scispace - formally typeset
Book ChapterDOI

SPROOF: A Decentralized Platform for Attribute-Based Authentication

Reads0
Chats0
TLDR
This paper presents a decentralized platform for signing and verifying digital documents that is based on the previously presented SPROOF platform and additionally supports attribute-based authentication.
Abstract
Paper documents are still very common for all types of records of personal achievements, ID cards and many other types documents issued to an individual or a company These paper documents, however, often come at the cost of expensive printing and issuing, loss of data or malicious counterfeits The origin and integrity is often hard or even impossible to be verified Digital signatures solve some of these issues, however, this still requires centralized trusted infrastructures and still does not allow for easy verification or recovery of lost documents Furthermore, attribute-based authentication is not possible with traditional signature schemes In this paper, we present a decentralized platform for signing and verifying digital documents that is based on the previously presented SPROOF platform and additionally supports attribute-based authentication This platform allows for issuing, managing and verifying digital documents in a public blockchain In the proposed approach, all data needed for verification of documents and issuers is stored decentralized, transparent, and integrity protected The platform is permissionless and thus no access restrictions apply Rather, following principles of the Web of Trust, issuers can confirm each other in a decentralized way Additionally, scalability and privacy issues are taken into consideration

read more

Citations
More filters
Journal ArticleDOI

Decentralized and permission-less green energy certificates with GECKO

TL;DR: In this paper, a decentralized and permission-less system for issuing, receiving and verifying Green Energy Certificates for kWh Ownership (GECKO) similar to the established renewable energy certificates or Green Tags is presented.
Journal Article

Analysis of Digital Sovereignty and Identity: From Digitization to Digitalization

TL;DR: This paper conducts a systematic study and analysis of Self-Sovereign Identity, and discusses existing solutions and point out that an efficient key management system, scalability and interoperability of the solutions and well established standards are some of its challenges and open problems to wide deployments.
References
More filters
Journal ArticleDOI

New Directions in Cryptography

TL;DR: This paper suggests ways to solve currently open problems in cryptography, and discusses how the theories of communication and computation are beginning to provide the tools to solve cryptographic problems of long standing.
Journal ArticleDOI

Blockchains and Smart Contracts for the Internet of Things

TL;DR: The conclusion is that the blockchain-IoT combination is powerful and can cause significant transformations across several industries, paving the way for new business models and novel, distributed applications.

Ethereum: A Secure Decentralised Generalised Transaction Ledger

Gavin Wood
TL;DR: Ethereum as mentioned in this paper is a transactional singleton machine with shared state, which can be seen as a simple application on a decentralised, but singleton, compute resource, and it provides a plurality of resources, each with a distinct state and operating code but able to interact through a message-passing framework with others.
Journal ArticleDOI

The Elliptic Curve Digital Signature Algorithm (ECDSA)

TL;DR: The ANSI X9.62 ECDSA is described and related security, implementation, and interoperability issues are discussed, and the strength-per-key-bit is substantially greater in an algorithm that uses elliptic curves.
Proceedings ArticleDOI

Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts

TL;DR: In this article, the authors present Hawk, a decentralized smart contract system that does not store financial transactions in the clear on the blockchain, thus retaining transactional privacy from the public's view.
Related Papers (5)