|
"image",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"@ChristopherA on DID adoption": {
|
|
"Description": "22/ Over a dozen companies and organizations, using multiple blockchains (Bitcoin, Ethereum, Hyperledger, etc.), have committed to deploying DIDs, including IBM, Microsoft, Digital Bazaar, Consensys, Evernym, Learning Machine, British Columbia, and more:",
|
|
"Link": [
|
|
"https://twitter.com/ChristopherA/status/989122017348784130",
|
|
"https://www.computerworld.com/article/3267930/blockchain/how-blockchain-could-solve-the-internet-privacy-problem.html"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"christophera",
|
|
"w3c",
|
|
"decentralized-id",
|
|
"adoption",
|
|
"twitter"
|
|
]
|
|
},
|
|
"@ChristopherA on Self-Sovereign ID \u2014A Tweetstorm": {
|
|
"Description": "0/ Self-Sovereign Identity: A Progress Report\u2026",
|
|
"Link": [
|
|
"https://twitter.com/ChristopherA/status/989120215702261761"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"christophera",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"twitter"
|
|
]
|
|
},
|
|
"A Decentralized Approach to Blockcerts Credential Revocation": {
|
|
"Description": "Blockcerts are blockchain-anchored credentials with a verification process designed to be decentralized and trustless. While the Blockcerts standard itself is extensible, the revocation method used in the reference implementation is an issuer-hosted revocation list, which is a known centralization point.\n\nThis proposal describes an alternate method of issuing Blockcerts using Ethereum, which allows for a new form of revocation by either the issuer or the recipient.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/blockcerts-revocation.md"
|
|
],
|
|
"Tags": [
|
|
"blockcerts",
|
|
"credentials",
|
|
"ethereum",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"whitepaper",
|
|
"rwot"
|
|
]
|
|
},
|
|
"A First Look at Identity Management Schemes on the Blockchain": {
|
|
"Description": "Abstract. The emergence of distributed ledger technology (DLT) based upon a blockchain data structure, has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control in transactions that involve identity information; but, given the historical challenge to design IdM, can these new DLTbased schemes deliver on their lofty goals? We introduce the emerging landscape of DLT-based IdM, and evaluate three representative proposals \u2013 uPort, ShoCard and Sovrin \u2013 using the analytic lens of a seminal framework that characterises the nature of successful IdM schemes.",
|
|
"Link": [
|
|
"https://arxiv.org/pdf/1801.03294.pdf"
|
|
],
|
|
"Tags": [
|
|
"research-paper",
|
|
"uport",
|
|
"shocard",
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"academic"
|
|
]
|
|
},
|
|
"A Primer on Functional Identity": {
|
|
"Description": "There are many ways to approach identity. For the Rebooting Web of Trust, we prefer a functional approach to focus conversations on how identity works and how we use it.\n\nThe varied facets of identity are so rich that we each bring our own hot buttons and agendas to any discussion. Some people engage from a philosophical perspective, others cultural. Some dive into political issues and others get meta-physical and spiritual. These different perspectives are valid views of identity's impact on our lives. More than valid. Vital. They help answer the question of \"Why?\" Why identity matters, why we should care. Unfortunately, they also inflame passions. We sometimes talk past each other to make points that have minimal relevance for others, leaving people frustrated and unheard.\n\nAs engineers and system designers, we're concerned with how things work. We want to fix what's broken and build new things. To do that, we want to discuss how things function. With identity, this functional perspective sidesteps the inflammatory rabbit holes, without dismissing them. Functional Identity lets us investigate the HOW without prejudice to WHY, viewing identity systems based on how they work and then, in turn, how they affect individuals and society.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/topics-and-advance-readings/functional-identity-primer.md"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"developing",
|
|
"blog",
|
|
"documentation"
|
|
]
|
|
},
|
|
"A Universal Resolver for self-sovereign identifiers": {
|
|
"Description": "DIF is introducing a community preview of the Universal Resolver\u200a\u2014\u200aa core building block of a decentralized identity system. This is a first step in fulfilling DIF's mission to help individuals and organizations to control their digital identity, without being dependent on any intermediary party.",
|
|
"Link": [
|
|
"https://medium.com/decentralized-identity/a-universal-resolver-for-self-sovereign-identifiers-48e6b4a5cc3c"
|
|
],
|
|
"Tags": [
|
|
"identity-foundation",
|
|
"self-sovereign",
|
|
"did",
|
|
"blog",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"A Universal Trust Framework": {
|
|
"Description": "The Internet has never had a universal trust framework before. Imagine if you could build the next sharing economy application without having to also build the platform that helps people trust. This post describes a universal trust framework that is open to all. Sovrin changes the world by providing a universal means of trusting.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2017/01/a_universal_trust_framework.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"AID:Tech": {
|
|
"Description": "is a voucher and digital identity solution for refugees. A digital record of a person's identity is stored on a smart card, along with various additional information. Blockchain technology is used to distribute all resources in a highly traceable manner.",
|
|
"Link": [
|
|
"https://aid.technology/"
|
|
],
|
|
"Tags": [
|
|
"aid-tech",
|
|
"humanitarian",
|
|
"un",
|
|
"blockchain-id",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Accenture: ID2020: DIGITAL IDENTITY with Blockchain and Biometrics": {
|
|
"Description": "Accenture has joined the ID2020 Alliance with partners like Microsoft to create an open, human-centric approach to identity. The alliance draws on advances in biometrics and innovative technologies and brings together expertise from business, government and non-government agencies. Our experts at the Dublin Innovation Center contribute cross-functional and cross-cultural expertise to drive it forward in collaboration with both UN and other global humanitarian organizations. Get in touch with us.",
|
|
"Link": [
|
|
"https://www.accenture.com/us-en/insight-blockchain-id2020"
|
|
],
|
|
"Tags": [
|
|
"id2020",
|
|
"accenture",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"Action Agenda\u2014Dutch Blockchain Coalition": {
|
|
"Description": "From agriculture to health care, education, logistics or science, not a single sector can work without the use of ICT. Every (top)sector is aware of the ICT-challenges they face. However, there are also many cross connections. A successful application of an ICT-solution in one sector can also be applied to another.\n\nThe goal of Dutch digital delta is to use those cross connections and to turn them into opportunities. When used more resourcefully, we are able to fully capitalize on the innovations in ICT in the future and to further advance economic growth in The Netherlands. dutch digital delta stimulates and initiates innovations in ICT for all sorts of (top)sectors.\n\nLine of action 1: Development of blockchain building blocks: Digital Identities",
|
|
"Link": [
|
|
"https://dutchdigitaldelta.nl/uploads/pdf/Dutch-Blockchain-Coalition-action-agenda-ENG.pdf",
|
|
"https://www.dutchdigitaldelta.nl/en/blockchain"
|
|
],
|
|
"Tags": [
|
|
"dutch-blockchain",
|
|
"agenda",
|
|
"state",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"ActivityPub: From Decentralized to Distributed Social Networks": {
|
|
"Description": "ActivityPub is a protocol being developed at the W3C for the purpose of building federated social systems. Users can use implementations of ActivityPub like Mastodon and MediaGoblin as libre alternatives to large siloed social networking systems such as Facebook, Twitter, YouTube, and Instagram.1\n\nIn general ActivityPub follows the client-server paradigm that has been popular on the World Wide Web, while restoring some level of decentralization. Current implementations of ActivityPub go as far as to bring a level of decentralization akin to email,2 but there are many opportunities to go further.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/activitypub-decentralized-distributed.md"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"whitepaper",
|
|
"activitypub",
|
|
"social-network",
|
|
"federated",
|
|
"w3c",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Akarion": {
|
|
"Description": "offers a blockchain-bases SaaS product that helps companies to be GDPR compliant. All GDPR-relevant events are stored in a decentralized journal and visualized on a dashboard.",
|
|
"Link": [
|
|
"https://akarion.com/"
|
|
],
|
|
"Tags": [
|
|
"akarion",
|
|
"baas",
|
|
"gdpr",
|
|
"regulations",
|
|
"personal-data-wallet",
|
|
"blockchain-id",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Alastria": {
|
|
"Description": "is a non-profit consortium building a national blockchain ecosystem for Spain. The security and veracity of information will be ensured through the identification of natural and legal persons, while at the same time allowing citizens to have control over their personal information in a transparent way following the guidelines set by the European Union.-#peacekeeper",
|
|
"Link": [
|
|
"https://alastria.io/",
|
|
"https://github.com/alastria/alastria-identity",
|
|
"https://github.com/alastria/alastria-identity/blob/develop/Docs/Acciones.md"
|
|
],
|
|
"Tags": [
|
|
"spain",
|
|
"alastria",
|
|
"non-profit",
|
|
"gdpr",
|
|
"regulations",
|
|
"blockchain-id",
|
|
"national-blockchain",
|
|
"uport",
|
|
"quorum",
|
|
"ethereum",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Amira 1.0": {
|
|
"Description": "In our scenario, Amira is a successful programmer working in Boston at a prestigious multi-national bank. Outside of working hours, Amira wants to give back to her community by writing software that matters. On the advice of her friend Charlene, Amira joins RISK, a self-sovereign reputation network that connects developers with projects while protecting participants' anonymity, building reputation, and sending & receiving secure payments.\n\nInformation Lifecycle Engagement Model\n\nWe describe Amira's interactions with RISK using the Information Lifecycle Engagement Model. This 15-stage model captures the experience of a single, fictitious individual as she interacts with a proposed system. The model intentionally limits our focus to the connected experience of a single human protagonist and the people they engage along the way, in one or more paragraphs about interactions in each of the 15 stages.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/amira.md"
|
|
],
|
|
"Tags": [
|
|
"use-case",
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials": {
|
|
"Description": "Abstract. The success of electronic authentication systems, be it eID card systems or Internet authentication systems such as CardSpace, highly depends on the provided level of user-privacy. Thereby, an important requirement is an efficient means for revocation of the authentication credentials. In this paper we consider the problem of revocation for certificate-based privacy-protecting authentication systems. To date, the most efficient solutions for revocation for such systems are based on cryptographic accumulators. Here, an accumulate of all currently valid certificates is published regularly and each user holds a witness enabling her to prove the validity of her (anonymous) credential while retaining anonymity. Unfortunately, the users' witnesses must be updated at least each time a credential is revoked. For the know solutions, these updates are computationally very expensive for users and/or certificate issuers which is very problematic as revocation is a frequent event as practice shows.\nIn this paper, we propose a new dynamic accumulator scheme based on bilinear maps and show how to apply it to the problem of revocation of anonymous credentials. In the resulting scheme, proving a credential's validity and updating witnesses both come at (virtually) no cost for credential owners and verifiers. In particular, updating a witness requires the issuer to do only one multiplication per addition or revocation of a credential and can also be delegated to untrusted entities from which a user could just retrieve the updated witness. We believe that thereby we provide the first authentication system offering privacy protection suitable for implementation with electronic tokens such as eID cards or drivers' licenses.",
|
|
"Link": [
|
|
"https://eprint.iacr.org/2008/539.pdf"
|
|
],
|
|
"Tags": [
|
|
"camenisch",
|
|
"privacy",
|
|
"research-paper",
|
|
"sovrin",
|
|
"indy",
|
|
"ibm",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"idemix",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation": {
|
|
"Description": "Abstract. A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users. In this paper we propose a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones: (1) We give the first practical solution that allows a user to unlinkably demonstrate possession of a credential as many times as necessary without involving the issuing organization. (2) To prevent misuse of anonymity, our scheme is the first to offer optional anonymity revocation for particular transactions. (3) Our scheme offers separability: all organizations can choose their cryptographic keys independently of each other. Moreover, we suggest more effective means of preventing users from sharing their credentials, by introducing allor-nothing sharing: a user who allows a friend to use one of her credentials once, gives him the ability to use all of her credentials, i.e., taking over her identity. This is implemented by a new primitive, called circular encryption, which is of independent interest, and can be realized from any semantically secure cryptosystem in the random oracle model.",
|
|
"Link": [
|
|
"https://www.iacr.org/archive/eurocrypt2001/20450093.pdf"
|
|
],
|
|
"Tags": [
|
|
"camenisch",
|
|
"camenisch-lysyanskaya",
|
|
"privacy",
|
|
"research-paper",
|
|
"sovrin",
|
|
"indy",
|
|
"ibm",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"idemix"
|
|
]
|
|
},
|
|
"An Internet for Identity": {
|
|
"Description": "Online services and interactions are being held back by the lack of identity systems that have the same virtues as the Internet. This post describes what we can expect from an Internet for identity.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2016/08/an_internet_for_identity.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"AnonCreds: Anonymous credentials protocol implementation in python": {
|
|
"Description": "This is a python implementation of the anonymous credentials ideas developed by IBM Research (see https://idemix.wordpress.com/ and http://www.research.ibm.com/labs/zurich/idemix/). We have built some additional features for revocation.",
|
|
"Link": [
|
|
"https://github.com/hyperledger/indy-anoncreds",
|
|
"https://github.com/hyperledger/indy-anoncreds/blob/master/docs/anoncred-usecase1.pdf"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"indy",
|
|
"ibm",
|
|
"decentralized-id",
|
|
"protocol",
|
|
"python",
|
|
"idemix",
|
|
"blockchain-id",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"Authenteq": {
|
|
"Description": "Authenteq is an automatic identity verification and privacy platform which enables users to verify their identity and create their own sovereign digital IDs which are stored encrypted in a blockchain. Any personal user information is user-owned and user-controlled, and not accessible by anyone, including us. With an Authenteq ID, users can choose to verify their identity, or parts of their identity to third parties using our claims verification API.\n\nis an automatic identity verification platform that uses a facial recognition algorithm to create a digital identity on a blockchain.",
|
|
"Link": [
|
|
"http://authenteq.com/"
|
|
],
|
|
"Tags": [
|
|
"authenteq",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"platform"
|
|
]
|
|
},
|
|
"Aversafe": {
|
|
"Description": "allows individuals to store personal details, work history, certificates and achievements. It leverages a permissioned blockchain for trusted audit and participation in the storage of attestation data separate from the actual data stored on users' phones.-#peacekeeper",
|
|
"Link": [
|
|
"https://www.aversafe.com/"
|
|
],
|
|
"Tags": [
|
|
"aversafe",
|
|
"personal-data-wallet",
|
|
"blockchain-id",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"BCGov Verifiable Organization Network \u2013 Impressive Client Demo": {
|
|
"Description": "One of my favourite client projects (Verifiable Organization Network) was demonstrated at last month's Rebooting the Web of Trust conference in Santa Barbara. John Jordan runs an incredible project out of the Office of the CIO for British Columbia. I play a minor role providing executive leadership and advising. John nailed the presentation.",
|
|
"Link": [
|
|
"https://www.continuumloop.com/bcgov-verifiable-organization-network/"
|
|
],
|
|
"Tags": [
|
|
"von",
|
|
"rwot",
|
|
"bc-gov",
|
|
"credentials",
|
|
"state"
|
|
]
|
|
},
|
|
"Banqu": {
|
|
"Description": "focuses on establishing \"economic identity\" for those who are excluded from the global economy. \"Unbanked\" individuals can use a blockchain to establish personal and financial records by connecting to their \"banked\" network (family, friends, small businesses, NGOs). This history of blockchain-based records helps to establish a baseline for future relationships with financial institutions.",
|
|
"Link": [
|
|
"http://www.banquapp.com/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"humanitarian",
|
|
"decentralized-id",
|
|
"banqu",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"BitAlias": {
|
|
"Description": "allows users to register names in the Bitcoin blockchain and point them to their wallets.",
|
|
"Link": [
|
|
"https://bitalias.github.io/"
|
|
],
|
|
"Tags": [
|
|
"bitalias",
|
|
"bitcoin",
|
|
"identification",
|
|
"peacekeeper",
|
|
"app"
|
|
]
|
|
},
|
|
"BitID": {
|
|
"Description": "Depreciated: Original link 'bitid.bitcoin.blue' points to [ledger wallet](https://www.ledger.co/); is a an authentication protocol based on Bitcoin identities, supported by some of the Bitcoin wallets. It authenticates Bitcoin addresses by signing a cryptographic challenge (delivered e.g. via a QR code on a website) using a Bitcoin private key.",
|
|
"Link": [
|
|
"https://github.com/bitid/bitid",
|
|
"http://bitid.bitcoin.blue/"
|
|
],
|
|
"Tags": [
|
|
"bitid",
|
|
"ledger-wallet",
|
|
"depreciated",
|
|
"identification",
|
|
"bitcoin",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Bitnation": {
|
|
"Description": "seeks to establish the concept of \"world citizenship\" through identity registration on the blockchain. The project is collaborating with the Estonian e-Residency program and also has a focus on offering 'blockchain emergency IDs' to refugees.",
|
|
"Link": [
|
|
"https://bitnation.co/",
|
|
"https://refugees.bitnation.co/"
|
|
],
|
|
"Tags": [
|
|
"humanitarian",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"bitcoin",
|
|
"organizations"
|
|
]
|
|
},
|
|
"BlockID": {
|
|
"Description": "by 1Kosmos offers an app that can validate photos of physical ID documents as well as record one's photo, fingerprint, and voice in a \"trusted identity safe\". It can be used to log in to websites and Windows desktop apps. Encrypted identity data is also stored on a blockchain for backup purposes.",
|
|
"Link": [
|
|
"https://onekosmos.com/product-details/"
|
|
],
|
|
"Tags": [
|
|
"1kosmos",
|
|
"blockid",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"Blockcerts": {
|
|
"Description": "is an open standard for issuing and verifying blockchain-based official records, such as cvic records, academic credentials, professional licenses, workforce development, and more. The project offers open-source libraries, tools, and mobile apps. MIT has [started to issue](https://www.insidehighered.com/news/2017/10/19/mit-introduces-digital-diplomas) digital certificates based on this standard.-#peacekeeper",
|
|
"Link": [
|
|
"https://www.blockcerts.org"
|
|
],
|
|
"Tags": [
|
|
"blockcerts",
|
|
"certificates",
|
|
"identification",
|
|
"btc-lyr2",
|
|
"eth-app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Blockchain Helix": {
|
|
"Description": "\"Building a platform that consists of \"Identity as a Service\", \"Data as a Service\" and \"Blockchain as a Service\". On this platform, different parties including individuals can manage and share both self-asserted and verified information. The company offers to increase the speed of KYC/AML processes while hughly decreasing the cost of onboarding.-#peacekeeper\"",
|
|
"Link": [
|
|
"http://blockchain-helix.com",
|
|
"https://ico.helix-orange.com/",
|
|
"https://ico.helix-orange.com/wp-content/uploads/2018/08/HELIX-Orange_Whitepaper_v1.5.pdf"
|
|
],
|
|
"Tags": [
|
|
"peacekeeper",
|
|
"helix",
|
|
"blockchain-id",
|
|
"kyc",
|
|
"platform"
|
|
]
|
|
},
|
|
"Blockchain Identity - peacekeeper": {
|
|
"Description": "Blockchain and Identity Projects companies working on blockchain and identity (pull requests welcome):\n\nShall or should be actively merged with this database.",
|
|
"Link": [
|
|
"https://github.com/peacekeeper/blockchain-identity"
|
|
],
|
|
"Tags": [
|
|
"awesome",
|
|
"blockchain-id",
|
|
"did",
|
|
"resources",
|
|
"self-sovereign",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Blockchain: Evolving Decentralized Identity Design": {
|
|
"Description": "Decentralized identity is evolving into self-sovereign identity networks and verification services. While efforts are underway to establish standards for these ecosystems, technical professionals should identify processes that will be affected and plan for integration scenarios in coming years.",
|
|
"Link": [
|
|
"https://www.gartner.com/doc/3834863/blockchain-evolving-decentralized-identity-design"
|
|
],
|
|
"Tags": [
|
|
"gartner",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"report"
|
|
]
|
|
},
|
|
"Blockchains and Data Protection in the European Union": {
|
|
"Description": "Max Planck Institute for Innovation & Competition Research Paper No. 18-01\n\nThis paper examines data protection on blockchains and other forms of distributed ledger technology (\u2018DLT'). Transactional data stored on a blockchain, whether in plain text, encrypted form or after having undergone a hashing process, constitutes personal data for the purposes of the GDPR. Public keys equally qualify as personal data as a matter of EU data protection law. We examine the consequences flowing from that state of affairs and suggest that in interpreting the GDPR with respect to blockchains, fundamental rights protection and the promotion of innovation, two normative objectives of the European legal order, must be reconciled. This is even more so given that, where designed appropriately, distributed ledgers have the potential to further the GDPR's objective of data sovereignty.",
|
|
"Link": [
|
|
"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3080322"
|
|
],
|
|
"Tags": [
|
|
"gdpr",
|
|
"regulations",
|
|
"research-paper",
|
|
"eu",
|
|
"self-sovereign",
|
|
"max-planck",
|
|
"decentralized-id",
|
|
"privacy"
|
|
]
|
|
},
|
|
"Blockstack": {
|
|
"Description": "a network of computers that collectively maintain a global registry of domain names, public keys, and cryptographic hashes. With this registry, Blockstack serves as a decentralized domain name system (DNS) and a decentralized public key infrastructure (PKI).",
|
|
"Link": [
|
|
"https://blockstack.org/",
|
|
"https://github.com/blockstack",
|
|
"https://forum.blockstack.org/",
|
|
"https://blockstack.org/blog",
|
|
"https://twitter.com/blockstack"
|
|
],
|
|
"Tags": [
|
|
"blockstack",
|
|
"pki",
|
|
"dns",
|
|
"peacekeeper",
|
|
"protocol",
|
|
"organizations"
|
|
]
|
|
},
|
|
"Bloom": {
|
|
"Description": "a blockchain project for credit scoring and identity management that uses Ethereum and IPFS. Users create a \"BloomID\" contract that can be attested for by friends, family, and organizations. The \"BloomIQ\" system then reports and tracks debt obligations, resulting in a \"BloomScore\" as a metric of consumers' creditworthiness.",
|
|
"Link": [
|
|
"https://hellobloom.io",
|
|
"https://bloom.co/whitepaper.pdf"
|
|
],
|
|
"Tags": [
|
|
"peacekeeper",
|
|
"ipfs",
|
|
"blockchain-id",
|
|
"bloomid",
|
|
"ethereum-app"
|
|
]
|
|
},
|
|
"Building Your Business on Sovrin: Domain-Specific Trust Frameworks": {
|
|
"Description": "A domain-specific trust framework is a collection of policies, legal agreements and technologies that provides the context for claims in a given domain. Sovrin Foundation provides a structure and supporting systems for groups defining trust frameworks. This post describes how domain-specific trust frameworks function.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2018/03/building_your_business_on_sovrin_domain-specific_trust_frameworks.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"CREDENTIALS COMMUNITY GROUP": {
|
|
"Description": "The mission of the W3C Credentials Community Group is to explore the creation, storage, presentation, verification, and user control of credentials. We focus on a verifiable credential (a set of claims) created by an issuer about a subject\u2014a person, group, or thing\u2014and seek solutions inclusive of approaches such as: self-sovereign identity; presentation of proofs by the bearer; data minimization; and centralized, federated, and decentralized registry and identity systems. Our tasks include drafting and incubating Internet specifications for further standardization and prototyping and testing reference implementations.\n\nNote: Community Groups are proposed and run by the community. Although W3C hosts these conversations, the groups do not necessarily represent the views of the W3C Membership or staff.",
|
|
"Link": [
|
|
"https://www.w3.org/community/credentials/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"credentials",
|
|
"did",
|
|
"verifiable-claims",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"organizations",
|
|
"documenation"
|
|
]
|
|
},
|
|
"Cambridge Blockchain": {
|
|
"Description": "Identity compliance, simplified\n\nCambridge Blockchain puts control of personal identity data back in the hands of the end user. Our platform allows financial institutions to meet the strictest new data privacy rules, eliminate redundant identity compliance checks and improve the customer experience. #peacekeeper\n\nPK note: Startup Cambridge Blockchain is working on an Identity Blockchain for validating secure digital identity documents, processing electronic signatures, and recording transactions.",
|
|
"Link": [
|
|
"http://cambridge-blockchain.com/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"business",
|
|
"peacekeeper",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"CertCoin: A NameCoin Based Decentralized Authentication System": {
|
|
"Description": "an MIT paper about a NameCoin-based decentralized authentication system which maintains a public ledger of domains and their associated public keys.\n\nAuthentication is vital to all forms of remote communication. A lack of authentication opens the door to man-in-the-middle attacks, which, if performed at a key moment, may subvert the entire interaction. Current approaches to authentication on the internet include certificate authorities and webs of trust. Both of those approaches have significant drawbacks: the former relies upon trusted third parties, introducing a central point of failure, and the latter has a high barrier to entry. We propose Certcoin, an alternative, public and decentralized authentication scheme. The core idea of Certcoin is maintaining a public ledger of domains and their associated public keys. We describe the Certcoin scheme, as well as several optimizations to make Certcoin more accessible to devices with limited storage capacity, such as smartphones. Our optimizations use tools such as cryptographic accumulators and distributed hash tables.",
|
|
"Link": [
|
|
"https://courses.csail.mit.edu/6.857/2014/files/19-fromknecht-velicann-yakoubov-certcoin.pdf"
|
|
],
|
|
"Tags": [
|
|
"gertcoin",
|
|
"namecoin",
|
|
"identification",
|
|
"authentication",
|
|
"mit",
|
|
"peacekeeper",
|
|
"blockchain-id",
|
|
"research-paper",
|
|
"academic"
|
|
]
|
|
},
|
|
"ChainAnchor": {
|
|
"Description": "MIT paper about an architecture that adds an identity and privacy-preserving layer above the blockchain, either the private blockchain or the public blockchain in Bitcoin.\n\nAbstract\u2014In this paper we address the issue of retaining user anonymity within a permissioned blockchain. We present the ChainAnchor architecture that adds an identity and privacy-preserving layer above the blockchain, either the private blockchain or the public Blockchain in Bitcoin. ChainAnchor adds an anonymous identity verification step such that anyone can read and verify transactions from the blockchain but only anonymous verified identities can have transactions processed. We refer to such blockchains as semi-permissioned blockchains. ChainAnchor builds upon and makes use of the zero knowledge proof mechanisms of the EPID scheme, which has the advantage of an optional cryptographic binding to a TPM tamper-resistant hardware. The use of tamper-resistant hardware provides a significant increase in security, not only for identity-related information but also for the protection of keys used by Bitcoin wallet applications.",
|
|
"Link": [
|
|
"http://connection.mit.edu/wp-content/uploads/sites/29/2014/12/Anonymous-Identities-for-Permissioned-Blockchains2.pdf"
|
|
],
|
|
"Tags": [
|
|
"chainanchor",
|
|
"layer2",
|
|
"identification",
|
|
"blockchain-id",
|
|
"zkp",
|
|
"peacekeeper",
|
|
"research-paper",
|
|
"academic"
|
|
]
|
|
},
|
|
"CheapID": {
|
|
"Description": "a digital identity standard designed for use in conflicted environment like those many refugees or disaster victims may find themselves in.",
|
|
"Link": [
|
|
"http://guptaoption.com/cheapid/"
|
|
],
|
|
"Tags": [
|
|
"digital-id",
|
|
"cheapid",
|
|
"peacekeeper",
|
|
"app"
|
|
]
|
|
},
|
|
"Christopher Allen": {
|
|
"Description": "Blockchain & Decentralized Identity Architect\u2014Internet Cryptography Pioneer\u2014Co-author TLS Security Standard\u2014Collaborative Tools & Patterns",
|
|
"Link": [
|
|
"https://twitter.com/ChristopherA",
|
|
"http://www.lifewithalacrity.com/",
|
|
"https://github.com/ChristopherA"
|
|
],
|
|
"Tags": [
|
|
"twitter",
|
|
"people",
|
|
"christophera",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"blockstream",
|
|
"iiw",
|
|
"id2020"
|
|
]
|
|
},
|
|
"Cicada": {
|
|
"Description": "is a Dapp platform built initally for a \"direct democracy\" use case. It envisions using iris scans to generate decentralized universal identifiers (\"HUIDs\") for every human on the planet, a method referred to as \"biocryptics\". \"HUIDs\" can have \"sub-IDs\" to support selective disclosure. PII can be stored in an \"info wallet\". Key parts of the system also include smart contracts, zero-knowledge proofs, mixnets, and more.",
|
|
"Link": [
|
|
"https://github.com/the-laughing-monkey/cicada-platform"
|
|
],
|
|
"Tags": [
|
|
"huid",
|
|
"cicada",
|
|
"dpow",
|
|
"direct-democracy",
|
|
"zkp",
|
|
"self-sovereign",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Civic": {
|
|
"Description": "Civic enables people to take control and protect their identity:\n\nSECURE ID PLATFORM ; REUSABLE KYC ; ID THEFT PROTECTION\n\n\"is a secure identity platform using a blockchain and biometrics on mobile devices, in order to provide multi-factor authentication without a username, password, third party authenticator, or physical hardware token.\"#peacekeeper",
|
|
"Link": [
|
|
"https://www.civic.com/"
|
|
],
|
|
"Tags": [
|
|
"civic",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"organizations",
|
|
"peacekeeper",
|
|
"kyc",
|
|
"enterprise"
|
|
]
|
|
},
|
|
"Coherence and Decentralized Systems": {
|
|
"Description": "Building decentralized systems requires more than defining a few specifications and hoping for the best. In order to thrive, decentralized systems need coherence, the social organization necessary to get otherwise independent actors to cooperate.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2018/04/coherence_and_decentralized_systems.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"Concepts and Features of Privacy-Preserving Attribute-Based Credentials": {
|
|
"Description": "The figure below gives an overview of the entities involved in Privacy-ABC systems and the interactions between them. These entities are users, issuers, verifiers, inspectors and revocation authorities.",
|
|
"Link": [
|
|
"https://github.com/p2abcengine/p2abcengine/wiki/Concepts-and-features",
|
|
"https://camo.githubusercontent.com/284d8e3e1fa7a0079847800271779e82bab4a4b2/68747470733a2f2f7261772e6769746875622e636f6d2f7032616263656e67696e652f7032616263656e67696e652f6d61737465722f446f63756d656e746174696f6e2f466967757265732f456e7469746965732d332e6a7067"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"history",
|
|
"privacy",
|
|
"credentials",
|
|
"decentralized-id",
|
|
"protocol",
|
|
"documentation",
|
|
"idemix",
|
|
"indy"
|
|
]
|
|
},
|
|
"Consent": {
|
|
"Description": "is building a platform for trusted personal data applications and services, using Ethereum smart contracts to implement decentralized identifiers, verified credentials, consent receipts, a web of trust, and exchange of assets and value. by #mydata",
|
|
"Link": [
|
|
"http://www.consent.global/"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"mydata",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"eth-app",
|
|
"consent-global",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Creating the New World of Trust": {
|
|
"Description": "On November 3rd and 4th, the Rebuilding the Web of Trust design workshop looked at the future of decentralized trust on the internet with the goal of producing 3-5 white papers and specs. Those papers were polished for release in December, leaving the question: what's next?",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/whats-the-next-step.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/whats-the-next-step.docx"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id",
|
|
"weboftrust",
|
|
"history"
|
|
]
|
|
},
|
|
"DEVCON1: Digital Identity": {
|
|
"Description": "on blockchain, digital identity, and public key infrastructure",
|
|
"Link": [
|
|
"https://www.youtube.com/watch?v=QpaTOvAhLR4"
|
|
],
|
|
"Tags": [
|
|
"devcon1",
|
|
"devcon",
|
|
"digital-id",
|
|
"pki",
|
|
"peacekeeper",
|
|
"video"
|
|
]
|
|
},
|
|
"DID Primer": {
|
|
"Description": "At a superficial level, a decentralized identifier (DID) is simply a new type of globally unique identifier with special features designed for blockchains. But at a deeper level, DIDs are actually the tip of the iceberg -- or the tip of the spear -- of an entirely new layer of decentralized digital identity and public key infrastructure (PKI) for the Internet. This decentralized public key infrastructure (DPKI) could have as much impact on global cybersecurity and cyberprivacy as the development of the SSL/TLS protocol for encrypted Web traffic (now the largest PKI in the world).",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/draft-documents/did-primer.md"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"w3c",
|
|
"rwot",
|
|
"documentation"
|
|
]
|
|
},
|
|
"DID auth and the Little I-am-Me": {
|
|
"Description": "DID Auth and the little I-am-me\n\nWe recently published a report on \"DID Auth\" (PDF, MD), which summarizes ideas and possible architectures that allow you to prove that you control a certain Decentralized Identifier (DID). This report originated at the sixth Rebooting-the-Web-of-Trust workshop and is the result of a collaborative effort by several authors and contributors. There is also a webinar.",
|
|
"Link": [
|
|
"https://medium.com/@markus.sabadello/did-auth-and-the-little-i-am-me-ec14d757ff09"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"w3c",
|
|
"sovrin",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"blog",
|
|
"peacekeeper",
|
|
"authentication"
|
|
]
|
|
},
|
|
"DIGITAL IDENTITY AS A BASIC HUMAN RIGHT": {
|
|
"Description": "In a world where 15 percent of the world population, or 1.1 billion people, still lack a valid form of identification, it is critical that we start leveraging digital technologies to provide a solution. What is needed is a digital identity. Innovation on identity is one of the most promising trends in blockchain technology, mostly in terms of how a global digital ID can enable us to strengthen democracies through global digital voting.",
|
|
"Link": [
|
|
"https://impakter.com/digital-identity-basic-human-right/"
|
|
],
|
|
"Tags": [
|
|
"digital-id",
|
|
"self-sovereign",
|
|
"wef",
|
|
"decentralized-id",
|
|
"blog"
|
|
]
|
|
},
|
|
"Danube Tech": {
|
|
"Description": "DANUBE TECH is a company working on technologies in the field of digital identity and personal data, including personal agents, semantic graphs, and blockchain identity.\n\nThese emerging tools essentially place individuals at the center of their online relationships and transactions, and give us all the ability to create, manage, use, and destroy our online identities according to our own rules, and without delegating power to intermediaries.\n\ncollaborating with several other efforts to build blockchain-based identifier registration, data sharing, and messaging infrastructure.\" \u2014#peacekeeper",
|
|
"Link": [
|
|
"http://danubetech.com/"
|
|
],
|
|
"Tags": [
|
|
"identification",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"danube",
|
|
"organizations",
|
|
"decentralized-id",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"Datum": {
|
|
"Description": "network allows anyone to store structured data on a smart contract blockchain. Data can optionally be bought and sold on a marketplace using the DAT token. Datum leverages BigchainDB and IPFS as data storage backends. All data is encrypted and protected using AES256-GCM. -#peacekeeper",
|
|
"Link": [
|
|
"https://datum.org",
|
|
"https://datum.org/assets/Datum-WhitePaper.pdf"
|
|
],
|
|
"Tags": [
|
|
"datum",
|
|
"peacekeeper",
|
|
"data-marketplace",
|
|
"blockchain-id",
|
|
"ipfs"
|
|
]
|
|
},
|
|
"Decentralization and Distributed Ledgers": {
|
|
"Description": "Some claim that decentralized system that have to be governed aren't really decentralized. This article explains why that thinking is misguided.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2016/08/decentralization_and_distributed_ledgers.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"Decentralization in Sovrin": {
|
|
"Description": "Decentralized architectures require that care is taken in each component or layer to ensure that the resulting system will not contain hidden weaknesses. That doesn't just apply to the system itself, but also to the ways it is governed. And all decentralized systems are governed. The governing might be ad hoc or hidden, but it's there.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2018/10/decentralization_in_sovrin.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"Decentralized Governance in Sovrin": {
|
|
"Description": "Decentralized systems require governance to function well. Ideally this governance should be clear, open, and effective without impacting the decentralized nature of the system. This post describes the governance of the Sovrin network. Our approach is a constitutional model based on an agreement we call the Sovrin Trust Framework that informs and guides everything from code development to the responsibilities of the various actors in the system. The Sovrin Trust Framework enables decentralized governance of the Sovrin network.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2018/02/decentralized_governance_in_sovrin.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"Decentralized IDentifers (DIDs)": {
|
|
"Description": "Intro: Self-Sovereign Identity \u2014Presentation from the WC3 Workshop",
|
|
"Link": [
|
|
"https://www.w3.org/2018/vocabws/presentations/Sabadello.pdf",
|
|
"https://i.imgur.com/7NRcJbq.png",
|
|
"https://i.imgur.com/vHQoZBH.png"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"did",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"presentation",
|
|
"image"
|
|
]
|
|
},
|
|
"Identity Foudation": {
|
|
"Description": "Join us in building an open source decentralized identity ecosystem for people, organizations, apps, and devices.\n\nTHE PILLARS OF A NEW ECOSYSTEM\nDECENTRALIZED IDENTITIES\n\nanchored by: BLOCKCHAIN IDs\nlinked to ZERO-TRUST DATA STORES\nthat are UNIVERSALLY DISCOVERABLE",
|
|
"Link": [
|
|
"http://identity.foundation/"
|
|
],
|
|
"Tags": [
|
|
"organizations",
|
|
"decentralized-id",
|
|
"microsoft",
|
|
"uport",
|
|
"ibm",
|
|
"sovrin",
|
|
"securekey",
|
|
"tierion",
|
|
"gem",
|
|
"blockstack",
|
|
"evernym",
|
|
"hyperledger",
|
|
"civic",
|
|
"accenture",
|
|
"danube",
|
|
"netki",
|
|
"rsa",
|
|
"consent",
|
|
"iota",
|
|
"muti",
|
|
"aetna",
|
|
"r3",
|
|
"aunthenteq",
|
|
"blockchain-foundry",
|
|
"validatedid",
|
|
"1kosmos",
|
|
"gamecredits",
|
|
"auth0",
|
|
"onfido",
|
|
"jolocom",
|
|
"dominode",
|
|
"enigma",
|
|
"humanized-internet",
|
|
"pillar",
|
|
"meeco",
|
|
"veridiumid",
|
|
"id2020",
|
|
"nuggets",
|
|
"diid",
|
|
"meta",
|
|
"kyc-chain",
|
|
"blockpass",
|
|
"ockam",
|
|
"nuid",
|
|
"bayonet",
|
|
"equinix",
|
|
"kyc"
|
|
]
|
|
},
|
|
"Decentralized Identity Foundation Grows To 56 Members In Our First Year": {
|
|
"Description": "Today marks the Decentralized Identity Foundation's first anniversary. Over the past year, DIF has grown from a handful of founding organizations to 56 members. Together, we're working to shape the future of decentralized identity technology and standards.",
|
|
"Link": [
|
|
"https://medium.com/decentralized-identity/decentralized-identity-foundation-grows-to-56-members-in-our-first-year-3ec117e811d8"
|
|
],
|
|
"Tags": [
|
|
"organizations",
|
|
"decentralized-id",
|
|
"microsoft",
|
|
"uport",
|
|
"ibm",
|
|
"sovrin",
|
|
"tierion",
|
|
"gem",
|
|
"blockstack",
|
|
"evernym",
|
|
"hyperledger",
|
|
"civic",
|
|
"accenture",
|
|
"danube",
|
|
"netki",
|
|
"rsa",
|
|
"consent",
|
|
"iota",
|
|
"muti",
|
|
"aetna",
|
|
"r3",
|
|
"aunthenteq",
|
|
"blockchain-foundry",
|
|
"validatedid",
|
|
"1kosmos",
|
|
"gamecredits",
|
|
"auth0",
|
|
"onfido",
|
|
"jolocom",
|
|
"dominode",
|
|
"enigma",
|
|
"humanized-internet",
|
|
"pillar",
|
|
"meeco",
|
|
"veridiumid",
|
|
"id2020",
|
|
"nuggets",
|
|
"diid",
|
|
"meta",
|
|
"kyc-chain",
|
|
"blockpass",
|
|
"ockam",
|
|
"nuid",
|
|
"bayonet",
|
|
"equinix",
|
|
"kyc"
|
|
]
|
|
},
|
|
"Decentralized Public Key Infrastructure": {
|
|
"Description": "Today's Internet places control of online identities into the hands of third-parties. Email addresses, usernames, and website domains are borrowed or \"rented\" through DNS, X.509, and social networks. This results in severe usability and security challenges Internet-wide. This paper describes a possible alternate approach called decentralized public key infrastructure (DPKI), which returns control of online identities to the entities they belong to. By doing so, DPKI addresses many usability and security challenges that plague traditional public key infrastructure (PKI). DPKI has advantages at each stage of the PKI life cycle. It makes permissionless bootstrapping of online identities possible and provides for the simple creation of stronger SSL certificates. In usage, it can help \"Johnny\" to finally encrypt thanks to its relegation of public key management to secure decentralized datastores. Finally, it includes mechanisms to recover lost or compromised identifiers.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/dpki.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/dpki.docx"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"rwot",
|
|
"whitepaper",
|
|
"dpki",
|
|
"pki"
|
|
]
|
|
},
|
|
"Decentralizing Privacy: Using Blockchain to Protect Personal Data": {
|
|
"Description": "Abstract\u2014The recent increase in reported incidents of surveillance and security breaches compromising users' privacy call into question the current model, in which third-parties collect and control massive amounts of personal data. Bitcoin has demonstrated in the financial space that trusted, auditable computing is possible using a decentralized network of peers accompanied by a public ledger. In this paper, we describe a decentralized personal data management system that ensures users own and control their data. We implement a protocol that turns a blockchain into an automated access-control manager that does not require trust in a third party. Unlike Bitcoin, transactions in our system are not strictly financial \u2013 they are used to carry instructions, such as storing, querying and sharing data. Finally, we discuss possible future extensions to blockchains that could harness them into a well-rounded solution for trusted computing problems in society",
|
|
"Link": [
|
|
"http://web.media.mit.edu/~guyzys/data/ZNP15.pdf"
|
|
],
|
|
"Tags": [
|
|
"research-paper",
|
|
"mit",
|
|
"privacy",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"research"
|
|
]
|
|
},
|
|
"Deloitte SmartID": {
|
|
"Description": "Smart ID makes it easier for customers to manage their identity information by reducing the number of places they need to maintain it, and simplifying the process of sharing it with others.\n\nuses Ethereum smart contracts to store, endorse, share, and revoke attributes, in order to enable users to automate digital processes such as customer registration and commercial KYC checks.\"\u2014#peacekeeper",
|
|
"Link": [
|
|
"http://www.deloitte.co.uk/smartid/"
|
|
],
|
|
"Tags": [
|
|
"deloitte",
|
|
"smartid",
|
|
"ethereum",
|
|
"peacekeeper",
|
|
"kyc",
|
|
"app"
|
|
]
|
|
},
|
|
"Democracy Earth Foundation": {
|
|
"Description": "is developing \"Sovereign\", a blockchain direct democracy tool using \"vote\" tokens to grant democratic participation rights to every human. A proof-of-individuality (POI) process based on peer-to-peer validation establishes that a self-sovereign identity is uniquely tied to a single person. The project introduces a number of interesting socio-technical concepts such as \"Social Smart Contract\", \"Initial Rights Offering\", and \"Cryptographically Induced Equality\". Cooperation is happening with other decentralized identity initiatives such as Blockstack and uPort.",
|
|
"Link": [
|
|
"http://democracy.earth/",
|
|
"http://sovereign.software/"
|
|
],
|
|
"Tags": [
|
|
"poi",
|
|
"self-sovereign",
|
|
"organizations",
|
|
"democracy-earth",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Deployment of a Blockchain-Based Self-Sovereign Identity - Delft": {
|
|
"Description": "Abstract\u2014Digital identity is unsolved: after many years of research there is still no trusted communication over the Internet. To provide identity within the context of mutual distrust, this paper presents a blockchain-based digital identity solution. Without depending upon a single trusted third party, the proposed solution achieves passport-level legally valid identity. This solution for making identities Self-Sovereign, builds on a generic provable claim model for which attestations of truth from third parties need to be collected. The claim model is then shown to be both blockchain structure and proof method agnostic. Four different implementations in support of these two claim model properties are shown to offer sub-second performance for claim creation and claim verification. Through the properties of Self-Sovereign Identity, legally valid status and acceptable performance, our solution is considered to be fit for adoption by the general public.",
|
|
"Link": [
|
|
"https://arxiv.org/pdf/1806.01926.pdf",
|
|
"http://msn.iecs.fcu.edu.tw/report/download.php?id=287"
|
|
],
|
|
"Tags": [
|
|
"self-soveriegn",
|
|
"decentralized-id",
|
|
"tu-delft",
|
|
"netherlands",
|
|
"research-paper",
|
|
"blockchain-id",
|
|
"trustchain"
|
|
]
|
|
},
|
|
"Design Challenge: Avoid Centralization and Singletons": {
|
|
"Description": "SecureScuttlebutt goes out of it's way to avoid both centralization and singletons.\n\nAvoiding Centralization\nThe danger of centralization is obvious: it creates a single point of failure that can easily be attacked, or act as an attacker. And, it creates a monoculture of information, as the central point starts to control what information is trusted, or ranked highly.",
|
|
"Link": [
|
|
"https://scuttlebot.io/more/articles/design-challenge-avoid-centralization-and-singletons.html"
|
|
],
|
|
"Tags": [
|
|
"singletons",
|
|
"decentralization",
|
|
"scuttlebot",
|
|
"peacekeeper",
|
|
"blog"
|
|
]
|
|
},
|
|
"Design Considerations for Decentralized Reputation Systems": {
|
|
"Description": "Reputation systems provide an effective way to build a web of trust on the Internet. They consider the history of interactions between peers to establish a measure for a reputation that can itself be used to support a trust decision. Decentralised reputations systems (DRS) rely on a decentralised computer architecture and a distributed ledger to store and maintain reputation information, so that no single entity has control over that information.\n\nWhile there have been numerous analyses of how reputation may be used, there has to date been no systematic definition of the various aspects that should be considered when a reputation system is being designed. By defining these design considerations, we can come to a consensus about what is and is not important in a system. We can discuss the different ways in which they can be built and we can conduct further research and analysis into specific factors in a structured way.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2017/blob/master/final-documents/reputation-design.md"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"rwot",
|
|
"whitepaper",
|
|
"reputation"
|
|
]
|
|
},
|
|
"Different Approaches to Ethereum Identity Standards": {
|
|
"Description": "Identity as a concept affects all of us. Yet, depending on who you ask, there are many different ideas of what Identity is as a technology.",
|
|
"Link": [
|
|
"https://medium.com/uport/different-approaches-to-ethereum-identity-standards-a09488347c87"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"did",
|
|
"erc",
|
|
"ethereum",
|
|
"erc-725",
|
|
"uport",
|
|
"blog"
|
|
]
|
|
},
|
|
"Digital Identity Management in the Context of GDPR & Sovrin \u2014Why Data Privacy Matters & How to Protect It": {
|
|
"Description": "In the developed world, the battle for privacy is arguably one of the most important ones to overcome within our lifetime. Our personal and (ought-to-be) private information is being collected en masse by companies large and small, sold for a handsome profit, and subsequently used to feed the \"big data machine\", where all these data points are correlated and further used to generate leads for third parties.",
|
|
"Link": [
|
|
"https://blog.tykn.tech/digital-identity-management-in-the-context-of-gdpr-sovrin-43028247378b"
|
|
],
|
|
"Tags": [
|
|
"tykn",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"gdpr",
|
|
"regulations",
|
|
"self-sovereign",
|
|
"blog"
|
|
]
|
|
},
|
|
"Digital Identity: the current state of affairs": {
|
|
"Description": "In a world where the rise in the use of the Internet is increasing exponentially, the ability to prove your identity is crucial for the economic, financial and social development. Individuals and companies need identity solutions valid across different services, markets, standards and technologies. New technologies like blockchain, biometrics and AI can help to deliver secure identity services, in particular by governments and financial institutions, and solutions should meet both the objectives of ensuring secure identity and improving user experience. As public identities have been created by different authorities, and since a global public or private identity is not a realistic option in the short term, interoperability and the collaboration between different entities to offer complete solutions is decisive. In the long run, to become a trusted identity provider across different industries could represent a big business opportunity for financial institutions.",
|
|
"Link": [
|
|
"https://www.bbvaresearch.com/wp-content/uploads/2018/02/Digital-Identity_the-current-state-of-affairs.pdf"
|
|
],
|
|
"Tags": [
|
|
"bbva",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"enterprise",
|
|
"blog"
|
|
]
|
|
},
|
|
"Digital Verification Advancements at RWoT III": {
|
|
"Description": "There were a number of enhancements made to Digital Verification at the 3rd Rebooting Web of Trust event. The following document summarises the advancements made as a direct result of participation from the workshop attendees.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/digital-verification-advancements.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/digital-verification-advancements.docx"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"w3c",
|
|
"identification",
|
|
"whitepaper",
|
|
"did"
|
|
]
|
|
},
|
|
"Dominode": {
|
|
"Description": "is building a self-sovereign identity solution based on IPFS and public blockchains that focuses on identity for professionals in regulated industries. Identity data can be verified to be true and is fully portable.",
|
|
"Link": [
|
|
"https://dominode.com/"
|
|
],
|
|
"Tags": [
|
|
"ipfs",
|
|
"self-sovereign",
|
|
"blockahin-id",
|
|
"dominode",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"ENS": {
|
|
"Description": "is the \"Ethereal Namespace\", a contract system and set of conventions to form a hierarchical namespace.",
|
|
"Link": [
|
|
"https://github.com/nexusdev/ENS"
|
|
],
|
|
"Tags": [
|
|
"identification",
|
|
"namespace",
|
|
"ethereum",
|
|
"ens",
|
|
"peacekeeper",
|
|
"protocol"
|
|
]
|
|
},
|
|
"ERC725 and ERC735": {
|
|
"Description": "are proposals in the Ethereum community to standardize the use of smart contracts for certain identity-related operations such as key management, as well as signing transactions, documents, and \"claims\", which may be attested by third parties or self-asserted.",
|
|
"Link": [
|
|
"https://github.com/ethereum/EIPs/issues/725",
|
|
"https://github.com/ethereum/EIPs/issues/735"
|
|
],
|
|
"Tags": [
|
|
"erc725",
|
|
"erc735",
|
|
"blockchain-id",
|
|
"ethereum",
|
|
"erc",
|
|
"identification",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Embedding Human Wisdom in Our Digital Tomorrow": {
|
|
"Description": "There were a number of enhancements made to Digital Verification at the 3rd Rebooting Web of Trust event. The following document summarises the advancements made as a direct result of participation from the workshop attendees.\n\nFounding of the W3C Digital Verification Community Group\nBased on various hallway and lunch discussions, it became evident that the community wanted a more permanent location to store artifacts and work on them. As a result of these discussions, the W3C Digital Verification Community Group was proposed, supported, and formed.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/joram-engagement-model.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/digital-verification-advancements.docx"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Estonia National Blockchain-ID": {
|
|
"Description": "Estonia had the most highly developed national ID system in existence. They issue an ID card that has a chip using 2048-bit public key encryption and can be used as an electronic proof of id. Estonia is one of the most progressive governments as far as integrating blockchain into public services. Unfortunately, a flaw in their chips made it easy to find a users private key through their public key. So their certificates have been revoked, and are currently useless as digital signatures.",
|
|
"Link": [
|
|
"https://e-estonia.com/solutions/e-identity/id-card/",
|
|
"https://www.id.ee/",
|
|
"https://www.mccarthy.ca/en/insights/blogs/cyberlex/estonian-blockchain-based-id-card-security-flaw-raises-issues-about-identity"
|
|
],
|
|
"Tags": [
|
|
"identit-ee",
|
|
"estonia",
|
|
"blockchain-id",
|
|
"id-ee",
|
|
"state",
|
|
"app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"EtherID": {
|
|
"Description": "allows registration of domain names for an Ethereum account.",
|
|
"Link": [
|
|
"http://etherid.org/"
|
|
],
|
|
"Tags": [
|
|
"identification",
|
|
"dns",
|
|
"ethereum",
|
|
"peacekeeper",
|
|
"app"
|
|
]
|
|
},
|
|
"Ethereum ERC725 Blockchain Based, Self-Sovereign Identity Management": {
|
|
"Description": "What on Earth is ERC725? The Answer to the Question of Self-Sovereign Identity Management on Blockchain\n\nThe one response that dApps, and the blockchain world for that matter, can give to the world of centralized third parties is one ad-libbed from Vladamir Lenin, which is that Decentralized Apps and blockchain will soon \u2018shuffle their cards and spoil their game'.\n\nBut while there's a lot to keep dApp and blockchain enthusiasts excited, one area remains a challenge, and that's user identity management, and it's a critical area that dApps need to wrestle away from third parties. Luckily, it's a job that ERC725 feels up to the task of completing.",
|
|
"Link": [
|
|
"https://bitcoinexchangeguide.com/ethereum-erc725-blockchain-based-self-sovereign-identity-management/"
|
|
],
|
|
"Tags": [
|
|
"erc",
|
|
"erc-725",
|
|
"ethereum",
|
|
"origin",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"blog"
|
|
]
|
|
},
|
|
"Ethereum Name Service": {
|
|
"Description": "a naming system based on Ethereum smart contracts that provides registration of human-readable names, as well as resolution to service and resource identifiers. A name is registered by using an Ethereum dapp to enter an auction process for the desired name.",
|
|
"Link": [
|
|
"https://ens.domains/"
|
|
],
|
|
"Tags": [
|
|
"ethereum",
|
|
"ens",
|
|
"namespace",
|
|
"peacekeeper",
|
|
"protocol",
|
|
"identification"
|
|
]
|
|
},
|
|
"Evernym": {
|
|
"Description": "Self-sovereign identity: now that it's possible, it's inevitable. Humanity deserves digital identity that is permanent, portable, private and completely secure; in other words: self-sovereign. Shortcomings in the internet's original design made this impossible, at a cost of trillions each year. Today, the invention of distributed ledger technology makes self-sovereign digital identity a possibility for the first time. Now that self-sovereign identity is possible, it's inevitable. And it's going to change everything.",
|
|
"Link": [
|
|
"https://www.evernym.com/"
|
|
],
|
|
"Tags": [
|
|
"evernym",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"organizations",
|
|
"business",
|
|
"protocol"
|
|
]
|
|
},
|
|
"Experts talk Self-Sovereign Identity": {
|
|
"Description": "Identity is one use case of the blockchain that has many people excited. For the first time, an individual has the potential to create a true, immutable identity distributed across an entire network.\n\nAs Consensus 2016 wrapped up earlier this week, a group of thought-leaders who have been working in the identity space for decades presented their beliefs on what to consider when building an identity system using blockchain.\n\nChristopher Allen, the principal architect at bitcoin sidechain firm Blockstream, echoed the sentiment of other panelists about the duality of identity on the blockchain.",
|
|
"Link": [
|
|
"https://www.coindesk.com/experts-talk-self-sovereign-identity-implementing-systems/"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"christophera",
|
|
"history",
|
|
"consensus-conf",
|
|
"2016",
|
|
"blog"
|
|
]
|
|
},
|
|
"Federal Funding for Blockchain Security and Identity Verification Technologies": {
|
|
"Description": "The U.S. Department of Homeland Security is funding research on the \"Applicability of Blockchain Technology to Privacy Respecting Identity Management\"",
|
|
"Link": [
|
|
"https://blog.aniljohn.com/2015/12/federal-gov-funds-for-identity-r-and-d.html"
|
|
],
|
|
"Tags": [
|
|
"USDHS",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"blog"
|
|
]
|
|
},
|
|
"GDPR - A reflection on the 'self-sovereign identity' and the Blockchain": {
|
|
"Description": "I have this notion of \"self-sovereign identity\" coming forward. A notion which was developed by Christopher Allen in his influential 2016 essay \"The path to self-sovereign identity\". In his essay, Christopher Allen defined self-sovereign identity as a decentralized identity where the user is not only central to the administration of his identity, but also has autonomy over his own identity. Allen sees self-sovereign identity as a \"lifetime portable digital identity for any person, organization, or thing that does not depend on any centralized authority and can never be taken away\". It means that the identity is not controlled by any centralized authority that offers it as an authentication mechanism, and is truly owned, controlled and managed by a unique individual.",
|
|
"Link": [
|
|
"https://www.linkedin.com/pulse/gdpr-reflection-self-sovereign-identity-blockchain-nicolas-ameye/"
|
|
],
|
|
"Tags": [
|
|
"gdpr",
|
|
"regulations",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"blog"
|
|
]
|
|
},
|
|
"GDPR and Privacy by Design, What developers need to know": {
|
|
"Description": "Privacy by Design means that organisations need to consider privacy from the first design stages and throughout the complete development process of any new products, processes or services that involve processing personal data. This means that it is no longer just about data protection but rather about designing and building systems so data is inherently protected.",
|
|
"Link": [
|
|
"https://medium.com/@sphereidentity/gdpr-and-privacy-by-design-what-developers-need-to-know-fa5a936da65a",
|
|
"https://www.ipc.on.ca/wp-content/uploads/Resources/7foundationalprinciples.pdf"
|
|
],
|
|
"Tags": [
|
|
"gdpr",
|
|
"regulations",
|
|
"developing",
|
|
"blockchain-id",
|
|
"sphere-identity"
|
|
]
|
|
},
|
|
"Getting Started with Sovrin": {
|
|
"Description": "A Developer Guide by Sovrin Foundation. A technical orientation guide using the Sovrin Command Line Interface.",
|
|
"Link": [
|
|
"https://sovrin.org/library/getting-started-with-sovrin/"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"Global Blockchain Identity Management Market 2018-2022": {
|
|
"Description": "Technavio's latest market research report on the global blockchain identity management market is supporting clients by providing them with detailed insights into the rapidly changing market scenario and vendor landscape. This study on the global blockchain identity management market is expected to help businesses achieve a competitive edge and market dominance across the globe.The global blockchain identity management market size will grow by more than USD 1 billion by 2022. This report provides an analysis of the blockchain identity management market share by application (end-point, network, and infrastructure), end-user (government, BFSI, healthcare, and others), and geography (the Americas, APAC, and EMEA). The report also provides an analysis of the market's competitive landscape and offers information on several companies including Amazon.com, Civic Technologies, IBM, ShoCard, and SecureKey Technologies.",
|
|
"Link": [
|
|
"https://www.technavio.com/report/global-blockchain-identity-management-market-analysis-share-2018"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"report",
|
|
"enterprise"
|
|
]
|
|
},
|
|
"How Blockchain Revolutionizes Identity Management": {
|
|
"Description": "As we generate more data, our identities become more complicated. Traditional identity management systems simply can't keep up with our evolving needs. Blockchain provides a decentralized, secure solution that fosters innovation and puts users back in control.",
|
|
"Link": [
|
|
"https://www.accenture-insights.nl/en-us/articles/how-blockchain-will-revolutionize-identity-management"
|
|
],
|
|
"Tags": [
|
|
"accenture",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"enterprise",
|
|
"blog"
|
|
]
|
|
},
|
|
"How Sovrin Works\u2014A Technical Guide from the Sovrin Foundation": {
|
|
"Description": "Sovrin is an open-source identity network built on distributed ledger technology. Sovrin is public and permissioned. Public means everyone can use it. Permissioned means that the network nodes that ensure consensus of transactions on the ledger are governed, in this case by the non-profit Sovrin Foundation",
|
|
"Link": [
|
|
"https://sovrin.org/wp-content/uploads/2018/03/How-Sovrin-Works.pdf",
|
|
"https://www.evernym.com/wp-content/uploads/2017/07/How-Sovrin-Works.pdf"
|
|
],
|
|
"Tags": [
|
|
"evernym",
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"self-sovereign",
|
|
"whitepaper"
|
|
]
|
|
},
|
|
"How do we start tackling the existing identity problem?": {
|
|
"Description": "Identity and control of personal identity is top of mind, given recent events as well as the European Union's General Data Protection Regulation (GDPR). A lot of our identity is shared without our explicit consent, gets stored in locations we are unaware of, and when compromised creates tremendous setbacks. Almost everything we do in the digital world is user name and password driven. With decentralized identity, you reduce risk by associating credentials typically used for in-person interactions, as instruments for virtual interactions where it is difficult to verify who or what is on the other side of the screen.",
|
|
"Link": [
|
|
"https://www.ibm.com/blogs/blockchain/2018/06/how-do-we-start-tackling-the-existing-identity-problem/"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"ibm",
|
|
"sovrin",
|
|
"securekey",
|
|
"did",
|
|
"indy",
|
|
"enterprise",
|
|
"blockchain-id",
|
|
"blog"
|
|
]
|
|
},
|
|
"Hubs": {
|
|
"Description": "Hubs let you securely store and share data. A Hub is a datastore containing semantic data objects at well-known locations. Each object in a Hub is signed by an identity and accessible via a globally recognized API format that explicitly maps to semantic data objects. Hubs are addressable via unique identifiers maintained in a global namespace.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/hubs.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/hubs.docx"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"whitepaper",
|
|
"data-stores",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Hyperledger Indy - Distributed ledger and utility library": {
|
|
"Description": "Hyperledger Indy is a distributed ledger, purpose-built for decentralized identity. It provides tools, libraries, and reusable components for creating and using independent digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other \"silo.\"",
|
|
"Link": [
|
|
"https://www.hyperledger.org/projects/hyperledger-indy",
|
|
"https://wiki.hyperledger.org/projects/indy/documentation"
|
|
],
|
|
"Tags": [
|
|
"evernym",
|
|
"tykn",
|
|
"hyperledger",
|
|
"indy",
|
|
"sovrin",
|
|
"blockchain-id",
|
|
"did",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"protocol",
|
|
"wiki"
|
|
]
|
|
},
|
|
"Hyperledger Welcomes Project Indy": {
|
|
"Description": "We're excited to announce Indy, a new Hyperledger project for supporting independent identity on distributed ledgers. Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo.",
|
|
"Link": [
|
|
"https://www.hyperledger.org/blog/2017/05/02/hyperledger-welcomes-project-indy"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"hyperledger",
|
|
"indy",
|
|
"blog",
|
|
"history"
|
|
]
|
|
},
|
|
"I/O Digital Foundation": {
|
|
"Description": "offers a Proof-of-Stake blockchain called Decentralised Input Output Name Server (DIONS). It will enable applications such as identity and alias registration, storage of legal documents, key exchange, and encrypted messaging.",
|
|
"Link": [
|
|
"https://iodigital.io/",
|
|
"https://simplebooklet.com/iocoinwhitepaper#page=0"
|
|
],
|
|
"Tags": [
|
|
"name-serv",
|
|
"iodigital",
|
|
"pos",
|
|
"dions",
|
|
"blockchain-id",
|
|
"identification",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"IBM Identity Mixer": {
|
|
"Description": "\"Indy uses a Zero Knowledge Proof architecture based on IDEMix architecture from Jan Camenisch at IBM Research. \u201cThis paper describes the Identity Mixer anonymous credential system that integrates cryptographic techniques from many sources to build an anonymous credential system with a rich feature set.\u201d They are used to prove the possession of Camenisch-Lysyanskaya credentials. We also use zero-knowledge proofs in the revocation protocol, which is based on cryptographic accumulators.\"\n\nIBM Identity Mixer is a cryptographic protocol suite for privacy-preserving authentication and transfer of certified attributes.",
|
|
"Link": [
|
|
"https://www.zurich.ibm.com/identity_mixer/",
|
|
"https://domino.research.ibm.com/library/cyberdig.nsf/papers/EEB54FF3B91C1D648525759B004FBBB1/$File/rz3730_revised.pdf",
|
|
"https://i.imgur.com/vfdourQ.jpg"
|
|
],
|
|
"Tags": [
|
|
"camenisch",
|
|
"camenisch-lysyanskaya",
|
|
"privacy",
|
|
"research-paper",
|
|
"sovrin",
|
|
"indy",
|
|
"ibm",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"protocol",
|
|
"idemix",
|
|
"cryptographic-accumulators"
|
|
]
|
|
},
|
|
"IBM \u2014 How blockchain could address five areas associated with GDPR compliance": {
|
|
"Description": "Using real-world examples, this paper explores five areas associated with GDPR compliance and how blockchain might address each.",
|
|
"Link": [
|
|
"https://www-01.ibm.com/common/ssi/cgi-bin/ssialias?htmlfid=61014461USEN"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"research-paper",
|
|
"ibm",
|
|
"gdpr",
|
|
"regulations"
|
|
]
|
|
},
|
|
"ID2020 Alliance": {
|
|
"Description": "AN ALLIANCE COMMITTED TO IMPROVING LIVES THROUGH DIGITAL IDENTITY",
|
|
"Link": [
|
|
"https://id2020.org/"
|
|
],
|
|
"Tags": [
|
|
"organizations",
|
|
"un",
|
|
"id2020",
|
|
"accenture",
|
|
"fhi360",
|
|
"sdg",
|
|
"icc",
|
|
"simprints",
|
|
"irespond",
|
|
"hyperledger",
|
|
"kiva",
|
|
"mercy-corps",
|
|
"rockefeller-foundation",
|
|
"microsoft",
|
|
"gavi"
|
|
]
|
|
},
|
|
"IDENTITY MATTERS": {
|
|
"Description": "A primer paper on the rise and relevance of Self-Sovereign Identity.\n\nby [CBoxx](https://cboxx.com/) about self-sovereign identity that gives an overview of the concept, humanitarian applications, as well as relevant projects, standards and communities in this space.",
|
|
"Link": [
|
|
"https://cboxxtest.files.wordpress.com/2017/09/cboxxidentitymatters04.pdf"
|
|
],
|
|
"Tags": [
|
|
"cboxx",
|
|
"self-sovereign",
|
|
"gdpr",
|
|
"regulations",
|
|
"humanitarian",
|
|
"report",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Identity 2.0": {
|
|
"Description": "A birth certificate is a document of almost incalculable value. It allows us to go to school, prove our citizenship, exercise the right to vote, access healthcare, and open a bank account. A birth certificate gives someone a unique legal identity.\n\nThose of us living in highly developed countries take our birth certificates for granted. For us, births and deaths are routinely and accurately documented. Yet more than 100 developing countries lack functional civil registration and vital statistics (CRVS) systems, and 230 million children under the age of five haven't been registered. Some countries like Malawi and Ethiopia have registration rates in the single digits. Experts estimate that there are 1.5 billion people without a legal identity. That's the equivalent of all of China going untracked.",
|
|
"Link": [
|
|
"https://id2020.org/news/2016/12/2/identity-20"
|
|
],
|
|
"Tags": [
|
|
"id2020",
|
|
"decentralized-id",
|
|
"un",
|
|
"blog"
|
|
]
|
|
},
|
|
"Identity Credentials 1.0, Draft Community Group Report": {
|
|
"Description": "An identity is a collection of attributes about an entity that distinguish it from other entities. Entities are anything with distinct existence, such as people, organizations, concepts, or devices. Some entities, such as people, are multifaceted, having multiple identities that they present to the world. People are often able to establish trust by demonstrating that others have made valuable claims about their identities. One way of doing this is by presenting a credential. A credential is a set of claims made by an entity about an identity. A credential may refer to a qualification, achievement, quality, or other information about an identity such as a name, government ID, home address, or university degree that typically indicates suitability.",
|
|
"Link": [
|
|
"https://opencreds.org/specs/source/identity-credentials/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"specs",
|
|
"credentials",
|
|
"did",
|
|
"rwot",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Identity Crisis: Clear Identity through Correlation": {
|
|
"Description": "The term \"identity\" is a challenge.\n\nBoth laypeople and experts struggle to communicate clearly about it. The term has numerous rich and useful meanings. That same flexibility and expressivity also makes it easy to misunderstand subtle nuances and often leads to ideological debate rather than understanding and applications. We compensate with adjectives, creating new phrases like \u201cdigital identity\u201d or \u201clegal identity\u201d, but we often still speak past each other. We regularly refer to \u201cidentities\u201d as things that are assigned to us or that we own, things we control or present, instead of using more rigorous terms such as \u201cidentifiers\u201d or \u201ccredentials\u201d. This fluidity often confuses because, at its core, identity is an emergent phenomenon that doesn't have an existence independent of the observer.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/identity-crisis.pdf",
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/identity-crisis.docx"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"rwot",
|
|
"whitepaper",
|
|
"w3c"
|
|
]
|
|
},
|
|
"Identity Hubs Capabilities Perspective": {
|
|
"Description": "Identity Hubs as currently proposed in the Decentralized Identity Foundation (DIF) are a subset of a general Decentralized Identifier (DID) based user-controlled agent, based on ACLs rather than an object-capabilities (ocap) architecture. The current approach has both security and scalability issues. Transitioning the Hubs design to an ocap model can be achieved by introducing an UMA authorization server as the control endpoint. This avoids creating confused-deputy security issues and expands scale by enabling the hub to delegate access to resources not stored in the hub itself.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/identity-hubs-capabilities-perspective.md"
|
|
],
|
|
"Tags": [
|
|
"dif",
|
|
"did",
|
|
"whitepaper",
|
|
"rwot",
|
|
"capabilities",
|
|
"w3c",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Identity Validation as a Public Sector Digital Service?": {
|
|
"Description": "I've written before about the role that the public sector currently has in identity establishment, but not in identity validation. This absence has led to an online ecosystem in the U.S. that depends on non-authoritative information for identity validation. These are some initial thoughts on what an attribute validation service, which provides validation of identity attributes using authoritative public sector sources, could look like.",
|
|
"Link": [
|
|
"https://blog.aniljohn.com/2014/07/identity-validation-as-a-public-sector-digital-service.html"
|
|
],
|
|
"Tags": [
|
|
"identification",
|
|
"state",
|
|
"blog"
|
|
]
|
|
},
|
|
"Identity as a Bottleneck for Blockchain": {
|
|
"Description": "The Road to Self Sovereign Identity\n\nBlockchain and smart contracts have the potential to radically reduce transaction costs and cut out the middle man. However, it is important to recognise that any structural fulfilment of this potential relies on first solving the fundamental question of identity: can we trust the entities who will be involved in these transactions, and how will we identify them?",
|
|
"Link": [
|
|
"https://blockchainhub.net/blog/blog/decentralized-identity-blockchain/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"blog",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Identity at Coinbase: Welcoming the Distributed Systems team": {
|
|
"Description": "A decentralized identity will let you prove that you own an identity, or that you have a relationship with the Social Security Administration, without making a copy of that identity.",
|
|
"Link": [
|
|
"https://blog.coinbase.com/identity-at-coinbase-welcoming-the-distributed-systems-team-d929dd64de2e"
|
|
],
|
|
"Tags": [
|
|
"coinbase",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"enterprise"
|
|
]
|
|
},
|
|
"Identity on the Blockchain: Perils and Promise": {
|
|
"Description": "Presented during the #Consensus2016 identity workshop, May 4th, 2016",
|
|
"Link": [
|
|
"https://www.slideshare.net/ChristopherA/identity-of-the-blockchain-perils-and-promise"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"christophera",
|
|
"history",
|
|
"presentation",
|
|
"iiw",
|
|
"history"
|
|
]
|
|
},
|
|
"Illinois Blockchain Initiative": {
|
|
"Description": "is partnering with Evernym to develop a birth registry pilot, where self-sovereign identities are created, and government agencies issue \"verifiable claims\" for birth registration attributes such as legal name, date of birth, sex or blood type.",
|
|
"Link": [
|
|
"https://illinoisblockchain.tech/",
|
|
"https://illinoisblockchain.tech/illinois-partners-with-evernym-to-launch-birth-registration-pilot-f2668664f67c"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"birth-registry",
|
|
"illinois-blockchain",
|
|
"blockchain-id",
|
|
"evernym",
|
|
"verifiable-Claims",
|
|
"did",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Indy Project Proposal": {
|
|
"Description": "Indy is a distributed ledger purpose-built for decentralized identity. It provides tools, libraries and reusable components for providing independent digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other \"silo\".",
|
|
"Link": [
|
|
"https://docs.google.com/document/d/1YzXz0aM8w7kSp3_ao3ue9tOFwK9paofXbtBptR1Jucg/edit",
|
|
"https://i.imgur.com/uRklykE.png"
|
|
],
|
|
"Tags": [
|
|
"indy",
|
|
"sovrin",
|
|
"hyperledger",
|
|
"history",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"documentation",
|
|
"image",
|
|
"public-permissioned"
|
|
]
|
|
},
|
|
"Inevitable Rise of Self-Sovereign Identity": {
|
|
"Description": "This whitepaper explains why the Internet does not currently have an identity layer and how the emergence of distributed ledger technology (DLT) finally makes one possible. It also shows how a globally shared ledger can enable true self-sovereign identity, where every person, organization, or thing can have its own truly independent digital identity that no other person, company, or government can take away. Most importantly, the paper explains what most distinguishes Sovrin as a distributed identity system: it is the first public permissioned ledger",
|
|
"Link": [
|
|
"https://sovrin.org/wp-content/uploads/2018/03/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"Internet Identity Workshop": {
|
|
"Description": "The Internet Identity Workshop has been finding, probing and solving identity issues twice every year since 2005. We meet in the Computer History Museum in Mountain View, CA. Every IIW moves topics, code and projects downfield. Name an identity topic and it's likely that more substantial discussion and work has been done at IIW than any other conference!",
|
|
"Link": [
|
|
"http://www.internetidentityworkshop.com/",
|
|
"http://iiw.idcommons.net/Main_Page",
|
|
"https://twitter.com/idworkshop"
|
|
],
|
|
"Tags": [
|
|
"iiw",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"organizations",
|
|
"microsoft",
|
|
"google",
|
|
"ibm",
|
|
"hyperledger",
|
|
"evernym",
|
|
"sovrin",
|
|
"history",
|
|
"blockchain-id",
|
|
"w3c",
|
|
"rwot"
|
|
]
|
|
},
|
|
"Internet of People": {
|
|
"Description": "an open, decentralized infrastructure consisting of device-to-device communication, blockchain tokens, profile servers, and other components.",
|
|
"Link": [
|
|
"https://iop.global/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"fermat",
|
|
"iop",
|
|
"decentralized-internet",
|
|
"peacekeeper",
|
|
"organizations"
|
|
]
|
|
},
|
|
"Introduction to DID Auth": {
|
|
"Description": "The term DID Auth has been used in different ways and is currently not well-defined. We define DID Auth as a ceremony where an identity owner, with the help of various components such as web browsers, mobile devices, and other agents, proves to a relying party that they are in control of a DID. This means demonstrating control of the DID using the mechanism specified in the DID Document's \"authentication\" object. This could take place using a number of different data formats, protocols, and flows. DID Auth includes the ability to establish mutually authenticated communication channels and to authenticate to web sites and applications. Authorization, Verifiable Credentials, and Capabilities are built on top of DID Auth and are out of scope for this document. This paper gives on overview of the scope of DID Auth, supported protocols and flows, and the use of components of the DID Documents that are relevant to authentication, as well as formats for challenges and responses.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2018/blob/master/final-documents/did-auth.md"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"did",
|
|
"rwot",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"authentication"
|
|
]
|
|
},
|
|
"Introduction to DID Auth for SSI \u2013 Markus Sabadello \u2013 Webinar 10": {
|
|
"Description": "Markus Sabadello, CEO of Danube Tech, will talk about DID Auth, an emerging building block in the SSI ecosystem. Although the technical details of DID Auth are not well-defined at this point, its general concept is clear: With self-sovereign identity infrastructure, the most trivial and straightforward functionality for identity owners should be the ability to authenticate, i.e. to prove control of a DID in some relationship or during a transaction. This could take place using a number of different data formats, protocols, and flows. DID Auth includes the ability to authenticate to web sites and applications, and to establish mutually authenticated communication channels. In this webinar, we will discuss the current state of the DID Auth concept, and how it relates to other efforts such as Verifiable Credentials and agent protocols. We also recommend reading the white paper \"Introduction to DID Auth\" by Markus Sabadello, Kyle Den Hartog, Christian Lundkvist, Cedric Franz, Alberto Elias, Andrew Hughes, John Jordan, Dmitri Zagidulin.",
|
|
"Link": [
|
|
"http://ssimeetup.org/introduction-did-auth-markus-sabadello-webinar-10/",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2018/blob/master/draft-documents/did_auth_draft.md"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"did",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"peacekeeper",
|
|
"presentation",
|
|
"video",
|
|
"authentication"
|
|
]
|
|
},
|
|
"Is Self Sovereign Identity the Ultimate GDPR Compliance Tool? 1/3": {
|
|
"Description": "Few topics are as popular right now as the European Union's new data protection law, the General Data Protection Regulation (the \"GDPR\" or \"Regulation\"), perhaps with the exceptions of self-sovereign identity (\"SSI\") and blockchain. Likewise, few topics are as misunderstood or oversimplified. In an attempt to dispel some of the mythology and encourage a more nuanced approach to the conversation, this is the first in a series of posts to assess SSI through the lens of the GDPR.",
|
|
"Link": [
|
|
"https://medium.com/evernym/is-self-sovereign-identity-ssi-the-ultimate-gdpr-compliance-tool-9d8110752f89",
|
|
"https://medium.com/evernym/is-self-sovereign-identity-ssi-the-ultimate-gdpr-compliance-tool-40db94c1c437",
|
|
"https://medium.com/evernym/is-self-sovereign-identity-ssi-the-ultimate-gdpr-compliance-tool-7296a3b07769"
|
|
],
|
|
"Tags": [
|
|
"evernym",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"gdpr",
|
|
"regulations",
|
|
"self-sovereign",
|
|
"blog"
|
|
]
|
|
},
|
|
"Is Sovrin Decentralized?": {
|
|
"Description": "To determine whether Sovrin is decentralized, we have to ask questions about the purpose of decentralization and how Sovrin supports those purposes.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2017/09/is_sovrin_decentralized.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"JLinc (formerly IDKeys)": {
|
|
"Description": "JLINC Labs is based in Oakland California with an enterprise sales office in London. The founders have been at the center of a community of developers working on \u201cuser-centric digital identity\u201d for almost two decades. They have attracted an international team of digital identity, marketing and privacy experts who understand the unique implications of the JLINC protocol. \n\nis a distributed global identity system that registers cryptographic public keys on the Stellar blockchain.\u2014#peacekeeper",
|
|
"Link": [
|
|
"https://www.jlinc.com/",
|
|
"https://idkeys.net/"
|
|
],
|
|
"Tags": [
|
|
"jlinc",
|
|
"blockchain-id",
|
|
"idkeys",
|
|
"stellar",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"JSON-LD 1.0, W3C Recommendation": {
|
|
"Description": "JSON is a useful data serialization and messaging format. This specification defines JSON-LD, a JSON-based format to serialize Linked Data. The syntax is designed to easily integrate into deployed systems that already use JSON, and provides a smooth upgrade path from JSON to JSON-LD. It is primarily intended to be a way to use Linked Data in Web-based programming environments, to build interoperable Web services, and to store Linked Data in JSON-based storage engines.",
|
|
"Link": [
|
|
"https://www.w3.org/TR/json-ld/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"specs",
|
|
"json",
|
|
"did",
|
|
"rwot",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Jolocom": {
|
|
"Description": "developing a \"SmartWallet\" for everyone to own their personal digital identity, using [Social Linked Data](https://github.com/solid/solid-spec), WebID, and verifiable claims standards, as well as Ethereum smart contracts. The company focuses on decentralization and GDPR compliance, and is part of the E.U. [AGILE](http://www.agile-project-iot.eu/) IoT consortium.",
|
|
"Link": [
|
|
"http://jolocom.com/",
|
|
"https://github.com/solid/solid-spec",
|
|
"http://agile-iot.eu/"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"protocol",
|
|
"ethereum",
|
|
"gdpr",
|
|
"regulations",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"jolocom",
|
|
"agile",
|
|
"iot"
|
|
]
|
|
},
|
|
"Joram 1.0.0": {
|
|
"Description": "Joram is a 25 year-old, single male from Syria. He flees his home country, leaving behind his family, because he fears persecution. He finds his way to a refugee boat that makes its way to a beach in Greece. Joram brings only the clothes on his back: no identity papers, no technology. Joram speaks Arabic, and English1 but not Greek.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/joram-engagement-model.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/joram-engagement-model.docx"
|
|
],
|
|
"Tags": [
|
|
"use-case",
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Kaliya-Identity Woman": {
|
|
"Description": "Blockchain & ID Expert. Independent Advocate for the Rights & Dignity of our Digital Selves. Open Standards! Co-Founder, Facilitator [@idworkshop](https://twitter.com/idworkshop) & [@unconference](https://twitter.com/unconference)",
|
|
"Link": [
|
|
"https://identitywoman.net/",
|
|
"https://twitter.com/IdentityWoman"
|
|
],
|
|
"Tags": [
|
|
"identity-woman",
|
|
"people"
|
|
]
|
|
},
|
|
"Keyp": {
|
|
"Description": "Welcome to Europe's fastest growing open digital identity ecosystem.\n100+ identity solutions\n50+ ecosystem partners\n10+ technology partners\n\ndoes not use blockchain, but still offers a self-sovereign digital identity infrastructure. A resource asks the user for specific attributes, which are stored in a wallet on a secure device. The wallet redirects the request to a specific \"authenticator\" that can validate the attribute.\"\u2014#peacekeeper",
|
|
"Link": [
|
|
"https://keyp.io/"
|
|
],
|
|
"Tags": [
|
|
"peacekeeper",
|
|
"keyp",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"Kimlic": {
|
|
"Description": "is a mobile app that uses a private blockchain as a source of truth for identity. It stores personal data on the mobile device and allows the sharing of verifiable identity claims and documents.",
|
|
"Link": [
|
|
"http://kimlic.com/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"kyc",
|
|
"app",
|
|
"kimlic",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"LD Signature Format Alignment": {
|
|
"Description": "The goal of the \"LD Signature Format Alignment\" Working Group at Rebooting the Web of Trust IV was to investigate the feasibility and impact of the proposed 2017 RSA Signature Suite spec, which brings JSON-LD signatures into alignment with the JOSE JSON Web Signature (JWS) standards.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2017/blob/master/final-documents/ld-signatures.md"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"whitepaper",
|
|
"signatures",
|
|
"json",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Linked Data Capabilities": {
|
|
"Description": "Linked Data Signatures enable a method of asserting the integrity of linked data documents that are passed throughout the web. The object capability model is a powerful system for ensuring the security of computing systems. In this paper, we explore layering an object capability model on top of Linked Data Signatures via chains of signed proclamations. fn:1 We call this system \"Linked Data Capabilities\", or \"ld-ocap\" for short.\n\nThe system we propose can work regardless of whether https identifiers or DIDs are being used. Since DIDs work nicely with this system and add an additional layer of decentralization we use them for the URIs of this system.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/lds-ocap.md"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"whitepaper",
|
|
"capabilities",
|
|
"did",
|
|
"w3c",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Linked Data Signature Suites": {
|
|
"Description": "The group is currently incubating, implementing, and deploying the following specifications:\n\n* Linked Data Signatures - Describes a mechanism for ensuring the authenticity and integrity of linked data documents using digital signatures.\n* Signing HTTP Messages - Describes a mechanism for ensuring the authenticity and integrity of HTTP Messages using digital signatures. A security audit of the protocol is available.\n* 2017 RSA Signature Suite - Signature Suite for RSA 2017. There is an older signature suite for RSA 2016.\n* 2016 Koblitz Elliptic Curve Suite - Signature Suite for the Koblitz Elliptic Curve 2016.\n* 2016 Redaction Signature Suite - Signature Suite created in 2016 for performing Redacted signatures.\n* 2016 Pseudonymous Signature Suite - Signature Suite for Pseudonymous 2016 signatures.\n* 2017 Merkle Proof Signature Suite - Signature Suite for Merkle Proof 2017 signatures.",
|
|
"Link": [
|
|
"https://w3c-dvcg.github.io/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"specs",
|
|
"signatures",
|
|
"did",
|
|
"rwot",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Linked Data Signatures 1.0, Draft Community Group Report": {
|
|
"Description": "This specification describes a mechanism for ensuring the authenticity and integrity of Linked Data documents using digital signatures.",
|
|
"Link": [
|
|
"https://w3c-dvcg.github.io/ld-signatures/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"specs",
|
|
"signatures",
|
|
"did",
|
|
"rwot",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"MMlab Mobile Multimedia Laboratory": {
|
|
"Description": "A research team at Athens University of Economics and Business is working on \"information-centric\" networking and is exploring the use of blockchain technology for \"content names\".\n\nThe Mobile Multimedia Laboratory (MMlab) is performing research in the areas of Wireless Packet Networks and Mobile Communications, Internet Protocols and Applications, Security, Privacy and Trust, Mobile Multimedia, Quality-of-Service & Quality-of-Experience, Multimedia Multicast and Broadcast. MMlab is part of the Telecommunications Services Group of the Dept. of Computer Science of the Athens University of Economics and Business. The lab is headed by Professor George C. Polyzos.",
|
|
"Link": [
|
|
"http://mm.aueb.gr/"
|
|
],
|
|
"Tags": [
|
|
"mmlab",
|
|
"academic",
|
|
"mobile",
|
|
"communications",
|
|
"peacekeeper",
|
|
"organizations",
|
|
"identification"
|
|
]
|
|
},
|
|
"Managing Identity with a UI\u2014ERC-725": {
|
|
"Description": "So how do we identify someone on the blockchain? How can we build a mechanism into our smart contracts to only allow interactions from reputable people? One potential solution to this problem is ERC 725 (and 735)\u200a\u2014\u200aa proposed standard for managing identity on the blockchain from Fabian Vogelsteller. Fabian works on the Ethereum project and is well known in the community as the creator of the Mist browser and Web3.js. He was also the creator of the widely successful ERC 20 token standard.",
|
|
"Link": [
|
|
"https://medium.com/originprotocol/managing-identity-with-a-ui-for-erc-725-5c7422b38c09"
|
|
],
|
|
"Tags": [
|
|
"ethereum",
|
|
"blockchain-id",
|
|
"erc",
|
|
"erc-725",
|
|
"uport",
|
|
"origin",
|
|
"blog"
|
|
]
|
|
},
|
|
"Manu Sporny": {
|
|
"Description": "Founder/CEO Digital Bazaar; payments, identity & blockchain. Kickstarted Web Payments, Verifiable Credentials, Decentralized Identifiers, and JSON-LD at W3C.",
|
|
"Link": [
|
|
"https://twitter.com/manusporny",
|
|
"https://digitalbazaar.com/blog/"
|
|
],
|
|
"Tags": [
|
|
"twitter",
|
|
"people",
|
|
"manusporny",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"w3c",
|
|
"credentials",
|
|
"digital-bazaar"
|
|
]
|
|
},
|
|
"Markus Sabadello \u2014Peacekeeper": {
|
|
"Description": "Identity and Communication for Political and Social Innovation",
|
|
"Link": [
|
|
"https://danubetech.com/",
|
|
"https://twitter.com/peacekeeper",
|
|
"https://github.com/peacekeeper",
|
|
"https://www.linkedin.com/in/markus-sabadello-353a0821/",
|
|
"https://medium.com/@markus.sabadello",
|
|
"https://uniresolver.io"
|
|
],
|
|
"Tags": [
|
|
"peacekeeper",
|
|
"sovrin",
|
|
"danubetech",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"people"
|
|
]
|
|
},
|
|
"Mathematical Mesh": {
|
|
"Description": "\"Make computers easier to use by making computers secure\n\n\"allows people to create \"profiles\" to help them secure and link together their devices.\"\n\n[CryptoMesh](http://mathmesh.com/Technical/Architecture/index.html) is a proposal for a federated cloud infrastructure to support storage and retrieval of these profiles. Each portal provider in the CryptoMesh maintains a linked log (aka blockchain) of all the profile updates published to it. At regular intervals, each portal provider publishes the last output of the linked log as a \"witness value\".-#peacekeeper",
|
|
"Link": [
|
|
"http://mathmesh.com/"
|
|
],
|
|
"Tags": [
|
|
"mathmesh",
|
|
"prismproof",
|
|
"peacekeeper",
|
|
"security"
|
|
]
|
|
},
|
|
"Mooti": {
|
|
"Description": "We work in the digital identity and data integrity space to help our clients and partners securely identify and authenticate their users.\n\nOur strong belief in the idea of a self-sovereign digital identity is what guides our projects. This idea goes beyond the concept of standard organization based identity and provides users with\u2013individual control, security and full portability. This is accomplished by creating or enhancing your existing Android and iOS Mobile Apps to securely allow for the usage and management of asymmetric cryptographic key pairs for digital interactions. Our hosted or an on-prem server solution receives communication from your mobile apps to verify a user's identity, enables password-less login via QR code, and aligns internal data hashes to public blockchains.\n\n\"offers an \"identity chain\" technology that makes it possible to issue and revoke verified claims (e.g. governmental, medical, financial, etc.). The platform uses elliptic curve cryptography (curve25519, secp256k1) and includes privay-enhancing features e.g. to obfuscate issuers and holders of claims. A lightweight mobile client is available.\"-#peacekeeper",
|
|
"Link": [
|
|
"https://mooti.co/",
|
|
"https://docs.mooti.co/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"mooti",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Mydata": {
|
|
"Description": "We are entrepreneurs, activists, academics, listed corporations, public agencies, and developers. For years, we've been using different words for what we do \u2013 MyData, Self Data, VRM (Vendor Relationship Management), Internet of Me, PIMS (Personal Information Management Services) etc, while sharing a common goal: to empower individuals with their personal data, thus helping them and their communities develop knowledge, make informed decisions, and interact more consciously and efficiently with each other as well as with organisations.",
|
|
"Link": [
|
|
"http://mydata.org/",
|
|
"https://mydata.org/papers/",
|
|
"https://mydata.org/declaration/"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"mydata",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"eth-app",
|
|
"consent-global"
|
|
]
|
|
},
|
|
"NameID": {
|
|
"Description": "an OpenID service based on Namecoin identifiers.",
|
|
"Link": [
|
|
"https://nameid.org/"
|
|
],
|
|
"Tags": [
|
|
"namecoin",
|
|
"openid",
|
|
"identification",
|
|
"peacekeeper",
|
|
"blockchain-id",
|
|
"protocol"
|
|
]
|
|
},
|
|
"Namecoin": {
|
|
"Description": "Namecoin is a blockchain that has been conceived from the start to be used for registering domain names. It is the first fork of the Bitcoin software.",
|
|
"Link": [
|
|
"http://namecoin.org/"
|
|
],
|
|
"Tags": [
|
|
"bitcoin-fork",
|
|
"dns",
|
|
"blockchain-id",
|
|
"coin",
|
|
"namecoin",
|
|
"identification",
|
|
"peacekeeper",
|
|
"protocol"
|
|
]
|
|
},
|
|
"Nuggets": {
|
|
"Description": "is a blockchain platform giving users a single biometric tool for login, payment and identity verification. It stores an individual's information in a \"personal cloud\" in \"zero-knowledge blockchain storage\". A mobile app allows using the camera to add physical identity and payment cards.",
|
|
"Link": [
|
|
"http://www.nuggets.life/",
|
|
"https://nuggets.life/images/Nuggets-White-Paper.pdf"
|
|
],
|
|
"Tags": [
|
|
"nuggets",
|
|
"blockchain-id",
|
|
"eth-app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"ONTology": {
|
|
"Description": "is a \"Distributed Trust Network\" which combines a cross-chain identity system, peer-to-peer data transmission, data authorization mechanisms, distributed data storage, attestation, and various industry-specific modules. It also includes an Ontology Crypto Package (OCP) and an Ontology Marketplace (OM).",
|
|
"Link": [
|
|
"https://ont.io/"
|
|
],
|
|
"Tags": [
|
|
"ontology",
|
|
"peacekeeper",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"personal-data-market"
|
|
]
|
|
},
|
|
"Ockam": {
|
|
"Description": "is creating a ERC20 based platform that registers IOT devices to a blockchain to solve systemic security and interoperability problems.",
|
|
"Link": [
|
|
"https://www.ockam.io/"
|
|
],
|
|
"Tags": [
|
|
"ockam",
|
|
"iot",
|
|
"erc20",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"One World Identity": {
|
|
"Description": "One World Identity (\u2018OWI') is an independent advisory and digital strategy consultancy focused on trust and the data economy. We help business leaders, governments, and investors stay ahead of market trends so they can build sustainable, forward-looking products and strategies.",
|
|
"Link": [
|
|
"https://oneworldidentity.com/"
|
|
],
|
|
"Tags": [
|
|
"owi",
|
|
"organizations",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"Onename": {
|
|
"Description": "a product built on Blockstack that allows people to register identities.",
|
|
"Link": [
|
|
"https://onename.com/"
|
|
],
|
|
"Tags": [
|
|
"onename",
|
|
"blockstack",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"app"
|
|
]
|
|
},
|
|
"Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data": {
|
|
"Description": "In November 2015 Facebook's share price broke $100 USD/share, for a total valuation of $290 billion USD. This is evidence that both Facebook and the market understand the value of controlling and leveraging personal data. However, the now-conventional absorb-everything design of Facebook is a blunt one. Employing users as passive producers with no control of their own data only scratches the surface of what is possible with networks of information and identity.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/satisfying-real-world-use-cases.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/satisfying-real-world-use-cases.docx"
|
|
],
|
|
"Tags": [
|
|
"use-case",
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Patchwork": {
|
|
"Description": "A decentralized messaging and sharing app built on top of Secure Scuttlebutt (SSB).",
|
|
"Link": [
|
|
"https://ssbc.github.io/patchwork/",
|
|
"https://www.scuttlebutt.nz"
|
|
],
|
|
"Tags": [
|
|
"identification",
|
|
"app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Persona": {
|
|
"Description": "implements KYC processes using the [ARK](https://ark.io/) blockchain. Paper documents such as passports or bank statements are saved in IPFS using a \"Persona Identity Dashboard\". A \"notary\" then creates a hash of the content and publishes it on the Persona blockchain.",
|
|
"Link": [
|
|
"https://persona.im/",
|
|
"https://github.com/ontio/documentation"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"kyc",
|
|
"ark",
|
|
"peacekeeper",
|
|
"ipfs",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Phil Windley": {
|
|
"Description": "I build things; I write code; I void warranties",
|
|
"Link": [
|
|
"https://twitter.com/windley",
|
|
"https://windley.com"
|
|
],
|
|
"Tags": [
|
|
"people",
|
|
"windley",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"iiw",
|
|
"quote"
|
|
]
|
|
},
|
|
"PikcioChain": {
|
|
"Description": "is a proprietary network and blockchain architecture designed for the collection, certification and exchange of personal data. Individuals install mobile apps that act as servers in a decentralized network, and can earn Pikcio Tokens (PKC) by selling or certifying their data.",
|
|
"Link": [
|
|
"https://pikciochain.com/",
|
|
"https://pikciochain.com/media/dynamic_preferences/whitepaper__whitepaper_en/Ten8%20-%20PikcioChain%20Whitepaper%20English.pdf"
|
|
],
|
|
"Tags": [
|
|
"pikcio",
|
|
"peacekeeper",
|
|
"personal-data-market"
|
|
]
|
|
},
|
|
"Pillar Project": {
|
|
"Description": "is planning to offer a \"Personal Data Locker\" consisting of a wallet, browser, and token exchange. Personal assets will be put on a blockchain, and \"Pillar\" tokens will be issued.",
|
|
"Link": [
|
|
"http://pillarproject.io",
|
|
"https://pillarproject.io/documents/Pillar-Gray-Paper.pdf"
|
|
],
|
|
"Tags": [
|
|
"verifiable-claims",
|
|
"peacekeeper",
|
|
"pillar",
|
|
"personal-data-wallet",
|
|
"w3c"
|
|
]
|
|
},
|
|
"Plenum Byzantine Fault Tolerant Protocol": {
|
|
"Description": "Byzantine fault tolerance is a sub-field of fault tolerance research inspired by the Byzantine Generals' Problem, which is a generalized version of the Two Generals' Problem.",
|
|
"Link": [
|
|
"https://github.com/hyperledger/indy-plenum/wiki"
|
|
],
|
|
"Tags": [
|
|
"pbft",
|
|
"sovrin",
|
|
"indy",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"consensus",
|
|
"rbft"
|
|
]
|
|
},
|
|
"Powering the Physician-Patient Relationship with HIE of One Blockchain Health IT": {
|
|
"Description": "Together, physicians and patients steer treatment and are responsible for the vast majority of decisions, and therefore expenditures, in healthcare. Yet the technology that mediates the physician-patient relationship today is not directly purchased or controlled by either the physicians or the patients. Electronic health records and health information exchange technology are sold as strategic assets to institutions\u00a0\u2014 typically very large businesses, that currently have incentives to maximize institutional growth. We seek a better balance of institutional needs with the needs of physicians and patients.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/physician-patient-relationship.pdf",
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/physician-patient-relationship.docx"
|
|
],
|
|
"Tags": [
|
|
"use-case",
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Privacy Impact Assesment": {
|
|
"Description": "A Privacy Impact Assessment (PIA) is a process which assists organizations in identifying and minimizing the privacy risks of new projects or policies.",
|
|
"Link": [
|
|
"https://en.wikipedia.org/wiki/Privacy_Impact_Assessment"
|
|
],
|
|
"Tags": [
|
|
"pia",
|
|
"gdpr",
|
|
"regulations",
|
|
"developing"
|
|
]
|
|
},
|
|
"Privacy on the Blockchain": {
|
|
"Description": "Blockchains are a powerful technology, as regular readers of the blog already likely agree. They allow for a large number of interactions to be codified and carried out in a way that greatly increases reliability, removes business and political risks associated with the process being managed by a central entity, and reduces the need for trust. They create a platform on which applications from different companies and even of different types can run together, allowing for extremely efficient and seamless interaction, and leave an audit trail that anyone can check to make sure that everything is being processed correctly.\n\n includes some thoughts about identity systems.",
|
|
"Link": [
|
|
"https://blog.ethereum.org/2016/01/15/privacy-on-the-blockchain/"
|
|
],
|
|
"Tags": [
|
|
"vitalik",
|
|
"privacy",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"blog"
|
|
]
|
|
},
|
|
"Privacy-Preserving Authentication, Another Reason to Care about Zero-Knowledge Proofs": {
|
|
"Description": "In the near future, privacy-preserving authentication methods will flood the market, and they will be based on Zero-Knowledge Proofs. IBM and Microsoft invested in these solutions many years ago.",
|
|
"Link": [
|
|
"https://i.imgur.com/SBo66oE.jpg",
|
|
"https://i.imgur.com/VUJDCe5.jpg",
|
|
"https://www.slideshare.net/eralcnoslen/privacypreserving-authentication-another-reason-to-care-about-zeroknowledge-proofs"
|
|
],
|
|
"Tags": [
|
|
"zkp",
|
|
"privacy",
|
|
"presentation",
|
|
"image",
|
|
"blockchain-id",
|
|
"sovrin",
|
|
"indy",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Pro-civis": {
|
|
"Description": "offers an \"e-government as a service\" platform called \"eID+\". It enables citizens to get an official, electronic Citizen-ID on a mobile app, which can be used for secure and convenient login to websites, and the electronic signing and safe storage of documents. Verification providers such as state authorities can use a web backend or an API to attest to the correctness of a citizen's personal data. The platform includes the [Vetri](https://vetri.global/) wallet and marketplace. 'Earn extra income and rewards by joining the data economy.'",
|
|
"Link": [
|
|
"https://procivis.ch"
|
|
],
|
|
"Tags": [
|
|
"pro-civis",
|
|
"eid",
|
|
"valid",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Proof of Authority": {
|
|
"Description": "First, PoA was proposed by a group of developers in March 2017 (the term was coined by Gavin Wood) as a blockchain based on the Ethereum protocol. It was developed primarily as a solution to the problem of spam attacks on Ethereum's Ropsten test network. The new network was named Kovan and is a primary test network available to all Ethereum users today.\n\nPoA consensus is essentially an optimized Proof of Stake model that leverages identity as the form of stake rather than actually staking tokens. The identity is staked by a group of validators (authorities) that are pre-approved to validate transactions and blocks within the respective network. The group of validators is usually supposed to remain fairly small (~25 or less) in order to ensure efficiency and manageable security of the network.",
|
|
"Link": [
|
|
"https://blockonomi.com/proof-of-authority/"
|
|
],
|
|
"Tags": [
|
|
"ethereum",
|
|
"poa",
|
|
"permissioned",
|
|
"consensus",
|
|
"blockchain-id",
|
|
"documentation"
|
|
]
|
|
},
|
|
"Proof-of-Individuality": {
|
|
"Description": "POIs (proof-of-individuality) are smart-assets that are hosted on the Ethereum network. They solve one of the hard problems in crypto - how do you prove that a person only has one account within the system ? \n\nThrough person-to-person verification. Users are grouped together by random in groups of 5 or so, and every group does a video hangout at the exact same time, that lasts around 10 minutes or so. Users check so that the others in their group aren't doing another hangout at the same time. They then sign each other's POIs and verify them. Once the hangouts are finished and all POIs have been verified, everyone will know that each POI represents a unique human being. \n\n#peacekeeper addresses the challenge to prove that a person only has one account within a system, without sacrificing the advantages of anonymity/pseudonymity. See [here](https://medium.com/@unlisted/anti-sybil-protocol-using-virtual-pseudonym-parties-10276fcf3b20) for a draft implementation using \"virtual pseudonym parties\".",
|
|
"Link": [
|
|
"http://proofofindividuality.online/",
|
|
"https://medium.com/@unlisted/anti-sybil-protocol-using-virtual-pseudonym-parties-10276fcf3b20"
|
|
],
|
|
"Tags": [
|
|
"poi",
|
|
"anti-sybil",
|
|
"weboftrust",
|
|
"peacekeeper",
|
|
"identification",
|
|
"eth-app"
|
|
]
|
|
},
|
|
"Protecting Digital Identities in Developing Countries": {
|
|
"Description": "People in many parts of the developing world have little or no infrastructure for well-regulated government and commercial processes. This creates a pressing need for a safe place to store important personal data needed to access financial, insurance, education and healthcare services. A universal digital identity system would underpin information assurance through verifiable and reliable data that can be presented when required. This paper presents a strong use case for a self-sovereign identity system with verifiable information and user-controllable release.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/protecting-digital-identities-in-developing-countries.pdf",
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/protecting-digital-identities-in-developing-countries.docx"
|
|
],
|
|
"Tags": [
|
|
"use-case",
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"humanitarian",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"QED-it": {
|
|
"Description": "is building a platform for confidentiality on blockchain, using scalable zero-knowledge proof technology, in order to achieve decentralization, consensus, and confidentiality at the same time. This enables dynamic identity and \"proof for all with data to no one\".",
|
|
"Link": [
|
|
"http://qed-it.com/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"qed-it",
|
|
"zkp",
|
|
"business",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"RBFT: Redundant Byzantine Fault Tolerance": {
|
|
"Description": "Abstract\u2014Byzantine Fault Tolerant state machine replication (BFT) protocols are replication protocols that tolerate arbitrary faults of a fraction of the replicas. Although significant efforts have been recently made, existing BFT protocols do not provide acceptable performance when faults occur. As we show in this paper, this comes from the fact that all existing BFT protocols targeting high throughput use a special replica, called the primary, which indicates to other replicas the order in which requests should be processed. This primary can be smartly malicious and degrade the performance of the system without being detected by correct replicas. In this paper, we propose a new approach, called RBFT for Redundant-BFT: we execute multiple instances of the same BFT protocol, each with a primary replica executing on a different machine. All the instances order the requests, but only the requests ordered by one of the instances, called the master instance, are actually executed. The performance of the different instances is closely monitored, in order to check that the master instance provides adequate performance. If that is not the case, the primary replica of the master instance is considered malicious and replaced. We implemented RBFT and compared its performance to that of other existing robust protocols. Our evaluation shows that RBFT achieves similar performance as the most robust protocols when there is no failure and that, under faults, its maximum performance degradation is about 3%, whereas it is at least equal to 78% for existing protocols.",
|
|
"Link": [
|
|
"http://lig-membres.imag.fr/aublin/rbft/report.pdf"
|
|
],
|
|
"Tags": [
|
|
"rbft",
|
|
"pbft",
|
|
"consensus",
|
|
"research-paper"
|
|
]
|
|
},
|
|
"RDF Canonicalization, Draft Community Group Report": {
|
|
"Description": "RDF [RDF-CONCEPTS] describes a graph-based data model for making claims about the world and provides the foundation for reasoning upon that graph of information. At times, it becomes necessary to compare the differences between sets of graphs, digitally sign them, or generate short identifiers for graphs via hashing algorithms. This document outlines an algorithm for normalizing RDF datasets such that these operations can be performed.",
|
|
"Link": [
|
|
"https://json-ld.github.io/normalization/spec/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"specs",
|
|
"rdf",
|
|
"did",
|
|
"rwot",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Re-Imagining What Users Really Want": {
|
|
"Description": "The following five individuals represent a diverse sampling of normal, everyday people whose lives could be improved by self-sovereign identity. Today, these five aren't using enhanced digital identity. For each, we describe their current lack of engagement and provide at least one opportunity that could reframe self-sovereign identity as a clear win for them.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2017/blob/master/final-documents/what-users-really-want.md"
|
|
],
|
|
"Tags": [
|
|
"use-case",
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Rebooting Web of Trust": {
|
|
"Description": "The Web of Trust is a buzzword for a new model of decentralized self-sovereign identity. It's a phrase that dates back almost twenty-five years, the classic definition derives from PGP.\n\nBut some use it as a term to include self-sovereign identity authentication & verification, certificate validation, and reputation assessment, while the vibrant blockchain community is also drawing new attention to the concept we aim to reboot it.",
|
|
"Link": [
|
|
"https://www.weboftrust.info/"
|
|
],
|
|
"Tags": [
|
|
"organizations",
|
|
"w3c",
|
|
"did",
|
|
"sovrin",
|
|
"rwot",
|
|
"self-sovereign",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Rebranding the Web of Trust": {
|
|
"Description": "The Web of Trust. It's the buzzword for a new model of decentralized identity. However, it's also a phrase that dates back almost twenty-five years and has been heavily overloaded with meaning during that time. The classic definition of Web of Trust derives from PGP, but the top Google results refer to a website reputation rating system created by a Finnish internet company. Meanwhile, some use it as a big tent that includes identity authentication & verification, certificate validation, and reputation assessment, while the vibrant blockchain community is also drawing new attention to the classic concept.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/rebranding-web-of-trust.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/rebranding-web-of-trust.docx"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"w3c",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id",
|
|
"weboftrust",
|
|
"history"
|
|
]
|
|
},
|
|
"Reddcoin \u2014 Redd-ID": {
|
|
"Description": "is a naming service that allows usernames to be registered on the [Reddcoin](https://www.reddcoin.com/) blockchain. Usernames are public and searchable. Usernames can be associated with rich information such as public and private user profile details. There is an ability to link usernames to social network identities. The system supports operations familiar from the DNS world, such as expiration, renewal, and transfer.",
|
|
"Link": [
|
|
"https://www.reddcoin.com/service/redd-id/",
|
|
"https://www.reddcointalk.org/",
|
|
"https://www.reddcoin.com/papers/PoSV.pdf"
|
|
],
|
|
"Tags": [
|
|
"reddcoin",
|
|
"redd-id",
|
|
"name-serv",
|
|
"blockchain-id",
|
|
"posv",
|
|
"social-app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Regis": {
|
|
"Description": "is a platform that makes it easy to build, deploy, and manage decentralized registries on the Ethereum blockchain.",
|
|
"Link": [
|
|
"http://regis.nu/"
|
|
],
|
|
"Tags": [
|
|
"regis",
|
|
"registries",
|
|
"eth-app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Requirements for DIDs (Decentralized Identifiers)": {
|
|
"Description": "Respect Network is conducting a research project for the U.S. Department of Homeland Security, HSHQDC-16-C-00061, to analyze the applicability of blockchain technologies to a decentralized identifier system. Our thesis is that blockchains, or more generically distributed ledgers, are a potentially powerful new tool for \u201cidentity roots\u201d \u2014 the starting points for an Internet identity. However \u201cblockchain identity\u201d may not fully address the core security and privacy principles needed in a complete identity system. In this case DIDs \u2014 Decentralized Identifiers rooted on a distributed ledger \u2014 may end up being a foundational building block for higher level identity management solutions.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/requirements-for-dids.pdf",
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/requirements-for-dids.docx"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"rwot",
|
|
"id2020",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"decentralized-id",
|
|
"w3c"
|
|
]
|
|
},
|
|
"Rohingya Project": {
|
|
"Description": "is a grassroots initiative that looks to grant each Rohingya a personalized digital ID, and to tackle the problem of financial exclusion. It aims to make it possible to cryptographically prove one's existence and family relations, recorded on the blockchain.",
|
|
"Link": [
|
|
"http://www.rohingyaproject.com/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"humanitarian",
|
|
"rohingya",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Schema": {
|
|
"Description": "Schema.org is a collaborative, community activity with a mission to create, maintain, and promote schemas for structured data on the Internet, on web pages, in email messages, and beyond.\n\nSchema.org vocabulary can be used with many different encodings, including RDFa, Microdata and JSON-LD. These vocabularies cover entities, relationships between entities and actions, and can easily be extended through a well-documented extension model. Over 10 million sites use Schema.org to markup their web pages and email messages. Many applications from Google, Microsoft, Pinterest, Yandex and others already use these vocabularies to power rich, extensible experiences.",
|
|
"Link": [
|
|
"https://schema.org"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"schema",
|
|
"identificaiton",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Scuttlebot": {
|
|
"Description": "\"Scuttlebot is an open source peer-to-peer log store used as a database, identity provider, and messaging system. It features global replication, file-syncronization, and end-to-end encryption.\n\na \"blockchain identity\" protocol avoiding a [singleton-based approach](https://scuttlebot.io/more/articles/design-challenge-avoid-centralization-and-singletons.html). It embraces subjectivity over consensus, e.g. each identity can publish messages that map their favorite pet name mappings for themselves and others. [Patchwork](https://ssbc.github.io/patchwork/) is a user-facing decentralized messaging and sharing app based on Scuttlebot.\" \u2014#peacekeeper",
|
|
"Link": [
|
|
"https://scuttlebot.io/"
|
|
],
|
|
"Tags": [
|
|
"scuttlebot",
|
|
"identification",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"app"
|
|
]
|
|
},
|
|
"SecureKey Technologies partners with IBM": {
|
|
"Description": "\"Las Vegas \u2013 IBM InterConnect\t- 20 Mar 2017: IBM (NYSE: IBM) and SecureKey Technologies today announced they are working together to enable a new digital identity and attribute sharing network based on IBM Blockchain. The network will be designed to make it easier for consumers to verify they are who they say they are, in a privacy-enhanced, security-rich and efficient way. When launched later this year, consumers can use the network to instantly verify their identity for services such as new bank accounts, driver's licenses or utilities.\"\n\n\"to build a digital identity and attribute sharing network for Canadian consumers, using the permissioned, private Hyperledger Fabric blockchain.-#peacekeeper",
|
|
"Link": [
|
|
"(http://securekey.com/",
|
|
"http://www-03.ibm.com/press/us/en/pressrelease/51841.wss"
|
|
],
|
|
"Tags": [
|
|
"securekey",
|
|
"blockchain-id",
|
|
"ibm",
|
|
"canada"
|
|
]
|
|
},
|
|
"SecureKey Technologies to explore interoperability between Verified.Me and Hyperledger Indy": {
|
|
"Description": "SecureKey Technologies, the developer of Verified.Me \u2013 a blockchain-based digital identity network built upon Hyperledger Fabric \u2013 today announces it will continue its leadership in establishing standards for next generation digital identity networks by exploring interoperability between Verified.Me and Hyperledger Indy-based identity projects.\n\nSecureKey is joining the Decentralized Identity Foundation (DIF) in efforts to advance standards-based initiatives for decentralized digital identity ecosystems. Already an active member of the open source collaborative effort, Hyperledger, SecureKey will also be highly involved in the Hyperledger Indy Project to explore integration points and projects between digital identity-focused platforms.",
|
|
"Link": [
|
|
"https://securekey.com/press-releases/hyperledger-indy/"
|
|
],
|
|
"Tags": [
|
|
"securekey",
|
|
"hyperledger",
|
|
"decentralized-id",
|
|
"indy",
|
|
"self-sovereign",
|
|
"verified-me",
|
|
"press-release"
|
|
]
|
|
},
|
|
"Self-Sovereign Identity = (individual control across any number of authorities)": {
|
|
"Description": "Self-Sovereign Identity p2pfoundation wiki",
|
|
"Link": [
|
|
"https://wiki.p2pfoundation.net/Self-Sovereign_Identity"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"101",
|
|
"blog"
|
|
]
|
|
},
|
|
"Self-Sovereign Identity Principles": {
|
|
"Description": "Existence. Control. Access. Transparency. Persistence. Portability. Interoperability. Consent. Minimalization. Protection.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/self-sovereign-identity/blob/master/self-sovereign-identity-principles.md"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"documentation"
|
|
]
|
|
},
|
|
"Self-Sovereign Identity Systems for Humanitarian Interventions\u2014A Case Study on Protective Cash Transfer Programs": {
|
|
"Description": "Situation: Information management enables humanitarian organizations to make adequate interventions based on timely, appropriate and trustworthy information. A crucial type of information are identities, because they can be used to assess vulnerability and efficiently manage aid distribution. Vulnerability determines who receives aid first because resources are always limited. This information is increasingly being stored and processed in identity systems. Complication: Most identity systems are centralized and produce analogue proofs of identity such as passports or ID cards. These systems are susceptible to privacy and data breaches. Centralization leads to single-points-of-failure and could lead to fraudulent behavior resulting in people lacking formal proofs of identity. In general there is limited interoperability between identity systems and limited collaboration between the owners of these systems. Approach: To create an interoperable and shared digital identity system using a Design Science Research strategy and systems engineering approach. This system must be distributed, protect privacy and put the identity owner in control of his or her data. The foundation of the system consists of Humanitarian Information Management principles, Privacy-by-Design principles and Self-Sovereign Identity principles. This research creates a functional blockchain based system, that enables identities for the use-case of Cash Transfer Programs. Results: We present a validated set of ten design decisions that represent the trade-offs that have been made and prescribe a blueprint for a technical design. Next steps: Future research should be done on how such a system could be implemented and used. This would require a process design approach that has to be developed, Also, elaborate research into user experience and user interfaces should be conducted.",
|
|
"Link": [
|
|
"https://repository.tudelft.nl/islandora/object/uuid:6cdb5450-9a81-47a9-8ffa-f9bd77c72448/datastream/OBJ1/download"
|
|
],
|
|
"Tags": [
|
|
"tu-delft",
|
|
"netherlands",
|
|
"research-paper",
|
|
"self-sovereign",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Self-Sovereign Identity: Why Blockchain?": {
|
|
"Description": "One of the most common questions I get when talking to customers and analysts about the self-sovereign identity (SSI) movement is, \"Why blockchain?\"",
|
|
"Link": [
|
|
"https://www.ibm.com/blogs/blockchain/2018/06/self-sovereign-identity-why-blockchain/"
|
|
],
|
|
"Tags": [
|
|
"ibm",
|
|
"self-sovereign",
|
|
"blog",
|
|
"blockchain-id",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Self-sovereign Identity \u2013\tOpportunities and Challenges for the Digital Revolution": {
|
|
"Description": "Uwe Der1, Stefan J\u00e4hnichen2,3, Jan S\u00fcrmeli2,3 \n\nAbstract. The interconnectedness of people, services and devices is a defining aspect of the digital revolution, and, secure digital identities are an important prerequisite for secure and legally compliant information exchange. Existing approaches to realize a secure identity management focus on central providers of identitiessuch as national authorities or online service providers. Hence, changing residence or service provider often means to start over and creating new identities, because procedures for data portability are missing. Self-sovereign digital identities are instead created and managed by individuals, and enable them to maintain their digital identities independent from residence, national eID infrastructure and market-dominating service providers. ",
|
|
"Link": [
|
|
"https://arxiv.org/pdf/1712.01767.pdf"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"research-article",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"SelfKey Depreciated?": {
|
|
"Description": "is a self-sovereign identity technology stack with an open source identity wallet for the identity owner, a marketplace with real products and services, a JSON-LD protocol, connection to 3rd party identity micro services, and a native token called \"KEY\" which enables the SelfKey ecosystem to exchange value and data.",
|
|
"Link": [
|
|
"https://selfkey.org/"
|
|
],
|
|
"Tags": [
|
|
"selfkey",
|
|
"self-sovereign",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Shocard": {
|
|
"Description": "Blockchain-Based Mobile Identity Platform",
|
|
"Link": [
|
|
"https://shocard.com/",
|
|
"http://shocard.com/wp-content/uploads/2018/01/ShoCard-Whitepaper-Dec13-2.pdf"
|
|
],
|
|
"Tags": [
|
|
"shocard",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"platform",
|
|
"whitepaper"
|
|
]
|
|
},
|
|
"Smart Consent Protocol": {
|
|
"Description": "Personal Data are valuable resources for creating digital intellectual property (IP). Rights over this IP have generally been unclear, resulting in systematic abuse or unfair use of people's personal data by third parties. But new regulations are changing this - most notably, the European Union General Data Protection Regulation (EU GDPR). Third parties must now obtain explicit and documented consent from people (data subjects) to collect, process, store or disclose their personal data. A specification for operationalising these regulatory requirements, using digital Consent Receipts, is being developed through the Consent and Information-Sharing Working Group of the Kantara Initiative. In a parallel effort, COALA-IP has developed a blockchain-ready, community-driven generic protocol for intellectual property licensing that applies the Linked Content Coalition (LCC) framework to 'unify digital rights data management'. This paper proposes a decentralised Smart Consent protocol for managing personal data as intellectual property that combines elements of the COALA-IP Specification for Digital Intellectual Property with the specification for Digital Consent Receipts.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/smart-consent-protocol.pdf",
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2016/blob/master/final-documents/smart-consent-protocol.docx"
|
|
],
|
|
"Tags": [
|
|
"ip",
|
|
"gdpr",
|
|
"regulations",
|
|
"rwot",
|
|
"blockchain-id",
|
|
"whitepaper"
|
|
]
|
|
},
|
|
"Smart Signatures": {
|
|
"Description": "Traditional cryptographic signature systems are based on strictly-defined authentication and authorization mechanisms that assume a single private key can be used to produce a given signature and that a single public key can be used to verify it. Given the evident limitations of this design, we propose an alternative with more powerful capabities, based on the ability to explicitly outline and fully program conditions for verification. These conditions would then be used to determine when a signature or set of signatures can be considered valid.\n\nOur inspiration for this authorization system is the bitcoin scripting language, where the authorization to spend funds is explicitly defined within a script, rather than being implicitly defined through the reference to an authorized public key. The largest benefit of explicit specification of authorization conditions is that the system is fully extensible, so new operations can be defined at any time, with the only limitation being the set of operations that the authorization interpreters understand. ",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust/blob/master/final-documents/smart-signatures.pdf"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"whitepaper",
|
|
"signatures",
|
|
"authentication",
|
|
"bitcoin",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Smarter Signatures: Experiments in Verifications": {
|
|
"Description": "Technologies like the Web of Trust and PKI lay the foundation for identity on the internet: they map a human persona to a cryptographic construct that is represented by a public key and protected by a private key. Digital signatures are fundamental to these digital identities and have been widely used in a variety of applications. They're the heart of SSH, the foundation of certificates, and the core of newer technologies like blockchain.\n\nHowever, today's simplistic signatures are just the start; they can be improved, to create more powerful and more complex signatures that can truly be better and smarter.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/requirements-for-dids.pdf",
|
|
"https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/smarter-signatures.docx"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"whitepaper",
|
|
"signatures",
|
|
"pki",
|
|
"decentralized-id",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"Sovrin": {
|
|
"Description": "Identity For All \u2014Permanent Digital Identities that Don't Require a Central Authority",
|
|
"Link": [
|
|
"https://sovrin.org/",
|
|
"https://forum.sovrin.org/",
|
|
"https://sovrin-slack-signup.herokuapp.com/"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"indy",
|
|
"organizations",
|
|
"forum",
|
|
"chat"
|
|
]
|
|
},
|
|
"Sovrin - Library": {
|
|
"Description": "White papers, research information, guides, and links to relevant third-party documentation.\n\nContains links to historical and current documentation",
|
|
"Link": [
|
|
"https://sovrin.org/library/"
|
|
],
|
|
"Tags": [
|
|
"evernym",
|
|
"sovrin",
|
|
"resources",
|
|
"self-sovereign",
|
|
"indy",
|
|
"decentralized-id",
|
|
"documentation"
|
|
]
|
|
},
|
|
"Sovrin Governance Framework": {
|
|
"Description": "The constitution of the Sovrin Network\u2014specifies the business, legal, and technical policies governing Sovrin as a global public utility.\nThe Sovrin Governance Framework V2 is now in public review\u2014see this page.\nThe original Sovrin Provisional Trust Framework was published on 28 Jun 2017.",
|
|
"Link": [
|
|
"https://sovrin.org/library/sovrin-governance-framework/"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"self-sovereign",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"Sovrin Network: What Goes on the Ledger?": {
|
|
"Description": "A white paper from Evernym in cooperation with the Sovrin Foundation. An overview of what is on the Sovrin Network distributed ledger and why.",
|
|
"Link": [
|
|
"https://sovrin.org/wp-content/uploads/2018/10/What-Goes-On-The-Ledger.pdf"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"whitepaper",
|
|
"evernym",
|
|
"documentation",
|
|
"self-sovereign",
|
|
"indy"
|
|
]
|
|
},
|
|
"Sovrin: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust": {
|
|
"Description": "A comprehensive, highly readable 40 page paper describing the complete Sovrin ecosystem, including the problems Sovrin is designed to solve; why it is designed to be a global public utility; how the overall architecture is designed for for resilience, privacy and scalability; the markets it is expected to impact; and the special role of the Sovrin token that will be introduced in 2018.",
|
|
"Link": [
|
|
"https://sovrin.org/wp-content/uploads/Sovrin-Protocol-and-Token-White-Paper.pdf"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"white-paper",
|
|
"documentation",
|
|
"protocol",
|
|
"indy",
|
|
"blockchain-id"
|
|
]
|
|
},
|
|
"Sovrin: digital identities in the blockchain era": {
|
|
"Description": "In this paper we describe a practical digital identity project of a global scale, which solves a number of privacy and scalability problems using the concepts of anony- mous credentials and permissioned blockchains. Even though both ideas have been known and developed for a number of years, our system appears to be the first amalgamation. The prototype has been developed, tested, and published as open source.",
|
|
"Link": [
|
|
"https://sovrin.org/library/sovrin-digital-identities-in-the-blockchain-era/"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"documentation",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"Sphere Identity": {
|
|
"Description": "Original website and link to whitepaper no longer available, not 100% sure that sphereidentity is the website for formerly \"Air Platform\" but it appears to be related.\n\n\"is a digital identity platform built on Hyperledger fabric, offering \"chaincode\" smart contracts and an API for third parties. It uses \"XID\" tokens based on the Bitcoin blockchain that are transfered upon successful identity transactions and trigger targeted advertising to the user. #peacekeeper",
|
|
"Link": [
|
|
"https://sphereidentity.com/",
|
|
"https://medium.com/@sphereidentity",
|
|
"https://github.com/mark-s/CryptoCoinWhitePapers/blob/master/Air_Platform_Whitepaper.pdf"
|
|
],
|
|
"Tags": [
|
|
"sphre",
|
|
"air-platform",
|
|
"sphere-identity",
|
|
"peacekeeper",
|
|
"business"
|
|
]
|
|
},
|
|
"Spidchain": {
|
|
"Description": "offers a platform for self-sovereign identity, including desktop and mobile apps for end-users. It uses Decentralized Identifiers (DIDs) - backed by optionally Bitcoin or Ethereum - to implement a marketplace for verifiable claims. The Spidchain applications allow individuals to create, recover, and revoke DIDs, to authenticate, to sign and verify files and claims, and more.",
|
|
"Link": [
|
|
"http://www.spidchain.com/",
|
|
"https://drive.google.com/file/d/0B89WE3IIHmy1Z0ZSSWVmVEtaaG8/view"
|
|
],
|
|
"Tags": [
|
|
"peacekeeper",
|
|
"spidchain",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"verifiable-claims"
|
|
]
|
|
},
|
|
"Swipe Right on Verifiably Credentials": {
|
|
"Description": "IBM's Trusted Identity team has just released its first public-facing proof-of-concept on top of a promising open-source project, Hyperledger Indy. Our PoC demonstrates a simple use case for verifiable credentials. The demo shows how a self-sovereign identity (SSI) can obtain credentials from an issuer and supply these credentials to a verifier in response to a proof request, thus providing a verifiable proof. Though just a small example of how verifiable credentials are exchanged in a Hyperledger Indy environment, it's a great way to learn and start planning your own solution using verifiable credentials.",
|
|
"Link": [
|
|
"https://developer.ibm.com/code/2018/05/22/swipe-right-on-verifiable-credentials/"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"ibm",
|
|
"sovrin",
|
|
"did",
|
|
"enterprise",
|
|
"indy",
|
|
"self-sovereign",
|
|
"did",
|
|
"blog"
|
|
]
|
|
},
|
|
"Syscoin": {
|
|
"Description": "by [Blockchain Foundry](http://www.blockchainfoundry.co/) offers an identity system that associates \"aliases\" with data and public keys. Aliases can be used for native Syscoin services such as sending coins and encrypted messages. Aliases can also provide identity to Bitcoin and Zcash users.",
|
|
"Link": [
|
|
"http://syscoin.org/"
|
|
],
|
|
"Tags": [
|
|
"syscoin",
|
|
"blockchain-foundry",
|
|
"aliases",
|
|
"bitcoin",
|
|
"zcash",
|
|
"blockchain-id",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"TOWARDS SELF-SOVEREIGN IDENTITY USING BLOCKCHAIN TECHNOLOGY": {
|
|
"Description": "With more than three billion internet users, each with multiple digital identities, the management of these identities is very important. Surveys show that people often use the identity management systems they don't want to use. They don't have full control over their information, have no way to know what is shared with other parties and are dependent on trusted parties when logging in to websites. Blockchain technology is used as basis for a secure and transparent distributed ledger for the Bitcoin cryptocurrency. Its decentralized, public and immutable properties solve the double spending problem and allow every participant of the network to read the transaction history, help in the validation process and pay and receive Bitcoin.\nCryptographically complex math ensures that everyone can do transactions with everyone without the need for a trusted third party. Nextto financial transactions, this also holds for other claims. Entities can put claims on a decentralized ledger by digitally signing it, which allows any other entity to verify that these claims are made by that specific entity.\nThis allows authorities like governments to make claims about individuals, which can be combined with other claims to create a very strong claim about someone. Because both the claimant and the claimee can be verified, this allows entities like mortgage lenders to outsource their Customer Due Diligence (CDD) processes.\nIn this research we will explore the possibility of self-sovereign identity, where you are in control of your digital identity. We started with a desk research on currently available identity man agement solutions. We concluded that in most systems, the end-user is not able to store their own data. Currently only one decentralized system is available, but has not gained wide adoption yet.\nA case study has been performed on a solution which allows the ex change of KYC attributes, resulting from thorough Customer Due Dili gence (CDD) as is often performed when opening a bank account. These attributes can be used by other entities, like insurance companies and mortgage lenders to make their on-boarding process easier for customers, since they don't need to supply copies of the same documentation all over again. Also, the companies themselves could outsource their Customer Due Diligence (CDD) this way to lower costs and make fewer errors. Although the idea is very interesting, the studied solution did not meet the expectations. At the time the company behind the solution was very small and the process to improve very complex. The solution was also proprietary, creating dependence on the vendor, which heightens the adoption barrier.\nBecause of the lessons learned from the case study, the results of the literature research and the desk research, we designed an architecture for a Decentralized Identity Management System (DIMS) using the concept of claim-based identity and blockchain technology. To lower adoption barriers and create a self-sustaining ecosystem, it will be developed on a public blockchain and source code will be made open-source. The solution will be privacy-friendly by using privacy-enhancing techniques and storing only claims about one's identity. We also provide a solution to allow retrieval of more sensitive data, and made it as modular as possible to make integration within existing IT architecture easier.\nThe Decentralized Identity Management System (DIMS) can be useful in a wide range of use cases, like proving your age when buying liquor at the supermarket or applying for a health insurance where you get a student discount if you can show your are enrolled at a university. This shows that our work resulted in a solid foundation for self-sovereign identity using blockchain technology.\u2014by D.S. Baars.",
|
|
"Link": [
|
|
"http://essay.utwente.nl/71274/"
|
|
],
|
|
"Tags": [
|
|
"research-paper",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"kyc"
|
|
]
|
|
},
|
|
"TU Delft helps develop digital ID for use on your phone": {
|
|
"Description": "In addition to your passport and driving licence, a phone application that enables you to prove your identity quickly and securely and also offers even more privacy options could soon be possible. As part of the Dutch Blockchain Coalition, Delft University of Technology (TU Delft, The Netherlands) has joined forces with the Netherlands Identity Data Agency (RvIG), a division of the Ministry of Foreign Affairs and Kingdom Relations (BZK), IDEMIA (the current manufacturer of Dutch passports) and law firm CMS, in developing an initial prototype for a digital stamp that could fulfil this purpose in the future. This digital identity is based on TU Delft's innovative blockchain technology, known as Trustchain. The prototype was demonstrated at a BZK event held on 7 June. After the summer, a consumer trial of this technology will be launched in two Dutch municipalities.",
|
|
"Link": [
|
|
"https://www.tudelft.nl/en/2018/tu-delft/tu-delft-helps-develop-digital-id-for-use-on-your-phone/"
|
|
],
|
|
"Tags": [
|
|
"tu-delft",
|
|
"netherlands",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"academic"
|
|
]
|
|
},
|
|
"Taqanu": {
|
|
"Description": "is opening the financial ecosystem for anyone by using a blockchain based digital ID to enable financial inclusion and create equal opportunities.",
|
|
"Link": [
|
|
"https://www.taqanu.com/"
|
|
],
|
|
"Tags": [
|
|
"taqanu",
|
|
"blockchain-id",
|
|
"humanitarian",
|
|
"id-app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"The Case for Decentralized Identity": {
|
|
"Description": "We cannot decentralize many interesting systems without also decentralizing the identity systems upon which they rely. We're finally in a position to create truly decentralized systems for digital identity.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2017/08/the_case_for_decentralized_identity.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"The DCS Theorem": {
|
|
"Description": "Blockchain design involves many tradeoffs, and much debate has focused on tradeoffs related to scaling parameters such as blocksize. To address some of the confusion around this subject, we present a probability proof of the _DCS Triangle_ [@McConaghy2016][@SlepaksTriangle]. We use the triangle to show decentralized consensus systems, like blockchains, can have _Decentralization_, _Consensus_, or _Scale_, but not all three properties simultaneously. We then describe two methods for getting around the limitations suggested by the triangle.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/dcs-theorem/The-DCS-Theorem.md"
|
|
],
|
|
"Tags": [
|
|
"consensus",
|
|
"rwot",
|
|
"whitepaper",
|
|
"theory"
|
|
]
|
|
},
|
|
"The Fermat project": {
|
|
"Description": "Founders of the Internet of People (#iop), an open, decentralized infrastructure consisting of device-to-device communication, blockchain tokens, profile servers, and other components.\"in June 2017, IoP switched from a centrally governed entity to a pure community project.\"",
|
|
"Link": [
|
|
"http://www.fermat.org/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"fermat",
|
|
"iop",
|
|
"decentralized-internet",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"The Future of Resilient Identity": {
|
|
"Description": "At Tykn, we help NGOs and governments help people better with Ana, our white-label identity management system for humanitarian aid, which comprises higher-order applications for aid distribution, greater project level metrics and the identification of beneficiaries.",
|
|
"Link": [
|
|
"https://tykn.tech/"
|
|
],
|
|
"Tags": [
|
|
"app",
|
|
"tykn",
|
|
"did",
|
|
"blockchain-id",
|
|
"self-sovereign",
|
|
"indy",
|
|
"permissioned",
|
|
"protocol",
|
|
"business",
|
|
"humanitarian"
|
|
]
|
|
},
|
|
"The Humanized Internet": {
|
|
"Description": "The Humanized Internet is working to use new technologies to defend the rights of vulnerable people, and give every human being worldwide secure, sovereign control over their own digital identity.\n\nbuilding a prototype of an identity-as-a-service platform, relying on a blockchain system, to store legal IDs, property titles, education certificates, and medical records. #peacekeeper",
|
|
"Link": [
|
|
"http://www.thehumanizedinternet.org/"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"humanized-internet",
|
|
"peacekeeper",
|
|
"organizations"
|
|
]
|
|
},
|
|
"The Knowledge Complexity Of Interactive Proofs": {
|
|
"Description": "Zero knowledge proof (ZKP) originally proposed in this 1985 paper",
|
|
"Link": [
|
|
"http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.419.8132&rep=rep1&type=pdf",
|
|
"http://imgur.com/pEes9KNl.png"
|
|
],
|
|
"Tags": [
|
|
"zkp",
|
|
"research-paper",
|
|
"academic",
|
|
"mit",
|
|
"privacy"
|
|
]
|
|
},
|
|
"The Path to Self-Sovereign Identity": {
|
|
"Description": "Christopher Allen is a standards and identity practice specialist at blockchain development startup Blockstream and a veteran developer who worked on the reference implementation of the SSL 3.0 protocol and its successor, TLS.\n\nIn this post, Allen discusses his vision for how blockchain could enable the creation of a 'self-sovereign identity'.",
|
|
"Link": [
|
|
"https://www.coindesk.com/path-self-sovereign-identity/amp/"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"christophera",
|
|
"history",
|
|
"decentralized-id",
|
|
"blog"
|
|
]
|
|
},
|
|
"The Path to Self-Soverereign Identity": {
|
|
"Description": "Today I head out to a month-long series of events associated with identity: I'm starting with the 22st (!) Internet Identity Workshop next week; then I'm speaking at the blockchain conference Consensus about identity; next I am part of the team putting together the first ID2020 Summit on Digital Identity at the United Nations; and finally I'm hosting the second #RebootingWebOfTrust design workshop on decentralized identity.",
|
|
"Link": [
|
|
"http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html"
|
|
],
|
|
"Tags": [
|
|
"christophera",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"sovrin",
|
|
"indy",
|
|
"history",
|
|
"101",
|
|
"blog"
|
|
]
|
|
},
|
|
"The Relationship Between Blockchain and Digital Identity": {
|
|
"Description": "\u2018Identity' is a word often used to mean subtly different things. The Oxford English Dictionary defines it succinctly as \u201cThe fact of being who or what a person or thing is\u201d; ISO29115 prefers the broader \u201cSet of attributes related to an entity\u201d.Identity, therefore is not a singular characteristic but rather a set of attributes that vary by relationship and moreover the plurality of these relationships can enhance the confidence level that the identity being asserted is genuine through corroboration.",
|
|
"Link": [
|
|
"http://www.gsma.com/personaldata/the-relationship-between-blockchain-and-digital-identity"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"blog",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"The Rise of Self-Sovereign Identity - Hyperledger Indy": {
|
|
"Description": "On the Internet, anyone can represent any identity, and it's difficult to verify those identities. Think of an organization that needs to track the activities of thousands of employees who work from all around the world. This can be a headache for the management. That's how identity management became a fundamental requirement for any computer system. You can find the key terms related to identity management in the Additional Info section at the end of this blog.",
|
|
"Link": [
|
|
"https://wso2.com/blog/research/the-rise-of-self-sovereign-identity-hyperledger-indy"
|
|
],
|
|
"Tags": [
|
|
"hyperledger",
|
|
"indy",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"blog"
|
|
]
|
|
},
|
|
"The Sovrin Foundation": {
|
|
"Description": "This article describes the role that the Sovrin Foundation and associated groups play in governing, operating, and using the Sovrin Network. The Sovrin Network is designed and intended to be decentralized so understanding the key influence points and community groups is important.",
|
|
"Link": [
|
|
"http://www.windley.com/archives/2018/07/the_sovrin_foundation.shtml"
|
|
],
|
|
"Tags": [
|
|
"sovrin",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"windley",
|
|
"blog"
|
|
]
|
|
},
|
|
"The Three Models of Digital Identity Relationships \u2014 How self-sovereign identity (SSI) is different, and why it's better.": {
|
|
"Description": "As a relative \"noob\" in the identity world\u200a\u2014\u200afive years and counting\u200a\u2014\u200ait may seem presumptuous for me to distill all the types of digital identity relationships into just three models. But it needs doing.",
|
|
"Link": [
|
|
"https://medium.com/evernym/the-three-models-of-digital-identity-relationships-ca0727cb5186"
|
|
],
|
|
"Tags": [
|
|
"evernym",
|
|
"self-sovereign",
|
|
"decentralized-id",
|
|
"blog"
|
|
]
|
|
},
|
|
"The W3C Credentials Community Group": {
|
|
"Description": "The mission of the W3C Credentials Community Group is to explore the creation, storage, presentation, verification, and user control of credentials. We focus on a verifiable credential (a set of claims) created by an issuer about a subject\u2014a person, group, or thing\u2014and seek solutions inclusive of approaches such as: self-sovereign identity; presentation of proofs by the bearer; data minimization; and centralized, federated, and decentralized registry and identity systems. Our tasks include drafting and incubating Internet specifications for further standardization and prototyping and testing reference implementations.",
|
|
"Link": [
|
|
"https://w3c-ccg.github.io/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"credentials",
|
|
"did",
|
|
"verifiable-claims",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"organizations",
|
|
"documentation"
|
|
]
|
|
},
|
|
"The promise of managing identity on the blockchain": {
|
|
"Description": "Imagine a world where you are in direct control of your personal information; a world where you can limit and control how much information you share while retaining the ability to transact in the world. This is self-sovereign identity, and it is already here. Blockchain is the underlying technology paving the path to self-sovereign identity through decentralized networks. It ensures privacy and trust, where transactions are secure, authenticated and verifiable and endorsed by relevant, permissioned participants,' Jerry Cuomo - IBM.",
|
|
"Link": [
|
|
"https://techcrunch.com/2017/09/10/the-promise-of-managing-identity-on-the-blockchain/"
|
|
],
|
|
"Tags": [
|
|
"101",
|
|
"blockchain-id",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"blog",
|
|
"ibm",
|
|
"quote"
|
|
]
|
|
},
|
|
"Tierion": {
|
|
"Description": "offers an API that uses the [Chainpoint](https://chainpoint.org/) standard to record proofs on a blockchain that data was recorded at a specific time. Among many other uses, this includes the ability to anchor verifiable records of customer data to optimize KYC processes.",
|
|
"Link": [
|
|
"https://tierion.com/"
|
|
],
|
|
"Tags": [
|
|
"tierion",
|
|
"chainpoint",
|
|
"kyc",
|
|
"identification",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Tradle": {
|
|
"Description": "offers a \"global trust provisioning network\" to provide blockchain-based KYC functionality for both \"intrabank\" and \"external\" transfers. Mobile and web interfaces as well as bots are available for both customers and employees of financial institutions.",
|
|
"Link": [
|
|
"https://tradle.io/",
|
|
"https://github.com/tradle/mycloud"
|
|
],
|
|
"Tags": [
|
|
"kyc",
|
|
"blockchain-id",
|
|
"tradle",
|
|
"decentralized-id",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Transforming our world: the 2030 Agenda for Sustainable Development": {
|
|
"Description": "That document details 17 sustainable development goals with 169 specific points between them. The overarching mission contained within these goals, \"to achieving sustainable development in its three dimensions \u2013 economic, social and environmental \u2013 in a balanced and integrated manner.\" Prominently among the agenda's goals is providing proper identification to the world, by 2030.",
|
|
"Link": [
|
|
"https://sustainabledevelopment.un.org/post2015/transformingourworld"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"un",
|
|
"sdg",
|
|
"state"
|
|
]
|
|
},
|
|
"Trusted Key": {
|
|
"Description": "is a self-sovereign digital identity platform based on Ethereum. It offers a secure mobile identity wallet and REST API web services that enable definitive user identity verification, password-less login, as well as identity fraud prevention via secure transaction and document signing. The design supports handling lost, stolen or new device scenarios without having to trust any other party.",
|
|
"Link": [
|
|
"https://www.trustedkey.com/",
|
|
"https://trustedkey.github.io/RelyingParty-Tutorial/#introduction"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"eth-app",
|
|
"blockchain-id",
|
|
"trustedkey",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Tykn: Extended Overview": {
|
|
"Description": "So far, we have identified three (3) key issues that we are seeking to resolve:\n\n1. Paper-based identification leading to costly paper trails, fraud and low interoperability of vital records, not to mention the 230 million invisible children around the globe, and the lack of both social and financial inclusion amongst vulnerable populations.\n2.Lack of resilience in identifying documents due to heavy centralisation leading to weakened communities when struck by man-made or natural disasters.\n3.Insufficient knowledge of Blockchain/Distributed Ledger Technologies within the government, municipalities and (non-)governmental organisations.",
|
|
"Link": [
|
|
"https://docs.google.com/document/d/1pNRO6aOb5eK4s8PVv7yS4x9TkqrGglCJ4jebU1F3Yzo/edit#"
|
|
],
|
|
"Tags": [
|
|
"tykn",
|
|
"sovrin",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"did",
|
|
"indy",
|
|
"permissioned",
|
|
"documentation",
|
|
"humanitarian"
|
|
]
|
|
},
|
|
"UBIC": {
|
|
"Description": "cryptocurrency that distributes a Universal Basic Income to participants after they scan the NFC chip of their E-Passport.",
|
|
"Link": [
|
|
"https://github.com/UBIC-repo/core"
|
|
],
|
|
"Tags": [
|
|
"ubi",
|
|
"peacekeeper",
|
|
"identification"
|
|
]
|
|
},
|
|
"Veres One DID Method 1.0": {
|
|
"Description": "The Veres One Ledger is a permissionless public ledger designed specifically for the creation and management of decentralized identifiers (DIDs). Veres One DIDs are self-sovereign identifiers that may be used by people, organizations, and digital devices to establish an identifier that is under their control. Veres One DIDs are useful in ecosystems where one needs to issue, store, and use Verifiable Claims. This specification defines how a developer may create and update DIDs in the Veres One Ledger.",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/did-method-veres-one.md"
|
|
],
|
|
"Tags": [
|
|
"did",
|
|
"w3c",
|
|
"rwot",
|
|
"whitepaper",
|
|
"blockchain-id",
|
|
"public-permissionless",
|
|
"self-sovereign"
|
|
]
|
|
},
|
|
"Verifiable Claims Data Model 1.0": {
|
|
"Description": "Credentials are a part of our daily lives; driver's licenses are used to assert that we are capable of operating a motor vehicle, university degrees can be used to assert our level of education, and government-issued passports enable holders to travel between countries. This specification provides a mechanism to express these sorts of credentials on the Web in a way that is cryptographically secure, privacy respecting, and machine verifiable.",
|
|
"Link": [
|
|
"https://w3c.github.io/vc-data-model/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"specs",
|
|
"credentials",
|
|
"did",
|
|
"rwot",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Verifiable Claims Data Model and Representations specification": {
|
|
"Description": "This specification describes a data model for a digital entity profile and a collection of digital entity credentials that assert verifiable claims about that entity profile. It also describes how to express that data model in JSON and JSON-LD.\n\nWe encourage contributions meeting the Contribution Guidelines. While we prefer the creation of issues and Pull Requests in the GitHub repository, discussions often occur on the public-vc-wg mailing list as well.",
|
|
"Link": [
|
|
"https://github.com/w3c/vc-data-model"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"github",
|
|
"verifiable-claims",
|
|
"did",
|
|
"code"
|
|
]
|
|
},
|
|
"Verifiable Claims Use Cases 1.0": {
|
|
"Description": "A verifiable claim is a qualification, achievement, quality, or piece of information about an entity's background such as a name, government ID, payment provider, home address, or university degree. Such a claim describes a quality or qualities, property or properties of an entity which establish its existence and uniqueness. The use cases outlined here are provided in order to make progress toward possible future standardization and interoperability of both low and high-stakes claims with the goals of storing, transmitting, and receiving digitally verifiable proof of attributes such as qualifications and achievements. The use cases in this document focus on concrete scenarios that the technology defined by the group should address.",
|
|
"Link": [
|
|
"https://w3c.github.io/vc-use-cases/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"specs",
|
|
"verifiable-claims",
|
|
"did",
|
|
"rwot",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"Verifiable Claims Working Group": {
|
|
"Description": "The mission of the Verifiable Claims Working Group (VCWG) is to make expressing and exchanging credentials that have been verified by a third party easier and more secure on the Web.",
|
|
"Link": [
|
|
"https://www.w3.org/2017/vc/WG/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"credentials",
|
|
"did",
|
|
"verifiable-claims",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"organizations",
|
|
"documentation"
|
|
]
|
|
},
|
|
"Verifiable Claims Working Group Charter": {
|
|
"Description": "It is currently difficult to express banking account information, education qualifications, healthcare data, and other sorts of machine-readable personal information that has been verified by a 3rd party on the Web. These sorts of data are often referred to as verifiable claims. The mission of the Verifiable Claims Working Group is to make expressing, exchanging, and verifying claims easier and more secure on the Web. This charter focuses on use cases for education.",
|
|
"Link": [
|
|
"https://www.w3.org/2017/vc/charter.html"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"credentials",
|
|
"did",
|
|
"verifiable-claims",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"documentation"
|
|
]
|
|
},
|
|
"Verified Organization Network": {
|
|
"Description": "is an initiative by the government of British Columbia to create a trusted network of organizational data. It allows organizations to claim credentials that are part of their own digital identity, using a component called [TheOrgBook](https://github.com/bcgov/theorgbook) that lists entities with their associated public verifiable claims.",
|
|
"Link": [
|
|
"https://vonx.io/",
|
|
"https://github.com/bcgov/von",
|
|
"https://github.com/bcgov/theorgbook"
|
|
],
|
|
"Tags": [
|
|
"bc-gov",
|
|
"canada",
|
|
"verifiable-claims",
|
|
"von",
|
|
"w3c",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"VerifyUnion": {
|
|
"Description": "VerifyUnion provides total ownership of the data that is stored, from the network through to the customer (end user), while protecting user privacy and securing documents and identity. \n\n\"is building a platform for \"unique user profiles\" based on verified digital information, social profiles and financial details, leading to a \"social score\". Tokens based on Ethereum are designed to incentivize users to both supply and evaluate personal data for verification.\" -#peacekeeper",
|
|
"Link": [
|
|
"https://verifyunion.io/",
|
|
"https://icoinform.com/uploads/pdf/9e1089c29a2bdc3d91584d72662b831d.pdf"
|
|
],
|
|
"Tags": [
|
|
"verifyunion",
|
|
"blockchain-id",
|
|
"eth-app",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"Vida Identity": {
|
|
"Description": "VIDA combines advanced threshold cryptography with unbeatable ease-of-use to make securing and accessing your most important files a breeze, not a chore.\n\nwas: 'vidaidentity.com' \"is a blockchain identity and authentication platform that enables distributed key revocation and reissuance. Access to data is always permissioned across applications and services.\" \u2014#peacekeeper",
|
|
"Link": [
|
|
"https://getvida.io"
|
|
],
|
|
"Tags": [
|
|
"vida-id",
|
|
"getvida",
|
|
"blockchain-id",
|
|
"peacekeeper",
|
|
"personal-data-wallet"
|
|
]
|
|
},
|
|
"WISeKey fully deployed its CertifyID integrating Digital Identity with Blockchain technology": {
|
|
"Description": "WISeKey fully deployed its CertifyID integrating Digital Identity with Blockchain technology\n\n\u00b7 CertifyID acts as a Digital Identity dual factor authentication based technology that sits on top of a BlockChain\n\u00b7 WISeKey Digital Identity BlockChain platform is assisting United Nations' Sustainable Development Goals aiming to provide every person on the planet with a legal digital identity by 2030\n\u00b7 Having a legal digital identity is a basic human right",
|
|
"Link": [
|
|
"https://globenewswire.com/news-release/2018/07/11/1535718/0/en/WISeKey-fully-deployed-its-CertifyID-integrating-Digital-Identity-with-Blockchain-technology.html"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"wisekey",
|
|
"certifyid",
|
|
"press-release"
|
|
]
|
|
},
|
|
"WebofTrust - Self Sovereign ID - Github": {
|
|
"Description": "Articles and documents associated with designing and implementing identity technology using self-sovereign identity principle",
|
|
"Link": [
|
|
"https://github.com/WebOfTrustInfo/self-sovereign-identity"
|
|
],
|
|
"Tags": [
|
|
"rwot",
|
|
"organizations",
|
|
"documenation",
|
|
"blockstack",
|
|
"w3c",
|
|
"sovrin",
|
|
"indy",
|
|
"did",
|
|
"verifiable-claims",
|
|
"evernym",
|
|
"microsoft",
|
|
"blockstream",
|
|
"ipfs",
|
|
"netki",
|
|
"tieron",
|
|
"id2020",
|
|
"un",
|
|
"iiw"
|
|
]
|
|
},
|
|
"What is 'Sovereign Source Authority'?": {
|
|
"Description": "What is an Individual Human Being prior to \"identity registration\" in Society? What is the data administration framework of default participation in Society today?\n\nSociety is an Agreement. It is made by and between Individuals. Within any Society, Individuals have an established Right to an \"identity\", and to all of the benefits and responsibilities of some form of \"Nationally Sovereign Structure\" of governance and administration. Sovereign Source Authority (SSA) refers to the actual default design parameter of Human identity, prior to the \"registration\" process used to inaugurate participation in Society.",
|
|
"Link": [
|
|
"https://www.moxytongue.com/2012/02/what-is-sovereign-source-authority.html"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"history",
|
|
"blog"
|
|
]
|
|
},
|
|
"When GDPR Becomes Real, and Blockchain is no longer fairydust": {
|
|
"Description": "The General Data Protection Regulation (GDPR) enacted by the European Parliament in 2016 was designed to give users more control and rights over their personal data. Companies and governments will find it increasingly difficult to be GDPR compliant with current industry practices. Once it becomes enforceable in 2018, managing data will be both toxic and expensive. Many precious resources will be required for improving and maintaining the security, privacy, and governance of personal data. Methods for storing less personal data will ease the burden of GDPR compliance. This document explores describes what GDPR requirements are, what are the different approaches to digital identity solutions and finally explains why a distributed ledger technology may offer an opportunity to enterprises for simpler data management solutions that are GDPR compliant.",
|
|
"Link": "https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-fall2017/blob/master/final-documents/gdpr.md",
|
|
"Tags": [
|
|
"rwot",
|
|
"gdpr",
|
|
"regulations",
|
|
"blockchain-id",
|
|
"whitepaper",
|
|
"decentralized-id"
|
|
]
|
|
},
|
|
"White Paper: Canada's Digital ID Future - A Federated Approach": {
|
|
"Description": "In this brief, we highlight why Canada needs a digital identity system, how other countries have made progress in this area and the lessons we can learn from those experiences to build a system in Canada.",
|
|
"Link": [
|
|
"https://www.cba.ca/embracing-digital-id-in-canada"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"canada",
|
|
"whitepaper"
|
|
]
|
|
},
|
|
"World Identity Netowork \u2014Blockchain for Impact": {
|
|
"Description": "We are a team of global advocates, human rights activists, technologists and innovators who believe that everyone needs the ability to access proof of their personal identity. Anywhere, anytime.",
|
|
"Link": [
|
|
"https://win.systems/"
|
|
],
|
|
"Tags": [
|
|
"blockchain-id",
|
|
"decentralized-id",
|
|
"win",
|
|
"organizations",
|
|
"BFI"
|
|
]
|
|
},
|
|
"XDI Registry": {
|
|
"Description": "The non-profit organization XDI.org has designed a blockchain-based registry for human-readable names and machine-readable numbers.",
|
|
"Link": [
|
|
"https://docs.google.com/document/d/1i-XChGFsuAi-Id85FWXjX6hOWDn9Sq-qe7ARykJgsBI/"
|
|
],
|
|
"Tags": [
|
|
"xdi",
|
|
"identification",
|
|
"peacekeeper",
|
|
"application",
|
|
"protocol"
|
|
]
|
|
},
|
|
"Zug ID: Exploring the First Publicly Verified Blockchain Identity": {
|
|
"Description": "We recently announced our cooperation with the Swiss City of Zug and local development partner ti&m to introduce the world's first live implementation of a self-sovereign government issued identity on Ethereum. Thus far, more than 50 citizens in Zug have successfully verified their uPort identity in person with the City, enabling them to access a new suite of e-government services in a trusted and self-reliant manner. With all the excitement around this launch, we wanted to outline for all of you the underlying mechanics of the Zug identity verification system, the benefits this provides for various stakeholders, as well as future use cases and its evolution.",
|
|
"Link": [
|
|
"https://medium.com/uport/zug-id-exploring-the-first-publicly-verified-blockchain-identity-38bd0ee3702"
|
|
],
|
|
"Tags": [
|
|
"zug-id",
|
|
"decentralized-id",
|
|
"uport",
|
|
"zug",
|
|
"state"
|
|
]
|
|
},
|
|
"uPort": {
|
|
"Description": "A Consensys developed blockchain-based, self-sovereign identity system",
|
|
"Link": [
|
|
"https://www.uport.me/",
|
|
"http://www.ibtimes.co.uk/ethereum-studio-consensys-launches-internet-people-digital-ids-assets-secured-unbuntu-phones-1542620"
|
|
],
|
|
"Tags": [
|
|
"self-sovereign",
|
|
"uport",
|
|
"blockchain-id",
|
|
"erc-725",
|
|
"decentralized-id",
|
|
"peacekeeper",
|
|
"protocol"
|
|
]
|
|
},
|
|
"uPort \u2014 Year in Review. What's to come in 2018": {
|
|
"Description": "2017 was a landmark year for the entire Ethereum ecosystem. The same can be said for the uPort platform. We began the year with the initial launch of the uPort ID alpha program, getting our mobile identity wallet into the hands of thousands of users over the course of the year. ",
|
|
"Link": [
|
|
"https://medium.com/uport/uport-year-in-review-whats-to-come-in-2018-15ccb9214439"
|
|
],
|
|
"Tags": [
|
|
"decentralized-id",
|
|
"uport",
|
|
"eth-app",
|
|
"self-sovereign",
|
|
"blog"
|
|
]
|
|
},
|
|
"w3c- Decentralized Identifiers (DIDs) v0.11": {
|
|
"Description": "Decentralized Identifiers are a new type of identifier intended for digital identity that is \"self-sovereign\", i.e, fully under the control of the identity owner. DIDs resolve to DDOs (DID descriptor objects) and can be registered in different blockchains (using different \"methods\").",
|
|
"Link": [
|
|
"https://w3c-ccg.github.io/did-spec/"
|
|
],
|
|
"Tags": [
|
|
"w3c",
|
|
"did",
|
|
"decentralized-id",
|
|
"self-sovereign",
|
|
"blockchain-id",
|
|
"documentation",
|
|
"rwot",
|
|
"specs",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"zkp.science": {
|
|
"Description": "Zero-Knowledge Proofs\n\nWhat are they, how do they work, and are they fast yet?",
|
|
"Link": [
|
|
"https://zkp.science"
|
|
],
|
|
"Tags": [
|
|
"privacy",
|
|
"zkp",
|
|
"decentralized-id",
|
|
"blockchain-id",
|
|
"blog",
|
|
"documentation"
|
|
]
|
|
},
|
|
"\u00c6TERNITY": {
|
|
"Description": "is a novel blockchain focusing on improved smart contract capabilities such as better scalability and easier integration of off-chain data. It uses value tokens called \"aeons\". It offers an identity architecture where every account has a unique ID number, and unique names can be registered and linked to arbitrary data such as addresses on the blockchain. Schema.org's data structures are used for representing data about persons and organizations.",
|
|
"Link": [
|
|
"http://aeternity.com/",
|
|
"https://github.com/aeternity/protocol"
|
|
],
|
|
"Tags": [
|
|
"smart-contract-platform",
|
|
"blockchain-id",
|
|
"identification",
|
|
"oracles",
|
|
"schema",
|
|
"peacekeeper"
|
|
]
|
|
},
|
|
"\u00c6VATAR": {
|
|
"Description": "is a cooperative originating in France and established in several different countries that works on delivering self-sovereign identity technologies, using distributed ledger technology and verified claims. It is guided by various regulations and principles such as the GDPR, eIDAS, the UN's ID2020 objectives, and the CEN Workshop 84 standardization body.\n\nDead Link 11/12",
|
|
"Link": [
|
|
"http://aevatar.com/"
|
|
],
|
|
"Tags": [
|
|
"aevatar",
|
|
"gdpr",
|
|
"regulations",
|
|
"id2020",
|
|
"france",
|
|
"un",
|
|
"peacekeeper",
|
|
"depreciated",
|
|
"peacekeeper"
|
|
]
|
|
}
|
|
}
|