did:self A registry-less DID method
- URL: http://arxiv.org/abs/2504.20767v1
- Date: Tue, 29 Apr 2025 13:47:07 GMT
- Title: did:self A registry-less DID method
- Authors: Nikos Fotiou, George C. Polyzos, Vasilios A. Siris,
- Abstract summary: did:self is a Decentralized Identifier (DID) method that does not depend on any trusted registry for storing the corresponding DID documents.<n> DID documents in did:self can be implicit, allowing re-construction of DID documents based on other authentication material.
- Score: 4.265773997354609
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: We introduce did:self, a Decentralized Identifier (DID) method that does not depend on any trusted registry for storing the corresponding DID documents. Information for authenticating a did:self subject can be disseminated using any means and without making any security assumption about the delivery method. did:self is lightweight, it allows controlled delegation, it offers increased security and privacy, and it can be used for identifying people, content, as well as IoT devices. Furthermore, DID documents in did:self can be implicit, allowing re-construction of DID documents based on other authentication material, such as JSON Web Tokens and X.509 certificates.
Related papers
- Governance of Ledger-Anchored Decentralized Identifiers [0.0]
A Decentralized Identifier (DID) empowers an entity to prove control over a unique and self-issued identifier.<n>This article investigates what it means to govern a DID and discusses various forms of how a DID can be controlled by potentially more than one entity.
arXiv Detail & Related papers (2025-03-21T09:41:12Z) - DID Link: Authentication in TLS with Decentralized Identifiers and Verifiable Credentials [0.0]
This article presents DID Link, a novel authentication scheme for TLS 1.3.<n>It empowers entities to authenticate in a TLS-compliant way with self-issued X.509 certificates that are equipped with ledger-anchored DIDs.<n>A prototypical implementation shows comparable TLS handshake durations of DID Link if verification material is cached and reasonable prolongations if it is obtained from a ledger.
arXiv Detail & Related papers (2024-05-13T08:03:32Z) - Secure and Privacy-Preserving Authentication for Data Subject Rights Enforcement [0.0]
We propose an architecture that enables DCs to authenticate DSs with the help of independent Identity Providers.
Our work contributes to a more standardized and privacy-preserving way of authenticating DSs, which will benefit both DCs and DSs.
arXiv Detail & Related papers (2024-04-24T13:17:52Z) - Combining Decentralized IDentifiers with Proof of Membership to Enable Trust in IoT Networks [44.99833362998488]
The paper proposes and discusses an alternative (mutual) authentication process for IoT nodes under the same administration domain.
The main idea is to combine the Decentralized IDentifier (DID)-based verification of private key ownership with the verification of a proof that the DID belongs to an evolving trusted set.
arXiv Detail & Related papers (2023-10-12T09:33:50Z) - Language Models As Semantic Indexers [78.83425357657026]
We introduce LMIndexer, a self-supervised framework to learn semantic IDs with a generative language model.
We show the high quality of the learned IDs and demonstrate their effectiveness on three tasks including recommendation, product search, and document retrieval.
arXiv Detail & Related papers (2023-10-11T18:56:15Z) - Secure access system using signature verification over tablet PC [62.21072852729544]
We describe a highly versatile and scalable prototype for Web-based secure access using signature verification.
The proposed architecture can be easily extended to work with different kinds of sensors and large-scale databases.
arXiv Detail & Related papers (2023-01-11T11:05:47Z) - A new Privacy Preserving and Scalable Revocation Method for Self
Sovereign Identity -- The Perfect Revocation Method does not exist yet [0.0]
Most of the issued credentials need the possibility of revocation.
This paper gives an overview about the available revocation methods, including a survey to define requirements.
It highlights shortcomings of the methods and introduces a new revocation method called Linked Validity Verifiable Credentials.
arXiv Detail & Related papers (2022-11-23T15:49:57Z) - Unsupervised Text Deidentification [101.2219634341714]
We propose an unsupervised deidentification method that masks words that leak personally-identifying information.
Motivated by K-anonymity based privacy, we generate redactions that ensure a minimum reidentification rank.
arXiv Detail & Related papers (2022-10-20T18:54:39Z) - Sample-efficient device-independent quantum state verification and
certification [68.8204255655161]
Authentication of quantum sources is a crucial task in building reliable and efficient protocols for quantum-information processing.
We develop a systematic approach to device-independent verification of quantum states free of IID assumptions in the finite copy regime.
We show that device-independent verification can be performed with optimal sample efficiency.
arXiv Detail & Related papers (2021-05-12T17:48:04Z) - Towards Face Encryption by Generating Adversarial Identity Masks [53.82211571716117]
We propose a targeted identity-protection iterative method (TIP-IM) to generate adversarial identity masks.
TIP-IM provides 95%+ protection success rate against various state-of-the-art face recognition models.
arXiv Detail & Related papers (2020-03-15T12:45:10Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.