Advertisement

Blockchain, Digital Identity, E-government

  • Clare SullivanEmail author
  • Eric Burger
Chapter

Abstract

This chapter examines the legal and technical implications of the application of blockchain technology to authenticate and verify identity for e-Government services and transactions.

Keywords

Blockchain technology Digital identity E-government Know Your Customer Right to identity 

Notes

Acknowledgments

The Army Research Office provided funding for this paper through the Minerva Initiative agreement # W911NF-15-1-0595.

References

  1. Allison, I. (2016, September 29). Decentralised Government Project Bitnation Offers Refugees Blockchain IDs and Bitcoin Debit Cards. Retrieved April 8, 2018, from International Business Times. https://www.ibtimes.co.uk/decentralised-government-project-bitnation-offers-refugees-blockchain-ids-bitcoin-debit-cards-1526547
  2. Allison, I. (2018, February 8). Bitnation and Estonian Government Start Spreading Sovereign Jurisdiction on the Blockchain. Retrieved April 8, 2018, from International Business Times. https://www.ibtimes.co.uk/bitnation-estonian-government-start-spreading-sovereign-jurisdiction-blockchain-1530923
  3. Avery, L. (2004). Return to Life: The Right to Identity and the Right to Identify Argentina’s “Living Disappeared”. Harvard Wonem’s Law Journal, 27, 235.Google Scholar
  4. Detrick, S., Doek, J. E., & Cantwell, N. (1992). The United Nations Convention on the Rights of the Child. A Guide to the “Travaux Préparatoires”. Dordrecht: Martinus Nijhoff Publishers.Google Scholar
  5. Hancock, K., & Rhodes, G. (2008). Contact, Configural Coding and the Other–Race Effect in Face Recognition. British Journal of Psychology, 99(1), 45–56.CrossRefGoogle Scholar
  6. Hancock, P., Bruce, V., & Burton, A. M. (2000). Recognition of Unfamiliar Faces. Trends in Cognitive Science, 4(9), 330–337.CrossRefGoogle Scholar
  7. Hardt, D. (2012). The OAuth 2.0 Authorization Framework. Internet Engineering Task Force, RFC 6749.Google Scholar
  8. Illinois Department of Commerce and Economic Opportunity. (2017, August 31). State of Illinois Partners with Evernym to Launch Birth Registration Pilot. Retrieved April 8, 2018, from https://www2.illinois.gov/IISNews/14759-DCEO_Birth_Registration_Pilot_Release.pdf
  9. Kemp, R., Towell, N., & Pike, G. (1997). When Seeing Should Not Be Believing: Photographs, Credit Cards and Fraud. Applied Cognitive Psychology, 11, 211–222.CrossRefGoogle Scholar
  10. Kerstholt, J., Raaijmakers, J., & Valeton, J. M. (1992). The Effect of Expectation on the Identification of Known and Unknown Persons. Applied Cognitive Psychology, 6(2), 173–180.CrossRefGoogle Scholar
  11. Naffine, N. (2003). Who Are Law’s Persons? From Cheshire Cats to Responsible Subjects. Modern Law Review, 66, 346–367.CrossRefGoogle Scholar
  12. Price, R. (2016, June 17). Digital Currency Ethereum Is Cratering Because of a $50 Million Hack. Retrieved 8 2018, April, from Business Insider. http://www.businessinsider.com/dao-hacked-ethereum-crashing-in-value-tens-of-millions-allegedly-stolen-2016-6
  13. Reich, C. (1991). The Individual Sector. The Yale Law Journal, 100(5), 1409–1448.CrossRefGoogle Scholar
  14. Rivest, R., Shamir, A., & Adleman, L. (1978). A Method for Obtaining Digital Signatures and Public-Key Cryptosystems. Communications of the ACM, 21(2), 120–126.CrossRefGoogle Scholar
  15. Stevenage, S., & Spreadbury, J. (2006). Haven’t We Met Before? The Effect of Facial Familiarity on Repetition Priming. British Journal of Psychology, 97(1), 79–94.CrossRefGoogle Scholar
  16. Sullivan, C. (2007). Who’s Who—Conceptualising Identity. International Review of Law, Computers and Technology, 21(3), 237–261.CrossRefGoogle Scholar
  17. Sullivan, C. (2010). Digital Identity: An Emergent Legal Concept. Adelaide: University of Adelaide Press.Google Scholar
  18. Sullivan, C. (2012). Digital Identity and Mistake. International Journal of Law and Information Technology, 20(3), 223–241.CrossRefGoogle Scholar
  19. Sullivan, C. (2016). Digital Citizenship and the Right to Digital Identity Under International Law. Computer Law and Security Review, 32, 474–481.CrossRefGoogle Scholar
  20. Sullivan, C., & Burger, E. (2017). E-residency and Blockchain. Computer Law & Security Review, 33(4), 470–481.CrossRefGoogle Scholar
  21. Tempelhof, S., Teissonniere, E., Tempelhof, J., & Edwards, D. (2017, April). Retrieved April 8, 2018, from Bitnation Pangea | Your Blockchain Jourisdiction. https://github.com/Bit-Nation/Pangea-Docs/raw/master/BITNATION%20Pangea%20Whitepaper%202018.pdf
  22. United Nations. (2015). Transforming Our World: The 2030 Agenda for Sustainable Development. Retrieved April 8, 2018, from https://sustainabledevelopment.un.org/post2015/transformingourworld
  23. Walker, P., & Hewstone, M. (2006). A Perceptual Discrimination Investigation of the Own-Race Effect and Intergroup Experience. Applied Cognitive Psychology, 20(4), 461–475.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.Center for National Security and the LawGeorgetown UniversityWashington, DCUSA
  2. 2.Computer ScienceGeorgetown UniversityWashington, DCUSA

Personalised recommendations