Skip to main content

Methods for Decentralized Identities: Evaluation and Insights

  • Conference paper
  • First Online:
Business Process Management: Blockchain and Robotic Process Automation Forum (BPM 2021)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 428))

Included in the following conference series:

Abstract

Recent technological shifts have pressured businesses to reshape the way they operate and transact. At the hart of this restructuring, identity management established itself as an essential building block in both B2C and B2B business models. Trustworthy identities may refer to customers, businesses, suppliers or assets, and enable trusted communications between different actors. Unfortunately, traditional identity management systems rely on centralized architectures and trust in third party services. With the inception of blockchain technology, new methods for managing identity emerged, which promise better decentralization and self-sovereignty. This paper provides an evaluation of a selection of distributed identity methods, and analyzes their properties based on the categorization specified in the W3C recommendation rubric.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 69.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    This work expands upon a technical report that evaluates DID method specifications [4] which was conducted by the authors.

  2. 2.

    See: https://www.w3.org/TR/did-core.

  3. 3.

    See: https://w3c-ccg.github.io/didm-btcr/.

  4. 4.

    See: https://dev.uniresolver.io/.

  5. 5.

    See: https://github.com/decentralized-identity/universal-registrar/.

  6. 6.

    See: https://w3c.github.io/did-rubric/.

  7. 7.

    See: https://en.bitcoin.it/wiki/BIP_0136.

  8. 8.

    https://eips.ethereum.org/EIPS/eip-1056.

  9. 9.

    Cf. https://veres.one/.

  10. 10.

    Cf. https://github.com/digitalbazaar/bedrock-ledger-consensus-continuity.

References

  1. Aublin, P.L., Mokhtar, S.B., Quéma, V.: RBFT: redundant byzantine fault tolerance. In: 2013 IEEE 33rd International Conference on Distributed Computing Systems, pp. 297–306. IEEE (2013)

    Google Scholar 

  2. Bartoletti, M., Pompianu, L.: An analysis of bitcoin op\(\_\)return metadata. In: International Conference on Financial Cryptography and Data Security, pp. 218–230 (2017)

    Google Scholar 

  3. Deuber, D., Magri, B., Thyagarajan, S.A.K.: Redactable blockchain in the permissionless setting. In: 2019 IEEE Symposium on Security and Privacy (SP), pp. 124–138. IEEE (2019)

    Google Scholar 

  4. Fdhila, W., Stifter, N., Kostal, K., Saglam, C., Sabadello, M.: DID methods evaluation report - draft, January 2021. https://docs.google.com/document/d/1jP-76ul0FZ3H8dChqT2hMtlzvL6B3famQbseZQ0AGS8/

  5. Klein, H.: ICANN and internet governance: leveraging technical coordination to realize global public policy. Inf. Soc. 18(3), 193–207 (2002)

    Article  Google Scholar 

  6. Lesavre, L., Varin, P., Mell, P., Davidson, M., Shook, J.: A taxonomic approach to understanding emerging blockchain identity management systems. CoRR abs/1807.06346 (2019)

    Google Scholar 

  7. Luu, L., Chu, D.H., Olickel, H., Saxena, P., Hobor, A.: Making smart contracts smarter. In: Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, pp. 254–269 (2016)

    Google Scholar 

  8. Mühle, A., Grüner, A., Gayvoronskaya, T., Meinel, C.: A survey on essential components of a self-sovereign identity. CoRR abs/1807.06346 (2018)

    Google Scholar 

  9. Naik, N., Jenkins, P.: uPort open-source identity management system: An assessment of self-sovereign identity and user-centric data platform built on blockchain. In: 2020 IEEE International Symposium on Systems Engineering, pp. 1–7 (2020)

    Google Scholar 

  10. Reed, D., Law, J., Hardman, D.: The technical foundations of Sovrin. Technical report, Sovrin, 2016 (2016)

    Google Scholar 

  11. Stifter, N., Judmayer, A., Weippl, E.: Revisiting practical byzantine fault tolerance through blockchain technologies. In: Security and Quality in Cyber-Physical Systems Engineering, pp. 471–495. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-25312-7_17

    Chapter  Google Scholar 

Download references

Acknowledgments

This research is based upon work partially supported by (1) the Christian-Doppler-Laboratory for Security and Quality Improvement in the Production System Lifecycle; The financial support by the Austrian Federal Ministry for Digital and Economic Affairs, the Nation Foundation for Research, Technology and Development and University of Vienna, Faculty of Computer Science, Security & Privacy Group is gratefully acknowledged; (2) SBA Research (SBA-K1); SBA Research is a COMET Center within the COMET – Competence Centers for Excellent Technologies Programme and funded by BMK, BMDW, and the federal state of Vienna. The COMET Programme is managed by FFG. (3) the FFG ICT of the Future project 874019 dIdentity & dApps. (4) the FFG Industrial PhD project 878835 SmartDLP. (5) the U.S Department of Homeland Security Science and Technology Directorate’s Silicon Valley Innovation Program (SVIP) under OTA 70RSAT20T00000030. Any opinions contained herein are those of the author(s) and do not necessarily reflect those of DHS S&T

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Walid Fdhila .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Fdhila, W., Stifter, N., Kostal, K., Saglam, C., Sabadello, M. (2021). Methods for Decentralized Identities: Evaluation and Insights. In: González Enríquez, J., Debois, S., Fettke, P., Plebani, P., van de Weerd, I., Weber, I. (eds) Business Process Management: Blockchain and Robotic Process Automation Forum. BPM 2021. Lecture Notes in Business Information Processing, vol 428. Springer, Cham. https://doi.org/10.1007/978-3-030-85867-4_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-85867-4_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-85866-7

  • Online ISBN: 978-3-030-85867-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics