Editorial: Establishing Self Sovereign Identity with Blockchain

نویسندگان

چکیده

EDITORIAL article Front. Blockchain, 19 August 2022Sec. Blockchain for Good Volume 5 - 2022 | https://doi.org/10.3389/fbloc.2022.955868

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Portable Trust: biometric-based authentication and blockchain storage for self-sovereign identity systems

We devised a mobile biometric-based authentication system only relying on local processing. Our Android open source solution explores the capability of current smartphones to acquire, process and match fingerprints using only its built-in hardware. Our architecture is specifically designed to run completely locally and autonomously, not requiring any cloud service, server, or permissioned acces...

متن کامل

Self-sovereign Identity - Opportunities and Challenges for the Digital Revolution

The interconnectedness of people, services and devices is a defining aspect of the digital revolution, and, secure digital identities are an important prerequisite for secure and legally compliant information exchange. Existing approaches to realize a secure identity management focus on central providers of identities such as national authorities or online service providers. Hence, changing res...

متن کامل

Kyoto’s Glocal Identity: Establishing Balance between Identity Change and Persistence

Kyoto is a miniature of Japan; through centuries of experience and persistence, it has maintained the symbols of the country’s civil and cultural identity. The city has demonstrated a collection of Japan’s noble identity and characteristics through its material and spiritual heritage. Kyoto’s rich history and its position have gathered a collection of religion-based works, artistic innovations,...

متن کامل

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point ...

متن کامل

Establishing Identity Equivalence in Multi-Relational Domains

Identity Equivalence or Alias Detection is an important topic in Intelligence Analysis. Often, terrorists will use multiple different identities to avoid detection. We apply machine learning to the task of determining Identity Equivalence. Two challenges exist in this domain. First, data can be spread across multiple tables. Second, we need to limit the number of false positives. We present a t...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Frontiers in blockchain

سال: 2022

ISSN: ['2624-7852']

DOI: https://doi.org/10.3389/fbloc.2022.955868