Towards a Multi-party, Blockchain-Based Identity Verification Solution to Implement Clear Name Laws for Online Media Platforms

Online communication has increased steadily over the past decades. It has become common practice that the identities of content creators do not have to be revealed. The use of abbreviations or pseudonyms is a de facto standard in online communities. Real identities are hidden behind these and protocol-based identifiers such as Internet Protocol Addresses are difficult to assign to real persons. Due to the increase of fake news and hate postings, the obligatory use of “real names” has been and still is discussed worldwide. In some countries, a “clear name” respectively “real name” obligation has been implemented or such laws are in the process of being implemented. One example is South Korea which gained international fame in 2007 as a “clear name” obligation has been introduced by law. The law was repealed shortly afterward.

[1]  Clare Linda Sullivan,et al.  Blockchain, Digital Identity, E-government , 2018, Business Transformation through Blockchain.

[2]  Jens Terboven Postident Online with the new Personal Identity Card , 2010, ISSE.

[3]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[4]  Omri Ross,et al.  KYC Optimization Using Distributed Ledger Technology , 2017, WI 2017.

[5]  Makoto Takemiya,et al.  Sora Identity: Secure, Digital Identity on the Blockchain , 2018, 2018 IEEE 42nd Annual Computer Software and Applications Conference (COMPSAC).

[6]  Jong-Hyouk Lee,et al.  BIDaaS: Blockchain Based ID As a Service , 2018, IEEE Access.

[7]  B. Koppel,et al.  Analysis of a hardware security module's high-availability setting , 2013, IEEE Security & Privacy.

[8]  Omri Ross,et al.  Correction to: KYC Optimization Using Distributed Ledger Technology , 2017 .

[9]  Werner Ogris,et al.  Die Zensur in der Ära Metternich , 2006 .

[10]  S. Jagannatha,et al.  Analysis of Blockchain technology: pros, cons and SWOT , 2018, Cluster Computing.

[11]  Amos Fiat,et al.  Zero Knowledge Proofs of Identity , 1987, STOC.

[12]  Bernd Zwattendorfer,et al.  A privacy-preserving eID based Single Sign-On solution , 2011, 2011 5th International Conference on Network and System Security.

[13]  Jef Ausloos,et al.  The Right to Be Forgotten Across the Pond , 2013, Journal of Information Policy.

[14]  Reinhard Posch,et al.  Secure and Privacy-Preserving eGovernment - Best Practice Austria , 2011, Rainbow of Computer Science.

[15]  Jesus Carretero,et al.  Federated Identity Architecture of the European eID System , 2018, IEEE Access.

[16]  Amir Herzberg,et al.  Off-Path Hacking: The Illusion of Challenge-Response Authentication , 2014, IEEE Security & Privacy.

[17]  Peter Schaar,et al.  Privacy by Design , 2010 .

[18]  Ladislav Huraj,et al.  A Study of DDoS Reflection Attack on Internet of Things in IPv4/IPv6 Networks , 2019, CSOC.

[19]  Nazmun Naher,et al.  Authentication of Diffie-Hellman Protocol Against Man-in-the-Middle Attack Using Cryptographically Secure CRC , 2019 .

[20]  Helmut Krcmar,et al.  Towards the Implementation of the EU-Wide "Once-Only Principle": Perceptions of Citizens in the DACH-Region , 2018, EGOV.

[21]  R. Posch,et al.  Das Konzept Bürgerkarte und erste Ausprägungen , 2003 .

[22]  Gerhard Kunnert EuGH zur Vorratsdatenspeicherung: Außer Spesen nichts gewesen? , 2014, Datenschutz und Datensicherheit - DuD.

[23]  Thomas Lenz,et al.  Towards Domain-Specific and Privacy-Preserving Qualified eID in a User-Centric Identity Model , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).

[24]  Mohammad Nurul Huda,et al.  Know your customer (KYC) based authentication method for financial services through the internet , 2016, 2016 19th International Conference on Computer and Information Technology (ICCIT).

[25]  Burton H. Bloom,et al.  Space/time trade-offs in hash coding with allowable errors , 1970, CACM.

[26]  Alessandro Acquisti,et al.  Empirical analysis of online anonymity and user behaviors: the impact of real name policy , 2012, 2012 45th Hawaii International Conference on System Sciences.

[27]  Werasak Kurutach,et al.  A Practical National Digital ID Framework on Blockchain (NIDBC) , 2018, 2018 15th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTI-CON).

[28]  Cédric Lauradoux,et al.  Performances of cryptographic accumulators , 2014, 39th Annual IEEE Conference on Local Computer Networks.

[29]  Chris Speed,et al.  Making Sense of Blockchain Applications: A Typology for HCI , 2018, CHI.