2020
DOI: 10.3390/electronics9081231
|View full text |Cite
|
Sign up to set email alerts
|

VaultPoint: A Blockchain-Based SSI Model that Complies with OAuth 2.0

Abstract: An identity management including authentication and authorization in a network environment is a critical security factor. Various models for identity management have been developed continually, from the silo model to the federated model and to the recently introduced self-sovereign identity (SSI) model. In particular, SSI makes users manage their own information by themselves independently of any organizations. SSI utilizes the newly emerged blockchain technology and many studies of it are in progress. However… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
18
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(18 citation statements)
references
References 11 publications
0
18
0
Order By: Relevance
“…Another trend of research in SSI is to provide protocol integration with production-level standards. This was presented as the driving problem of [53,58,93], but it was also developed in the aforementioned work of Schanzenbach et al [116]. Both [53] and [93] aim to integrate SSI with the OpenID Connect protocol [111], an identity layer that provides authentication on top of OAuth 2.0, the de facto industry-standard protocol for authorization [57].…”
Section: Frederico Schardong and Ricardo Custódiomentioning
confidence: 99%
See 1 more Smart Citation
“…Another trend of research in SSI is to provide protocol integration with production-level standards. This was presented as the driving problem of [53,58,93], but it was also developed in the aforementioned work of Schanzenbach et al [116]. Both [53] and [93] aim to integrate SSI with the OpenID Connect protocol [111], an identity layer that provides authentication on top of OAuth 2.0, the de facto industry-standard protocol for authorization [57].…”
Section: Frederico Schardong and Ricardo Custódiomentioning
confidence: 99%
“…Application-level authorization is implemented in [93] with claims, which the user must present. Differently, the authors of [58] implemented authorization through OAuth 2.0, which facilitates integration with existing web services. However, unlike [53,93], authentication in [58] uses a custom mechanism instead of OpenID Connect.…”
Section: Frederico Schardong and Ricardo Custódiomentioning
confidence: 99%
“…Failure to successfully address this challenge may jeopardize the adoption of SSI, as billions of users have electronic identities in IdPs that can only communicate using the aforementioned protocols. This challenge was presented as the driving problem in seven research papers [ 99 , 100 , 101 , 102 , 103 , 104 , 106 ] and was also mentioned in four other works [ 105 , 107 , 108 , 109 ]. Three articles aim to integrate SSI with OpenID Connect [ 99 , 101 , 102 ], two works focus on OAuth 2.0 [ 103 , 106 ], one focuses on SAML [ 104 ], and one paper focuses on these three protocols [ 100 ].…”
Section: Rq-1: What Practical Problems Have Been Introduced and Solved?mentioning
confidence: 99%
“…This challenge was presented as the driving problem in seven research papers [ 99 , 100 , 101 , 102 , 103 , 104 , 106 ] and was also mentioned in four other works [ 105 , 107 , 108 , 109 ]. Three articles aim to integrate SSI with OpenID Connect [ 99 , 101 , 102 ], two works focus on OAuth 2.0 [ 103 , 106 ], one focuses on SAML [ 104 ], and one paper focuses on these three protocols [ 100 ].…”
Section: Rq-1: What Practical Problems Have Been Introduced and Solved?mentioning
confidence: 99%
See 1 more Smart Citation