2020
DOI: 10.6028/nist.cswp.01142020
|View full text |Cite
|
Sign up to set email alerts
|

A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems

Abstract: Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing within organizations and on the web. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues, such as enabling mass data collection and user tracking. Blockchain technology has the potential to alleviate these concerns: it can support the ability for users to control the custody of their own identifiers … Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
49
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
2
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 50 publications
(49 citation statements)
references
References 29 publications
0
49
0
Order By: Relevance
“…Blockchain-based data stores for status querying can have multiple architectures (see Section 4.4 in [15]). They can be built as smart contract registries that are user-controlled, issuer-or consortium-controlled, or ownerless.…”
Section: Authentication Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Blockchain-based data stores for status querying can have multiple architectures (see Section 4.4 in [15]). They can be built as smart contract registries that are user-controlled, issuer-or consortium-controlled, or ownerless.…”
Section: Authentication Methodsmentioning
confidence: 99%
“…In particular, they can be used to identify the owners and issuers of stateful tokens (and any other entities whose public key is present in the token). These systems may follow the decentralized identifier (DID) standard [17], and the blockchain-based data stores that they use can have architectures similar to the ones discussed above and further examined in [15]. They may also be complemented by smart contracts for public credentials registries, such as those introduced in ERC-780 [18].…”
Section: Authentication Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Self-sovereignty for identity management allows the users to own and control their identities without the intervening administrative authorities. It assures that an individual has full control over his data and he can allow or reject the request by the organizations to share personal health data with them [78][79][80][81]. Through self-sovereign systems, the data privacy of an individual with symptomatic symptoms of COVID-19 can be assured as the user can refuse the request of sharing personal health data with a health specialist or researcher.…”
Section: G Data Privacy and Self-sovereign Identitymentioning
confidence: 99%
“…The patent office has a significant role to play in the regulation of patent-related transactions, and that role may also extend to the policing of suspicious activities on the DLT and putting in place systems that ensure the validity of transactions. Independent of the patent DLT, the use of DLTs for identity management is an active area of research (Shrier et al, 2016;Kuperberg, 2019;Lesavre et al, 2019); these may present much more secure modes of transaction than existing DLTs currently offer.…”
Section: Security Concernsmentioning
confidence: 99%