Binding of Endpoints to Identifiers by On-Chain Proofs

05/02/2020
by   Diego Pennino, et al.
0

In many applications, identity management (IdM) is used to associate a subject public key with an endpoint at which the subject can be contacted (telephone number, email, etc.). In decentralized applications based on distributed ledger technologies (DLTes), it is desirable for the IdM to be decentralized as well. Currently, endpoints are either verified by who needs it, which is impractical in DLT-based applications, or by a centralized authority, which contrasts with the spirit of DLTes. In this paper, we show two DLT-based protocols to prove the association between a subject and an endpoint in a decentralized manner, contributing in filling the gap of the current IdM approaches with respect to decentralization. Our protocols are compatible with a wide variety of endpoints. We analyze the security of our protocols and evaluate their performance and cost against the common approaches.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/30/2023

Blockchain-based Decentralized Identity Management for Healthcare Systems

Blockchain-based decentralized identity management provides a promising ...
research
05/26/2022

SoK: Decentralized Randomness Beacon Protocols

The scientific interest in the area of Decentralized Randomness Beacon (...
research
08/10/2017

Tosca: Operationalizing Commitments Over Information Protocols

The notion of commitment is widely studied as a high-level abstraction f...
research
07/13/2022

SmartPubSub: Content-based Pub-Sub on IPFS

The InterPlanetary File System (IPFS) is a hypermedia distribution proto...
research
02/23/2023

The Hidden Shortcomings of (D)AOs – An Empirical Study of On-Chain Governance

Decentralized autonomous organizations (DAOs) are a recent innovation in...
research
06/27/2018

Verifying Security Protocols using Dynamic Strategies

Current formal approaches have been successfully used to find design fla...
research
08/04/2023

SoK: The Ghost Trilemma

Trolls, bots, and sybils distort online discourse and compromise the sec...

Please sign up or login with your details

Forgot password? Click here to reset