Hydra: A Trustless Decentralized Digital Identity System

نویسندگان

  • Anish Athalye
  • Ankush Gupta
  • Kate Yu
چکیده

Current solutions for unified digital identities are insecure and have not been successful in reaching wide adoption. These solutions have several pitfalls due to being centralized and requiring the user to trust a third party. We propose a trustless decentralized digital identity system as a novel solution to the problem of maintaining unified digital identities.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Trustless Privacy-Preserving Reputation System

Reputation systems are crucial for distributed applications in which users have to be made accountable for their actions, such as ecommerce websites. However, existing systems often disclose the identity of the raters, which might deter honest users from submitting reviews out of fear of retaliation from the ratees. While many privacy-preserving reputation systems have been proposed, we observe...

متن کامل

Trustless Intermediation in Blockchain-Based Decentralized Service Marketplaces

Service marketplaces promise an open platform for sellers and buyers of IT services. The marketplace design usually assumes that market functions, such as match-making, transaction settlement, and dispute resolution are performed by intermediaries in a centralized system. We propose the concept of trustless intermediation to enable new forms of decentralized service marketplaces. By leveraging ...

متن کامل

The Decrits Consensus Algorithm: Decentralized Agreement without Proof of Work

Decrits is a cryptocurrency in development that makes use of a novel consensus algorithm that does not require proof-of-work. This paper describes how the Decrits Consensus Algorithm (DCA) is as trustless as a proof-of-work algorithm while offering superior transaction security at virtually no cost. Cryptocurrency: A digital construction of classical money that is protected from duplication and...

متن کامل

The Horcrux Protocol: A Method for Decentralized Biometric-based Self-sovereign Identity

Most user authentication methods and identity proving systems rely on a centralized database. Such information storage presents a single point of compromise from a security perspective. If this system is compromised it poses a direct threat to users digital identities. This paper proposes a decentralized authentication method, called the Horcrux protocol, in which there is no such single point ...

متن کامل

An Analysis of Circulation of Decentralized Digital Money in Quantum Electrodynamics Space: the Econphysics Approach

The study aimed at showing how to create and release cryptocurrency, based on which one can introduce a new generation of this money that can continue its life in the quantum computers space and study whether cryptocurrency could be controlled or the rules should be rewritten in line with new technology. Regarding this, we showed the evolution of money and its uses in economic relations. Accord...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015