A Survey on Decentralized Identifiers and Verifiable Credentials
- URL: http://arxiv.org/abs/2402.02455v1
- Date: Sun, 4 Feb 2024 11:55:14 GMT
- Title: A Survey on Decentralized Identifiers and Verifiable Credentials
- Authors: Carlo Mazzocca, Abbas Acar, Selcuk Uluagac, Rebecca Montanari, Paolo
Bellavista, Mauro Conti
- Abstract summary: Self-Sovereign Identity (SSI) gives users full control over their data.
SSI leverages decentralized identifiers (DIDs) and verifiable credentials (VCs)
These technologies have the potential to build more secure and decentralized digital identity systems.
- Score: 17.808225768298495
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: Digital identity has always been considered the keystone for implementing
secure and trustworthy communications among parties. The ever-evolving digital
landscape has gone through many technological transformations that have also
affected the way entities are digitally identified. During this digital
evolution, identity management has shifted from centralized to decentralized
approaches. The last era of this journey is represented by the emerging
Self-Sovereign Identity (SSI), which gives users full control over their data.
SSI leverages decentralized identifiers (DIDs) and verifiable credentials
(VCs), which have been recently standardized by the World Wide Web Community
(W3C). These technologies have the potential to build more secure and
decentralized digital identity systems, remarkably contributing to
strengthening the security of communications that typically involve many
distributed participants. It is worth noting that the scope of DIDs and VCs
extends beyond individuals, encompassing a broad range of entities including
cloud, edge, and Internet of Things (IoT) resources. However, due to their
novelty, existing literature lacks a comprehensive survey on how DIDs and VCs
have been employed in different application domains, which go beyond SSI
systems. This paper provides readers with a comprehensive overview of such
technologies from different perspectives. Specifically, we first provide the
background on DIDs and VCs. Then, we analyze available implementations and
offer an in-depth review of how these technologies have been employed across
different use-case scenarios. Furthermore, we examine recent regulations and
initiatives that have been emerging worldwide. Finally, we present some
challenges that hinder their adoption in real-world scenarios and future
research directions.
Related papers
- A Systematisation of Knowledge: Connecting European Digital Identities with Web3 [0.8999666725996974]
The term self-sovereign identity (SSI) and decentralised identity are often used interchangeably.
This article aims to provide a clear distinction between the two concepts in relation to the revised Regulation as Regards establishing the European Digital Identity Framework (eIDAS 2.0)
arXiv Detail & Related papers (2024-09-26T22:35:25Z) - Deepfake Media Forensics: State of the Art and Challenges Ahead [51.33414186878676]
AI-generated synthetic media, also called Deepfakes, have influenced so many domains, from entertainment to cybersecurity.
Deepfake detection has become a vital area of research, focusing on identifying subtle inconsistencies and artifacts with machine learning techniques.
This paper reviews the primary algorithms that address these challenges, examining their advantages, limitations, and future prospects.
arXiv Detail & Related papers (2024-08-01T08:57:47Z) - SSI4IoT: Unlocking the Potential of IoT Tailored Self-Sovereign Identity [5.025528181278946]
Self-Sovereign Identity (SSI) techniques move control of digital identity from conventional identity providers to individuals.
Existing applications of SSI mainly focus on creating person-to-person and person-to-service relationships.
arXiv Detail & Related papers (2024-05-03T20:31:52Z) - Tackling Cyberattacks through AI-based Reactive Systems: A Holistic Review and Future Vision [0.10923877073891446]
This paper presents a comprehensive survey of recent advancements in AI-driven threat response systems.
The most recent survey covering the AI reaction domain was conducted in 2017.
A total of seven research challenges have been identified, pointing out potential gaps and suggesting possible areas of development.
arXiv Detail & Related papers (2023-12-11T09:17:01Z) - Comparative Analysis of Technical and Legal Frameworks of Various
National Digial Identity Solutions [2.6217304977339473]
This position paper aims to help policy makers, software developers and concerned users understand the challenges of designing, implementing and using a national digital identity management system.
arXiv Detail & Related papers (2023-10-02T09:01:22Z) - Information Forensics and Security: A quarter-century-long journey [66.16120845232525]
Information Forensics and Security (IFS) is an active R&D area whose goal is to ensure that people use devices, data, and intellectual properties for authorized purposes.
For over a quarter century since the 1990s, the IFS research area has grown tremendously to address the societal needs of the digital information era.
arXiv Detail & Related papers (2023-09-21T15:13:35Z) - Towards a trustful digital world: exploring self-sovereign identity
ecosystems [4.266530973611429]
Self-sovereign identity (SSI) solutions rely on distributed ledger technologies and verifiable credentials.
This paper builds on observations gathered in a field study to identify the building blocks, antecedents and possible outcomes of SSI ecosystems.
arXiv Detail & Related papers (2021-05-26T08:56:22Z) - Biometrics: Trust, but Verify [49.9641823975828]
Biometric recognition has exploded into a plethora of different applications around the globe.
There are a number of outstanding problems and concerns pertaining to the various sub-modules of biometric recognition systems.
arXiv Detail & Related papers (2021-05-14T03:07:25Z) - Digital Twins: State of the Art Theory and Practice, Challenges, and
Open Research Questions [62.67593386796497]
This work explores the various DT features and current approaches, the shortcomings and reasons behind the delay in the implementation and adoption of digital twin.
The major reasons for this delay are the lack of a universal reference framework, domain dependence, security concerns of shared data, reliance of digital twin on other technologies, and lack of quantitative metrics.
arXiv Detail & Related papers (2020-11-02T19:08:49Z) - Data Mining with Big Data in Intrusion Detection Systems: A Systematic
Literature Review [68.15472610671748]
Cloud computing has become a powerful and indispensable technology for complex, high performance and scalable computation.
The rapid rate and volume of data creation has begun to pose significant challenges for data management and security.
The design and deployment of intrusion detection systems (IDS) in the big data setting has, therefore, become a topic of importance.
arXiv Detail & Related papers (2020-05-23T20:57:12Z) - Deep Learning for Person Re-identification: A Survey and Outlook [233.36948173686602]
Person re-identification (Re-ID) aims at retrieving a person of interest across multiple non-overlapping cameras.
By dissecting the involved components in developing a person Re-ID system, we categorize it into the closed-world and open-world settings.
arXiv Detail & Related papers (2020-01-13T12:49:22Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.