Skip to main content

Decentralized Key Management for Digital Identity Wallets

  • Chapter
  • First Online:
Blockchain Transformations

Abstract

Self-sovereign identity (SSI) is considered by experts as the next step in the evolution of digital identity management systems. Blockchain and distributed ledger technologies have provided the necessary building blocks and facilities that bring us closer to the realization of the objectives and ideals of SSI. In contrast to most previous identity management systems, where the service provider was at the center of the identity model, SSI is user-centric and eliminates the need for a central authority. It allows users to own their identities and carry them around, for example, in a digital identity wallet on their mobile device or through a cloud service. Mechanisms exist for key generation, credential issuance and validation, as well as selective disclosure that protects users from unintended sharing of their personal data. However, if the root secret key of the wallet is lost, the user will not be able to recover the digital wallet, posing one of the critical challenges in the SSI ecosystem. This research focuses on the problem of decentralized key management and recovery. In this chapter, we propose a decentralized key backup and recovery model for SSI wallets based on Shamir’s Secret Sharing algorithm. Furthermore, we present a prototype that generates a private key from a digital identity wallet, allowing it to be shared among trustees and subsequently recovered in the event of a loss of the private key. Additionally, this chapter provides an overview of the fundamental concepts and state-of-the-art developments in the SSI ecosystem and highlights the remaining challenges.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    SSS library: https://www.npmjs.com/package/shamirs-secret-sharing

  2. 2.

    Social key recovery scheme: https://github.com/abylays/Key-recovery-scheme

References

  1. Berghel, H. (2017). Equifax and the latest round of identity theft roulette. Computer, 50(12), 72–76.

    Article  Google Scholar 

  2. Isaak, J., & Hanna, M. J. (2018). User data privacy: Facebook, Cambridge analytica, and privacy protection. Computer, 51(8), 56–59.

    Article  Google Scholar 

  3. Dellinger, A. (2022). Understanding the first American financial data leak: How did it happen and what does it mean? Available at https://bit.ly/3CfTvlC. Accessed 11 June 2023

  4. Allen, C. (2016). The path to self-sovereign identity. Available at http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html. Accessed 22 June 2023.

  5. Shamir, A. (1979). How to share a secret. Communications of the ACM, 22(11), 612–613.

    Article  MathSciNet  Google Scholar 

  6. W3C Credentials Community Group. (2022). Verifiable credentials data model v1.1. Available at https://www.w3.org/TR/vc-data-model/. Accessed 22 Aug 2023

  7. Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R., Sabadello, M., & Holt, J. (2022). Decentralized identifiers (DIDs) v1. 0. W3C recommendation.

    Google Scholar 

  8. Kellogg, G., Champin, P. A., & Longley, D. (2019). JSON-LD 1.1–A JSON-based serialization for linked data (W3C working draft) (Doctoral dissertation, W3C).

    Google Scholar 

  9. Dawson, E., & Donovan, D. (1994). The breadth of Shamir’s secret-sharing scheme. Computers & Security, 13(1), 69–78.

    Article  Google Scholar 

  10. Tawakol, A. M. (2016). Using Shamir’s secret sharing scheme and symmetric key encryption to achieve data privacy in databases.

    Google Scholar 

  11. Singh, P., & Raman, B. (2018). Reversible data hiding based on Shamir’s secret sharing for color images over cloud. Information Sciences, 422, 77–97.

    Article  Google Scholar 

  12. Broadcom. How to split and rejoin PGP desktop 8.x keys. Available at https://knowledge.broadcom.com/external/article/180108/how-to-split-and-rejoin-pgp-desktop-8x-k.html. Accessed 30 July 2023

  13. HashiCorp. Vault. Available at https://www.vaultproject.io/docs/concepts/seal. Accessed 30 July 2023

  14. OASIS. Key management interoperability protocol (KMIP). Available at https://www.oasis-open.org/committees/kmip. Accessed 30 Aug 2023

  15. DHS. S&T awards 749k to Evernym for decentralized key management research and development. Available at www.dhs.gov/science-and-technology/news/2017/07/20/news-release-dhs-st-awards-749k-evernym-decentralized-key. Accessed 13 Aug 2023

  16. Hyperledger Foundation. DKMS (decentralized key management system) design and architecture v4. Available at https://github.com/hyperledger/aries-rfcs/blob/main/concepts/0051-dkms/dkms-v4.md. Accessed 20 June 2023.

  17. Decentralized Identity Foundation (DIF). (2022). Wallet Security Group. Available at https://identity.foundation/working-groups/wallet-security.html, Accessed 27 May 2023.

  18. Chen, B., & Chandran, V. (2007, December). Biometric based cryptographic key generation from faces. In 9th biennial conference of the Australian pattern recognition society on digital image computing techniques and applications (DICTA 2007) (pp. 394–401). IEEE.

    Chapter  Google Scholar 

  19. Bhatega, A., & Sharma, K. (2014, December). Secure cancelable fingerprint key generation. In 2014 6th IEEE Power India International Conference (PIICON) (pp. 1–4). IEEE.

    Google Scholar 

  20. Loopring Protocol. (2023). Loopring smart wallet with social recovery. Available at https://medium.loopring.io/?gi=248a43681b24. Accessed 22 Aug 2023

  21. Argent Labs. (2022). How to recover my wallet with guardians. Available at https://support.argent.xyz/hc/en-us/articles/360022631412-About-wallet-recovery, Accessed 7 June 2023

  22. Trinsic. A full-stack SSI platform. Available at https://trinsic.id/. Accessed 23 Aug 2023.

  23. Veramo. Available at https://veramo.io/. Accessed 13 Aug 2023.

  24. SpruceID. Your keys, your data. Available at www.spruceid.com/. Accessed 18 Aug 2023

  25. Allen, C., & Appelcline, S. Hierarchical deterministic keys: Bip32 and beyond. Available at https://github.com/WebOfTrustInfo/rwot1-sf/blob/master/topics-and-advance-readings/hierarchical-deterministic-keys–bip32-and-beyond.md. Accessed 13 Aug 2021

  26. Curren, S., & Looker, T. & Terbu, O. DIDComm messaging v2.x editor’s draft. Available at https://identity.foundation/didcomm-messaging/spec/. Accessed 23 June 2023.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Sheikh Mohammad Idrees .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Satybaldy, A., Subedi, A., Idrees, S.M. (2024). Decentralized Key Management for Digital Identity Wallets. In: Idrees, S.M., Nowostawski, M. (eds) Blockchain Transformations. Signals and Communication Technology. Springer, Cham. https://doi.org/10.1007/978-3-031-49593-9_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-49593-9_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-49592-2

  • Online ISBN: 978-3-031-49593-9

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics