-
Notifications
You must be signed in to change notification settings - Fork 451
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
self-sovereign identity system #2682
Comments
Homo Autonomous: beyond Homo EconomicusWe describe a vision with a high ambition level, devising an economic ecosystem in which people are autonomous. A realistic roadmap is presented to provide people and organisations with more autonomy and tools to take charge of their own identity and economic interactions. We describe the self-goverance paradox: freedom is created by restricting economic interactions, specifically by eliminating middleman roles and only permitting self-regulation. Our desire is to empower people and shield them from cascading failures of the global economy. Consequences from security leaks, equipment outages, and economic shocks can be dampened when economic actors are no longer tightly coupled. People can take charge of their own affairs when economic transactions are restricted to pair-wise direct interactions and never require permission from an identity provider, market maker, blockchain operator, or platform owner. We define this principle as Homo Autonomous. Homo Economicus is the concept in many economic theories portraying humans as consistently rational and narrowly self-interested agents who usually pursue their subjectively-defined ends optimally. This concept fails to take into account the experimental evidence that human actors exhibit herding behavior. Laws restrict economic transactions, people are not free to trade food, energy, and goods in general. Consumer protections laws ensures malicious actors are dealt with. eBay has operated a market platform for the past 22 years, recently joined by Uber and AirBnB. They rely on feedback from anonymous Internet users to establish transactions between strangers. Creating such matchmaking platforms is the battleground for hundreds of startups, striving for scaling effects and global market leader status. Few viable initiative exist to create a generic decentralised non-profit platform. Often initiatives control the platform, the blockchain, the oversight foundation, or are influential members of The key technical challenge is to establish the ... ToDo! requirements: identity, authentication, trust/reputation mechanism, contracting facilities, and tamper-proof register of legal |
Smart contracts are the natural layer to build on top of solid trust and identities. However, that is extremely inefficient due to current lack of concurrency and high-throughput for the execution model. No trust exists. Ecosystem primitives to build on:
|
Zero-knowledge proof of credentials and any attribute Microsoft + University College London paper Algebraic MACs and keyed-verification anonymous credentials
Impressive work. Python code. It is a limited solution, as you can only prove matters to the central issuers. "The scale and complexity of information systems evolve towards overwhelming the capability of system administrators, programmers, and designers." |
blockchain for: identity, transitive trust and transactions within logistics, healthcare, and energy sectorWe propose a project with a high ambition level: showing how it is possible to re-organise economic Three critical parts of our economy struggle with the same problem: the lack of a single trustworthy digital infrastructure to exchange information reliably, process transactions efficiently, store legal records durably, and seamlessly integrate transfer of funds. This is caused by the lack of trust in electronic form, absence of legally valid digital signatures, and shortage in usable electronic identities.
The enabling breakthroughs we will devise are: creating the fabric for trusted information exchange, The economic importance of solving the trust problem is hard to overstate. The invention of GPS created entirely new industries and radically altered others. The core TCP/IP Internet protocol radically dropped the price of communication and computation. This project aims to offer a breakthrough in creating trust. |
you are the Internetskiller app brainstorm Every concept and new infrastructure requires viral first-time usage. We envision an Internet where everybody moves messages for others. Basically, offer free wireless Internet by relaying traffic for each other. Such systems are know to be highly robust and can be made resilient to numerous natural disasters. This concept integrates self-sovereign identity, ad-hoc networking, bandwidth accounting, and your contribution and standing within the wireless bandwidth commons. See a simple sketch from many years ago: This idea is now over 20 years old. However, in the past the required technology was never ready for broad usage. The incentive problem never got solved. We and others now slowly getting the required pieces ready. In 2005 we had our first operational ad-hoc forwarding network, called wifi walkman. In 2007 we introduced the bandwidth-as-a-currency vision. In 2009 we got our decentral social network operational and deployed. We wrote about the self-sovereign ability back in 2012, for a IETF Internet draft writeup. Relaying bytes between friends requires an offline social network.
We now have an operational decentral market and we're making it resilient to attacks. Plus there is finally support for soft base-stations on Android, see support lib. This means it is possible to offer Internet bandwidth, boost your reputation, and sell your bandwidth reputation credits on the open market. The self-sovereign identity part is essential to prevent lying, misreporting, collusion, and sybil attacks. We can create a strong social fabric through key attestation. |
PUF technology is an emerging technology to store the essential part of a self-sovereign identity, the private key, in a tamper-proof manner. The private key is storage becomes volatile by using PUF technology [Patents]. For TUDelft publication on PUF technology: "Modeling SRAM start-up behavior for physical unclonable functions" More sophisticated 2015 work The popular 6Ts SRAM cell (see Fig. 2(a)) consists of two cross-coupled CMOS inverters formed by four transistors (Q 1 with Q5 and Q2 with Q6) and two pass transistors (Q3 and Q4). The pass transistors are used to access the cell for read and write operations. The bitline (BL), the compliment bitline (BLB) and the wordline (WL) are used to access the cell. We simulate the start-up behavior of an SRAM cell using SPICE and BSIM4 65nm models. Process variation PDF for 65nm : |
By using secure multiparty computation it is possible to conduct calculations in the encrypted domain, the inputs of participants remain private. Homomorphic encryption is a more efficient mechanism. In 2014 we crafted a social network in the encrypted domain using the Pallier homomorphic crypto system, providing user with privacy. In 2006 a generic mechanism also based on Pallier, specifically usable for attribute-agnostic self-sovereign identities Thnx @qstokkink |
Decentralized markets do not need 'legally valid' signatures they need 'valid signatures'. Once you have a sovereign enough identity system that is managing enough resources 'legal' ceases to offer any meaningful value. Perhaps 'self-sovereign signatures' instead? |
@qstokkink
|
Several scientific publications exist on this topic. Seven years ago this field looked different, for example A Roadmap for the Comparison of Identity Management Solutions: A more up to date (December 2016), but also already outdated overview can be found in Blockchain for Identity Management - Ori Jacobovitz Also, here is a small extension of your table:
|
Managing your private key for your core identity is still the main problem. Efficient loss recovery and theft locking. You can generate your own private key and do loss recovery through biometrics. Alternative or supplementary to our PUF prototypes. Scientific paper: |
It is now 2020, we officially open this #2682 SSI research issue on 14Dec 2016. We will now specifically analyse the main project also working in this field: Cardano (thnx the the tip @xoriole!) with a new SSI solution. Cardano is sponsoring the largest blockchain research ecosystem with 27 affiliated professors and researchers: IOHK. It is not only a new entrant to SSI, but also the largest research team in the world around blockchain matters. Their research is on a larger scale then ours, more speculative, less feedback from assumption testing, and mostly focused on a single industry: finance. Their SSI solution is to "enable low-income populations to store and share personal information like credentials, land deeds, and health records". Their exact july 2020 announcement (see also eyecandy demo).
IOHK is sponsored by Cardano. Their marketing storyline is similar to ours (but profit-driven by transaction fees).
Their marketing is very professional, see their roadmap. Has everything in it we have been working on for 15 years in their 5 releases. Their proof-of-stake will not scale, but they will quickly change to our line of research if proven superior. |
Our ideas from 2007-2016 are becoming mainstream. |
PR brainstorm : Self-sovereign digital EU economyOur digital economy is critically reliant on Big Tech, Big Banks, and Big Telecom. No self-sovereign identity, money or marketplace exists. Our goal is to design and deploy collectively maintained public infrastructure for ID, money, trust, data, and AI. Collectively maintained public infrastructure is notoriously difficult to design and evolve. A zero-trust and cybersecurity framework is needed to underpin the EU digital economy. Oslo University and Delft University of Technology are the key scientific partners within the EBSI-NE consortium (grant call DIGITAL-2022-DEPLOY-02). We aim to provide a minimal proof-of-principle online economy with actual people, real money, and real application. Design principle are security grounded in the laws of physics and maths. For instance, hardware fingerprinting, speed-of-light bounds4, quantum-proof hashing functions, and fake-identity resilient trust frameworks 5. Our online economy will be grounded in EBSI and serverless wallet-to-wallet communication. We aim show that our self-sovereign technology is meticulously engineered to have no controlling centre and therefore prevents centralisation of power. We believe our innovative approach to self-governance of AI, data, and identity can be scaled from a proof-of-principle economy towards a new economic organisational model for the EU. |
A wealth of applications require strong authentication and long-lived secure identities. The Internet requires a common continuously evolving strong identity layer. This would make the Internet safer, better and more efficient. A single common identity layer also needs full decentralisation and self-governance. Approaches with central servers and static enforced standards are doomed to fail.
24 years of failure
For over 24 years all attempts to build a common Internet Identity layer have failed. "Identity is a mess". The first big documented attempt at building a web-of-trust was in 1992, the PGP 2.0 web of trust protocol. PGP has failed to reach even a moderate userbase outside of crypto enthusiasts, and while part of this, as the author suggests, is painful UI, a large part is also that the web of trust model is unreasonably demanding for most cases. The 1992 web-of-trust design operates as follows:
(2023 update: keybase is mostly inactive and the sharing service is shutdown) In 2015 Keybase.io obtained a $10.8M investment. They started as a PGP keyserver hobby project, now their goal is to bring public key crypto to everyone in the world, even people who don't understand it.
Keybase.io aims to solve the essential identity problem, confirming identity: how do you get public keys, safely & on-demand. They created a fascinating decentralised identity system, offering:
Blockchain technology provides the missing element to create a global Internet Identity layer, tamper-proof identities, in our opinion. The security of the whole ecosystem relies on authenticated public keys. Each participant has access to your public key and trusts that it really belongs to you, along with a verification proof. The missing element from Keybase and other server-based solutions is fully automated detection of corruption in any part of the global infrastructure. Central identity servers from Google, Facebook, and RSA are essentially data honeypots. They always get compromised. End-to-end integrity checking and tamper-proofness is required. It is insufficient to base security and integrity on "out-of-band secure communication" (e.g. like manual comparing server Merkle hashes). Strong state-based adversaries have the proven ability to compromise highly-connected nodes in the web of trust, compromise servers, and falsify real-world identity documents. As continued hacks of the global inter-banking system show, a system is only as strong as it's weakest server/country/module or Flash plugin version. Current identity systems are fragmented and siloed between various service providers, requiring password managers and resulting in insecure systems. Blockchain technology is still maturing, but has the ability to provide a tamper-proof ecosystem with automated end-to-end integrity checking.
Tribler identity and blockchain expertise
On June 2000 the Tribler team published sketches of 'open information pools' with a crowdsourced identity system module: unbiased truth about subjects, phenomena, people, place, objects, companies, etc. Today we have made significant progress on our technology for creating trust, enabling strong identities, and offering strong privacy. In years past we crafted 125+ scientific articles, 1+ million lines of code, and experienced how ones creates an IETF Internet Standard. However, we never managed to get any significant traction of our trust & identity work outside our own application context: a European Youtube service. Usage and usability are essential.
In the past years the term self-sovereign identity has become popular. The tech community (excluding scientific community), forms the core of this movement, centered around the decade-long running Internet identity workshop series. In 2015 the DAO made strong autonomy both realistic, popular, and also demonstrated consistent security problems. The cardinal design principle of Tribler is autonomy, no servers, no trusted third parties and no external dependencies. We aim to create a new type of self-organising system: based on self-governance. We prefer the term self-governance instead of self-sovereign, as it implies the need for authority at the community level for long-term sustainability. The requirement for governance has been proven by the Bitcoin civil war and DAO forking. We believe a key test for identity systems is making them future-proof, with even a smooth upgrade path to quantum-safe crypto. Self-governance is a required condition for a sustainable future-proof identity system. Our scientific definition:
Scientific Roadmap and design
in progress
Requirements for a "passport-grade identity system".
Cardinal design principle: self-reinforcing trust of digital identities
ToDo; this will address the sybil attack to a large extend and thus make the Internet significantly safer and more reliable.
The text was updated successfully, but these errors were encountered: