A First Look at Identity Management Schemes on the Blockchain
نویسندگان
چکیده
The emergence of distributed ledger technology (DLT) based upon a blockchain data structure, has given rise to new approaches to identity management that aim to upend dominant approaches to providing and consuming digital identities. These new approaches to identity management (IdM) propose to enhance decentralisation, transparency and user control in transactions that involve identity information; but, given the historical challenge to design IdM, can these new DLTbased schemes deliver on their lofty goals? We introduce the emerging landscape of DLT-based IdM, and evaluate three representative proposals – uPort, ShoCard and Sovrin – using the analytic lens of a seminal framework that characterises the nature of successful IdM schemes.
منابع مشابه
Verifiable Anonymous Identities and Access Control in Permissioned Blockchains
In this paper we address the issue of identity and access control within shared permissioned blockchains. We propose the ChainAchor system that provides anonymous but verifiable identities for entities on the blockchain. ChainAchor also provides access control to entities seeking to submit transactions to the blockchain to read/verify transactions on the the permissioned blockchain. Consensus n...
متن کاملA User-Centric System for Verified Identities on the Bitcoin Blockchain
We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin’s decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even...
متن کاملDatabase Perspectives on Blockchains
Modern blockchain systems are a fresh look at the paradigm of distributed computing, applied under new assumptions of large-scale open public networks. They can be used to store and share information without a trusted central party. There has been much theoretical and practical effort to develop blockchain systems for a myriad of uses, ranging from cryptocurrencies to identity control, supply c...
متن کاملPrivacy on the Blockchain: Unique Ring Signatures
Ring signatures are cryptographic protocols designed to allow any member of a group to produce a signature on behalf of the group, without revealing the individual signer’s identity. This offers group members a level of anonymity not attainable through generic digital signature schemes. We call this property ‘plausible deniability’, or anonymity with respect to an anonymity set. We concentrate ...
متن کاملHyperledger Fabric: A Distributed Operating System for Permissioned Blockchains
Fabric is amodular and extensible open-source system for deploying and operating permissioned blockchains and one of theHyperledger projects hosted by the Linux Foundation (www.hyperledger.org). Fabric is the first truly extensible blockchain system for running distributed applications. It supports modular consensus protocols, which allows the system to be tailored to particular use cases and t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1801.03294 شماره
صفحات -
تاریخ انتشار 2018