2020
DOI: 10.1007/978-3-030-41579-2_18
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(26 citation statements)
references
References 18 publications
0
25
0
Order By: Relevance
“…Usually, it was basic to authenticate a user with a token and certificate issued from the OSINT tool provider after registering the user. Also, one method is to use an identity authentication service using a decentralized identity (DID), which has become an issue recently [62,63]. DID is a technology in which the user has the authority to control his/her own information, and authentication can be performed with a minimum amount of information compared to the identification method controlled by the existing central system.…”
Section: Security Requirements For Users To Access and Use Osint Datamentioning
confidence: 99%
“…Usually, it was basic to authenticate a user with a token and certificate issued from the OSINT tool provider after registering the user. Also, one method is to use an identity authentication service using a decentralized identity (DID), which has become an issue recently [62,63]. DID is a technology in which the user has the authority to control his/her own information, and authentication can be performed with a minimum amount of information compared to the identification method controlled by the existing central system.…”
Section: Security Requirements For Users To Access and Use Osint Datamentioning
confidence: 99%
“…Unlinkable signature-based disclosure schemes. Many mainstream SSI solutions are based on signature derivation (most notably Idemix's CL signatures [12] and JSON Web Tokens [19]), possibly storing revocations on blockchains [1]. These signatures bind the key of the identity holder to the disclosed data and usually allow derivation of a new signature that is also valid for the same data (which is claimed to make this data unlinkable, though fingerprinting makes users completely linkable as we have previously discussed).…”
Section: Related Workmentioning
confidence: 99%
“…Such a derivation process needs to transform the data and maintain the data's trustworthiness. Abraham et al [50] proposed a privacy-preserving decentralized eID derivation for SSI, where intermediate parties cannot access the users' attributes in plain.…”
Section: Solving Ssi Challengesmentioning
confidence: 99%
“…On the downside, this counteracts the principles of SSI. A privacy-preserving decentralized eID derivation for SSI [50] is another approach that needs to be taken into account. In addition, some services might not even (willingly or unwillingly) enable FIM.…”
Section: Technical Factorsmentioning
confidence: 99%