2022
DOI: 10.1007/978-3-030-99100-5_4
|View full text |Cite
|
Sign up to set email alerts
|

Privacy-Preserving Identity Management and Applications to Academic Degree Verification

Abstract: This paper summarizes the contents and presentations held at a workshop at the IFIP Summer School on Privacy and Identity Management 2021, focusing on privacy-preserving identity management. In this document, we first introduce the necessary background on privacypreserving identity management, including core cryptographic concepts. We then present a demonstrator scenario which benefits from the use of such technologies. Finally, we present a distributed privacy-preserving identity management framework offering… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 28 publications
0
0
0
Order By: Relevance
“…In recent years blockchain technology has gained more and more ground, and there have been a few attempts that try to combine this technology with other already mentioned techniques, such as P-ABCs, presented in [36][37][38][39][40][41][42][43]. Lately, blockchain technology has offered identity management solutions that preserve user privacy in various e-services [44][45][46][47], and we hope to extend the field of applications in HARSs. Using blockchain technology in HARSs can improve security and privacy; blockchain identity management schemes offer decentralized storage using multiple nodes and identity providers without a central authority, making it more difficult for intruders to intercept critical information.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In recent years blockchain technology has gained more and more ground, and there have been a few attempts that try to combine this technology with other already mentioned techniques, such as P-ABCs, presented in [36][37][38][39][40][41][42][43]. Lately, blockchain technology has offered identity management solutions that preserve user privacy in various e-services [44][45][46][47], and we hope to extend the field of applications in HARSs. Using blockchain technology in HARSs can improve security and privacy; blockchain identity management schemes offer decentralized storage using multiple nodes and identity providers without a central authority, making it more difficult for intruders to intercept critical information.…”
Section: Related Workmentioning
confidence: 99%
“…Using blockchain technology in HARSs can improve security and privacy; blockchain identity management schemes offer decentralized storage using multiple nodes and identity providers without a central authority, making it more difficult for intruders to intercept critical information. In addition, the nature of blockchain technology and the utilized identity management applications via the OLYMPUS cryptographic library [46,47] enable users to keep control of their data, deciding who has access to them and how they might be used, providing improved protection. Additionally, it provides transparency in the data processing and decisionmaking procedures and promotes trust by giving stakeholders access to a tamper-proof audit record of all data exchanges.…”
Section: Related Workmentioning
confidence: 99%