2020 2nd Conference on Blockchain Research &Amp; Applications for Innovative Networks and Services (BRAINS) 2020
DOI: 10.1109/brains49436.2020.9223292
|View full text |Cite
|
Sign up to set email alerts
|

Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials

Abstract: Authentication with username and password is becoming an inconvenient process for the user. End users typically have little control over their personal privacy, and data breaches effecting millions of users have already happened several times. We have implemented a proof of concept decentralized OpenID Connect Provider by marrying it with Self-Sovereign Identity, which gives users the freedom to choose from a very large pool of identity providers instead of just a select few corporations, thus enabling the dem… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
31
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 54 publications
(31 citation statements)
references
References 10 publications
0
31
0
Order By: Relevance
“…In more detail, the trusted peer-to-peer (P2P) interaction that creates a decentralized trust web, which in aggregate constitute the nested accounting and network process (Figure 3A), is generated in a privacy-preserving and decentralized manner through verifiable credentials (Lux et al, 2020). These verifiable credentials enable the holder to submit a data derivative to the verifier to review and verify the data (Figure 3B).…”
Section: Digital Trust and Interoperabilitymentioning
confidence: 99%
“…In more detail, the trusted peer-to-peer (P2P) interaction that creates a decentralized trust web, which in aggregate constitute the nested accounting and network process (Figure 3A), is generated in a privacy-preserving and decentralized manner through verifiable credentials (Lux et al, 2020). These verifiable credentials enable the holder to submit a data derivative to the verifier to review and verify the data (Figure 3B).…”
Section: Digital Trust and Interoperabilitymentioning
confidence: 99%
“…In [194], Lux et al provide a proof-of-concept integration of SSI and OpenID Connect protocol on Hyperledger Indy, with ability for the users to choose from a pool of identity providers instead of a select few. eir proposed system is able to receive OIDC claims as verifiable credentials.…”
Section: Original Research and Proposals Wang And Dementioning
confidence: 99%
“…Existing research (e.g., [74,[76][77][78]) on decentralized identity management investigated the use of DLT for the mutual authentication of X-Nodes and controlling their identifying information. Previous work (e.g., [74,76]) on the authentication of X-Nodes used permissioned distributed ledgers and smart contracts (i.e., agreements that are formalized in program code and deployed to the distributed ledger).…”
Section: Comparison With Related Workmentioning
confidence: 99%
“…Previous work (e.g., [74,76]) on the authentication of X-Nodes used permissioned distributed ledgers and smart contracts (i.e., agreements that are formalized in program code and deployed to the distributed ledger). Other studies (e.g., [77,78]) present concepts related to self-sovereign identities, where users can manage data related to their identities on a distributed ledger. Our work differs from prior studies as X-Nodes store identifying information on a public-permissionless distributed ledger.…”
Section: Comparison With Related Workmentioning
confidence: 99%