A New Approach to Client Onboarding Using Self-Sovereign Identity and Distributed Ledger

Existing client onboarding and Know Your Customer (KYC) processes are typically slow, expensive and often accomplished in-person. Moreover, the current identity management models in practice deprive users from having complete control over their digital identity data. Users' identity attributes are stored on multiple centralized repositories, which often follow inadequate security policies. In this paper, we take advantage of Hyperledger Indy, a public and permissioned distributed ledger technology (DLT), to develop a digital onboarding framework based on the Self-Sovereign Identity (SSI) principles. With this framework we take a step towards tackling a number of weaknesses in current KYC processes and identity management models, while addressing the requirements associated with SSI, Privacy by Design and European Union's General Data Protection Regulation (GDPR).

[1]  A. Jøsang,et al.  User Centric Identity Management , 2005 .

[2]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[3]  Leora F. Klapper,et al.  The Global Findex Database 2014: Measuring Financial Inclusion Around the World , 2015 .

[4]  Vivien Quéma,et al.  RBFT: Redundant Byzantine Fault Tolerance , 2013, 2013 IEEE 33rd International Conference on Distributed Computing Systems.

[5]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[6]  Marc Pilkington,et al.  Blockchain Technology: Principles and Applications , 2015 .

[7]  Amos Fiat,et al.  Zero-knowledge proofs of identity , 1987, Journal of Cryptology.

[8]  Marc Langheinrich,et al.  Privacy By Design , 2013, IEEE Pervasive Comput..

[9]  David W. Chadwick,et al.  Federated Identity Management , 2009, FOSAD.

[10]  Peter Schaar,et al.  Privacy by Design , 2010 .

[11]  José G. Faísca,et al.  Decentralized Semantic Identity , 2016, SEMANTiCS.

[12]  Piotr Pacyna,et al.  Generic and Complete Three-Level Identity Management Model , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[13]  Jim Groom,et al.  The Path to Self-Sovereign Identity , 2017 .

[14]  Fabien A. P. Petitcolas,et al.  A First Look at Identity Management Schemes on the Blockchain , 2018, IEEE Security & Privacy.

[15]  Jan Camenisch,et al.  Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.

[16]  Mustafa Al-Bassam SCPKI: A Smart Contract-based PKI and Identity System , 2017 .

[17]  Anthony Skjellum,et al.  A brief survey of Cryptocurrency systems , 2016, 2016 14th Annual Conference on Privacy, Security and Trust (PST).

[18]  Björn Scheuermann,et al.  Bitcoin and Beyond: A Technical Survey on Decentralized Digital Currencies , 2016, IEEE Communications Surveys & Tutorials.