Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion

After introducing key concepts and definitions in the field of digital identity, this paper will investigate the benefits and drawbacks of existing identity systems on the road toward achieving self-sovereign identity. It will explore, in particular, the use of blockchain technology and biometrics as a means to ensure the “unicity” and “singularity” of identities, and the associated challenges pertaining to the security and confidentiality of personal information. The paper will then describe an alternative approach to self-sovereign identity based on a system of blockchain-based attestations, claims, credentials, and permissions, which are globally portable across the life of an individual. While not dependent on any particular government or organization for administration or legitimacy, credentials and attestations might nonetheless include government-issued identification and biometrics as one of many indicia of identity. Such a solution—based on a recorded and signed digital history of attributes and activities—best approximates the fluidity and granularity of identity, enabling individuals to express only specific facets of their identity, depending on the parties with whom they wish to interact. To illustrate the difficulties inherent in the implementation of a self-sovereign identity system in the real world, the paper will focus on two blockchain-based identity solutions as case studies: (1) Kiva's identity protocol for building credit history in Sierra Leone, and (2) World Food Programme's Building Blocks program for delivering cash aid to refugees in Jordan. Finally, the paper will explore how the combination of blockchain-based cryptocurrencies and self-sovereign identity may contribute to promoting greater economic inclusion. With digital transactions functioning as identity claims within an ecosystem based on self-sovereign identity, new business models might emerge, such as identity insurance schemes, along with the emergence of value-stable cryptocurrencies (“stablecoins”) functioning as local currencies.

[1]  P. Eakin How our lives become stories : making selves , 2019 .

[2]  Mehmet Aydar,et al.  Towards a Blockchain based digital identity verification, record attestation and record sharing system , 2019, ArXiv.

[3]  Mohamed Dâfir Ech-Cherif El Kettani,et al.  Analysis of Identity Management Systems Using Blockchain Technology , 2019, 2019 International Conference on Advanced Communication Technologies and Networking (CommNet).

[4]  Alex Pentland,et al.  Verifiable Anonymous Identities and Access Control in Permissioned Blockchains , 2019, ArXiv.

[5]  Primavera De Filippi,et al.  Blockchain and the Law , 2018 .

[6]  Christoph Meinel,et al.  A Survey on Essential Components of a Self-Sovereign Identity , 2018, Comput. Sci. Rev..

[7]  Paco Garcia,et al.  Biometrics on the blockchain , 2018 .

[8]  A. Wright,et al.  Blockchain and the Law: The Rule of Code , 2018 .

[9]  Jim Canham Biometrics: leap of faith or fact of life? , 2018 .

[10]  Fabien A. P. Petitcolas,et al.  A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.

[11]  John Callahan,et al.  The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity , 2017, 2018 International Joint Conference on Neural Networks (IJCNN).

[12]  Jouni Markkula,et al.  EU General Data Protection Regulation: Changes and implications for personal data collecting companies , 2017, Comput. Law Secur. Rev..

[13]  Pascale Bronder,et al.  Blockchain—Powering and Empowering the Poor in Developing Countries , 2018 .

[14]  R. Allen,et al.  Leapfrogging Banks in Emerging Markets , 2018 .

[15]  Andrea Freund,et al.  Automated, Decentralized Trust: A Path to Financial Inclusion , 2018 .

[16]  Stefan Jähnichen,et al.  Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution , 2017, ArXiv.

[17]  B. Mcdonald,et al.  Designing a Global Digital Currency , 2017, Journal of International Money and Finance.

[18]  David Gerard,et al.  Attack of the 50 Foot Blockchain: Bitcoin, Blockchain, Ethereum & Smart Contracts , 2017 .

[19]  Joshua Knobe,et al.  The True Self: A Psychological Concept Distinct From the Self , 2017, Perspectives on psychological science : a journal of the Association for Psychological Science.

[20]  Laura Ricci,et al.  Blockchain Based Access Control , 2017, DAIS.

[21]  Johan A. Pouwelse,et al.  Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems , 2017, ArXiv.

[22]  Michel Rauchs,et al.  2017 Global Cryptocurrency Benchmarking Study , 2017 .

[23]  Quoc Khanh Nguyen,et al.  Blockchain - A Financial Technology for Future Sustainable Development , 2016, 2016 3rd International Conference on Green Technology and Sustainable Development (GTSD).

[24]  Primavera De Filippi,et al.  The Invisible Politics of Bitcoin: Governance Crisis of a Decentralized Infrastructure , 2016 .

[25]  Primavera de Filippi,et al.  The Interplay between Decentralization and Privacy: The Case of Blockchain Technologies , 2016 .

[26]  J. Potts,et al.  Economics of Blockchain , 2016 .

[27]  Mario Baum,et al.  Handbook Of Biometrics , 2016 .

[28]  D. Baars Towards self-sovereign identity using blockchain technology , 2016 .

[29]  Primavera De Filippi,et al.  Decentralized Blockchain Technology and the Rise of Lex Cryptographia , 2015 .

[30]  Primavera de Filippi Translating Commons-Based Peer Production Values into Metrics: Towards Commons-Based Crypto-Currencies , 2015 .

[31]  Kai Rannenberg,et al.  Attribute-based Credentials for Trust: Identity in the Information Society , 2014 .

[32]  S. Sarkar The Unique Identity (UID) Project, Biometrics and Re-Imagining Governance in India , 2014 .

[33]  Woo Chaw Seng,et al.  A review of biometric technology along with trends and prospects , 2014, Pattern Recognit..

[34]  Peter H. Gleick,et al.  Water, Drought, Climate Change, and Conflict in Syria , 2014 .

[35]  Primavera De Filippi,et al.  Bitcoin: A Regulatory Nightmare to a Libertarian Dream , 2014 .

[36]  Darlington,et al.  The Future of Bitcoin: Mapping the Global Adoption of World’s Largest Cryptocurrency Through Benefit Analysis , 2014 .

[37]  Marina Blanton,et al.  Secure Multiparty Computation , 2011, Encyclopedia of Cryptography and Security.

[38]  Patrizio Campisi,et al.  Security and Privacy in Biometrics , 2013, Springer London.

[39]  J. Christman Social Practical Identities and the Strength of Obligation , 2013 .

[40]  Stark C. Draper,et al.  Secure Biometrics: Concepts, Authentication Architectures, and Challenges , 2013, IEEE Signal Processing Magazine.

[41]  Eleni Kosta Consent in European Data Protection Law , 2013, Nijhoff studies in EU law.

[42]  Amit Sahai,et al.  Secure Multi-Party Computation , 2013 .

[43]  Ghassan O. Karame,et al.  Evaluating User Privacy in Bitcoin , 2013, Financial Cryptography.

[44]  Anil K. Jain,et al.  Biometric Authentication: System Security and User Privacy , 2012, Computer.

[45]  Lee A. Bygrave,et al.  The Data Difficulty in Database Protection , 2012 .

[46]  Minhaz Fahim Zibran,et al.  Biometric Authentication : The Security Issues , 2012 .

[47]  M. A. Woolson Security, Risk and the Biometric State: Governing Borders and Bodies (review) , 2012 .

[48]  The Mobile Money Movement: Catalyst to Jump-Start Emerging Markets , 2011, Innovations: Technology, Governance, Globalization.

[49]  Rajeev Motwani,et al.  Distributing data for secure database services , 2011, PAIS '11.

[50]  C. Borio,et al.  Global Imbalances and the Financial Crisis: Reassessing the Role of International Finance , 2010 .

[51]  Benjamin K. Ngugi,et al.  M‐pesa: A Case Study of the Critical Early Adopters’ Role in the Rapid Adoption of Mobile Money Banking in Kenya , 2010, Electron. J. Inf. Syst. Dev. Ctries..

[52]  Edgar A. Whitley,et al.  Global Identity Policies and Technology: Do we Understand the Question? , 2010 .

[53]  Elisa Bertino,et al.  Biometrics-based identifiers for digital identity management , 2010, IDTRUST '10.

[54]  Benjamin J Muller Security, Risk and the Biometric State: Governing Borders and Bodies , 2010 .

[55]  Anil K. Jain,et al.  Biometric template transformation: a security analysis , 2010, Electronic Imaging.

[56]  Luís A. Alexandre,et al.  Iris recognition: Analysis of the error rates regarding the accuracy of the segmentation stage , 2010, Image Vis. Comput..

[57]  B. Barak Fully Homomorphic Encryption and Post Quantum Cryptography , 2010 .

[58]  Nicolae Duta,et al.  A survey of biometric technology based on hand shape , 2009, Pattern Recognit..

[59]  Thad E. Hall,et al.  Internet Voting in Comparative Perspective: The Case of Estonia , 2009, PS: Political Science & Politics.

[60]  Craig Gentry,et al.  A fully homomorphic encryption scheme , 2009 .

[61]  E. Mordini,et al.  Body, Biometrics and Identity , 2008, Bioethics.

[62]  B. Jenkins Developing mobile money ecosystems , 2008 .

[63]  Peter Schartner,et al.  Unique User-Generated Digital Pseudonyms , 2005, MMM-ACNS.

[64]  Lee Luan Ling,et al.  User authentication through typing biometrics features , 2004, IEEE Transactions on Signal Processing.

[65]  A. Jøsang,et al.  User Centric Identity Management , 2005 .

[66]  Arun Ross,et al.  Multimodal biometrics: An overview , 2004, 2004 12th European Signal Processing Conference.

[67]  Arun Ross,et al.  Biometric template selection and update: a case study in fingerprints , 2004, Pattern Recognit..

[68]  Luminita Vasiu,et al.  Biometric Recognition - Security and Privacy Concerns , 2004, ICETE.

[69]  Arun Ross,et al.  An introduction to biometric recognition , 2004, IEEE Transactions on Circuits and Systems for Video Technology.

[70]  Xiaoyun Tang,et al.  Using insurance to create trust on the Internet , 2003, CACM.

[71]  L. O'Gorman,et al.  Comparing passwords, tokens, and biometrics for user authentication , 2003, Proceedings of the IEEE.

[72]  Tadeusz Morzy,et al.  Handbook on Data Management in Information Systems , 2003, International Handbooks on Information Systems.

[73]  Sharath Pankanti,et al.  Biometric Recognition: Security and Privacy Concerns , 2003, IEEE Secur. Priv..

[74]  D. Toth The Persona Concept : A Consumer-Centered Identity Model , 2003 .

[75]  J. Suler Identity Management in Cyberspace , 2002 .

[76]  Clemens H. Cap,et al.  Digital Identity and it's Implication for Electronic Government , 2001, I3E.

[77]  Bruce Schneier,et al.  Inside risks: the uses and abuses of biometrics , 1999, CACM.

[78]  P. Eakin How Our Lives Become Stories: Making Selves , 1999 .

[79]  B. Garrett Personal Identity and Self-Consciousness , 1998 .

[80]  Adam Rifkin,et al.  Weaving a Web of trust , 1997, World Wide Web J..

[81]  J. Côté,et al.  Sociological perspectives on identity formation: the culture-identity link and identity capital , 1996, Journal of adolescence.

[82]  Tyler Burge,et al.  Individualism and Self-knowledge , 1988 .

[83]  L Gagnon,et al.  [The International Committee of the Red Cross]. , 1967, Les cahiers du nursing.

[84]  K. Sneha,et al.  Blockchain Identity Management , 2022, Essential Enterprise Blockchain Concepts and Applications.