Who Am I? Secure Identity Registration on Distributed Ledgers
نویسندگان
چکیده
Bitcoin is a decentralized cryptocurrency that uses a ledger (or “blockchain”) to keep track of the transactions made between its users. Because it is a fully decentralized system and anyone can join, every transaction is by necessity public. Thus, to preserve some semblance of privacy, users in the system are represented not by their real-world identities but by pseudonyms. While pseudonyms are acceptable for a standalone cryptocurrency, the emergence of other potential blockchainbased applications—e.g., using them to administer benefits and pensions—poses a need to associate certain attributes with the users of the system. In this paper, we address the question of how to register identities and attributes in a system built on globally visible ledgers. We propose a variety of possible solutions and in each case, we analyze the tradeoff our solution provides between privacy (ensuring that no one can associate the user’s real-world identity with the pseudonym or other attributes they use on the ledger), usability (ensuring that verification of their attributes poses the lowest possible burden to users), and integrity (ensuring that no one can impersonate a user). We also present an implementation of one of our solution using Ethereum.
منابع مشابه
Our Sense of Identity: “Who am I?” Gender and Cultural Studies
Identity is seen as a cultural and social construct, which indicates how we have been embodied and how we might represent ourselves. The knowledge that identities are the outputs of discourses is a familiar characteristic of some societal concepts. Gender, as an identity or a sense of our identity we build for ourselves, rather than something we are born with, is a constructed cultural category...
متن کاملHomosexuality identification models: review study
Identity exploration process is one of the most important tasks that everyone should do in life which is, in fact, the same answer to question of "Who am I". During the identification process, person initially concludes that "I am a man" or " I am a woman" which is named gender identity. After defining themselves, the person chooses a partner, that this choice represents his sexual orientation....
متن کاملA Protocol for Interledger Payments
We present a protocol for payments across payment systems. It enables secure transfers between ledgers and allows anyone with accounts on two ledgers to create a connection between them. Ledger-provided escrow removes the need to trust these connectors. Connections can be composed to enable payments between any ledgers, creating a global graph of liquidity or Interledger. Unlike previous approa...
متن کاملIdentifying the Risk of Business Tax Compliance using the Grounded Theory
The present study identifies business tax compliance risks using the grounded theory approach. The statistical population of the study is the elite and experts in the field of taxation who have been selected from the snowball or chain sampling method for the interview according to the purpose of the research. After receiving the opinion of 23 elites and experts in 2019, 28 cases of business tax...
متن کاملProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کامل