Hydra: A Trustless Decentralized Digital Identity System
نویسندگان
چکیده
Current solutions for unified digital identities are insecure and have not been successful in reaching wide adoption. These solutions have several pitfalls due to being centralized and requiring the user to trust a third party. We propose a trustless decentralized digital identity system as a novel solution to the problem of maintaining unified digital identities.
منابع مشابه
A Trustless Privacy-Preserving Reputation System
Reputation systems are crucial for distributed applications in which users have to be made accountable for their actions, such as ecommerce websites. However, existing systems often disclose the identity of the raters, which might deter honest users from submitting reviews out of fear of retaliation from the ratees. While many privacy-preserving reputation systems have been proposed, we observe...
متن کاملTrustless Intermediation in Blockchain-Based Decentralized Service Marketplaces
Service marketplaces promise an open platform for sellers and buyers of IT services. The marketplace design usually assumes that market functions, such as match-making, transaction settlement, and dispute resolution are performed by intermediaries in a centralized system. We propose the concept of trustless intermediation to enable new forms of decentralized service marketplaces. By leveraging ...
متن کاملThe Decrits Consensus Algorithm: Decentralized Agreement without Proof of Work
Decrits is a cryptocurrency in development that makes use of a novel consensus algorithm that does not require proof-of-work. This paper describes how the Decrits Consensus Algorithm (DCA) is as trustless as a proof-of-work algorithm while offering superior transaction security at virtually no cost. Cryptocurrency: A digital construction of classical money that is protected from duplication and...
متن کاملThe Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity
Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point ...
متن کاملAn Analysis of Circulation of Decentralized Digital Money in Quantum Electrodynamics Space: the Econphysics Approach
The study aimed at showing how to create and release cryptocurrency, based on which one can introduce a new generation of this money that can continue its life in the quantum computers space and study whether cryptocurrency could be controlled or the rules should be rewritten in line with new technology. Regarding this, we showed the evolution of money and its uses in economic relations. Accord...
متن کامل