Abstract
This work is an overview of different approaches to the self-sovereign identity (SSI) concept. The idea of constructing of a digital passport for each and every person in the world is not unique, but with the growing interest and progress of distributed ledgers, a new way of dealing with existing problems appeared. On the other hand, in our point of view, a lot of development groups are working in parallel on the similar topics, yet it is not clear what is going on inside. In this paper we will try to define the differences and discuss both pros and cons of using such commonly known technologies as Sovrin based upon the Hyperledger Indy technology, Civic, Jolocom, uPort and some others. Besides, we’ll tackle the idea of using the SSI for inanimate object and how it can be constructed in this way.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Camenisch, J., Dubovitskaya, M., Lehmann, A., Neven, G., Paquin, C., Preiss, F.-S.: Concepts and languages for privacy-preserving attribute-based authentication. In: Fischer-Hübner, S., de Leeuw, E., Mitchell, C. (eds.) IDMAN 2013. IAICT, vol. 396, pp. 34–52. Springer, Heidelberg (2013). https://doi.org/10.1007/978-3-642-37282-7_4
Security Team, Computer Science Dept., IBM Research, Specification of the Identity Mixer Cryptographic Library, p. 49 (2010)
Veseli, F., Serna, J.: Evaluation of privacy-ABC technologies - a study on the computational efficiency. In: Habib, S.M.M., Vassileva, J., Mauw, S., Mühlhäuser, M. (eds.) IFIPTM 2016. IAICT, vol. 473, pp. 63–78. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-41354-9_5
Sanchez, J.L.C., Bernabe, J.B., Skarmeta, A.F.: Integration of Anonymous Credential Systems in IoT Constrained Environments, p. 11 (2018)
Wagner, K., Némethi, B., Renieris, E., Lang, P., Brunet, E., Holst, E.: Self-sovereign Identity. A position paper on blockchain enabled identity and the road ahead, p. 57 (2018)
SovrinTM: A Protocol and Token for Self-Sovereign Identity and Decentralized Trust, A White Paper from the Sovrin Foundation, p. 42 (2018). https://sovrin.org/wp-content/uploads/2018/03/Sovrin-Protocol-and-Token-White-Paper.pdf
The Sovrin Trust Framework Working Group, Sovrin Provisional Trust Framework, p. 30 (2017). https://sovrin.org/wp-content/uploads/2018/03/Sovrin-Provisional-Trust-Framework-2017-06-28.pdf
Brickell, E., Camenisch, J., Chen, L.: Direct Anonymous Attestation, p. 24 (2004)
Camenisch, J., Drijvers, M., Lehmann, A.: Anonymous attestation using the strong Diffie Hellman assumption revisited. In: Franz, M., Papadimitratos, P. (eds.) Trust 2016. LNCS, vol. 9824, pp. 1–20. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45572-3_1
Garman, C., Green, M., Miers I.: Decentralized Anonymous Credentials, p. 21 (2013)
Fei, C., Lohkamp, J., Rusu, E., Szawan, K., Wagner, K., Wittenberg, N.: Self-Sovereign and Decentralised Identity By Design, Jolocom Technical White Paper, p. 10 (2018)
Rannenberg, K., Camenisch, J., Sabouri, A.: Attribute-Based Credentials for Trust, p. 395. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-14439-9
Neven, G.: A Quick Introduction to Anonymous Credentials, p. 4 (2008)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Kulabukhova, N., Ivashchenko, A., Tipikin, I., Minin, I. (2019). Self-Sovereign Identity for IoT Devices. In: Misra, S., et al. Computational Science and Its Applications – ICCSA 2019. ICCSA 2019. Lecture Notes in Computer Science(), vol 11620. Springer, Cham. https://doi.org/10.1007/978-3-030-24296-1_37
Download citation
DOI: https://doi.org/10.1007/978-3-030-24296-1_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-24295-4
Online ISBN: 978-3-030-24296-1
eBook Packages: Computer ScienceComputer Science (R0)