Methods for Decentralized Identities: Evaluation and Insights

Recent technological shifts have pressured businesses to reshape the way they operate and transact. At the hart of this restructuring, identity management established itself as an essential building block in both B2C and B2B business models. Trustworthy identities may refer to customers, businesses, suppliers or assets, and enable trusted communications between different actors. Unfortunately, traditional identity management systems rely on centralized architectures and trust in third party services. With the inception of blockchain technology, new methods for managing identity emerged, which promise better decentralization and self-sovereignty. This paper provides an evaluation of a selection of distributed identity methods, and analyzes their properties based on the categorization specified in the W3C recommendation rubric.

[1]  Vivien Quéma,et al.  RBFT: Redundant Byzantine Fault Tolerance , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[2]  Prateek Saxena,et al.  Making Smart Contracts Smarter , 2016, IACR Cryptol. ePrint Arch..

[3]  Hans Klein,et al.  ICANN and Internet Governance: Leveraging Technical Coordination to Realize Global Public Policy , 2002, Inf. Soc..

[4]  Edgar R. Weippl,et al.  Revisiting Practical Byzantine Fault Tolerance Through Blockchain Technologies , 2019, Security and Quality in Cyber-Physical Systems Engineering.

[5]  Nitin Naik,et al.  uPort Open-Source Identity Management System: An Assessment of Self-Sovereign Identity and User-Centric Data Platform Built on Blockchain , 2020, 2020 IEEE International Symposium on Systems Engineering (ISSE).

[6]  Bernardo Magri,et al.  Redactable Blockchain in the Permissionless Setting , 2019, 2019 IEEE Symposium on Security and Privacy (SP).

[7]  Peter Mell,et al.  A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems , 2019, ArXiv.

[8]  Massimo Bartoletti,et al.  An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.

[9]  Christoph Meinel,et al.  A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..