A taxonomy of challenges for self-sovereign identity systems

A Satybaldy, MS Ferdous, M Nowostawski - IEEE Access, 2024 - ieeexplore.ieee.org
Creating and utilizing digital identities are fundamental steps towards accessing online
services. In order to facilitate the management of user identities, the concept of identity …

PT-SSIM: A proactive, trustworthy self-sovereign identity management system

ES Fathalla, M Azab, C **n, H Wu - IEEE Internet of Things …, 2023 - ieeexplore.ieee.org
Digital identity management (DIM) systems have become challenging, especially, given the
current progression in ubiquitous environments enclosing cooperative Internet of Things …

Decentralized identity with applications to security and privacy for the internet of things

CDN Kyriakidou, AM Papathanasiou… - Computer Networks …, 2023 - ojs.wiserpub.com
Decentralized Identity (dID) has brought to the forefront the advantages and importance of
total user control over identity. Previous solutions delegate identity management to the …

[PDF][PDF] The Impact of Self-Sovereign Identities on CyberSecurity

M Takaoğlu, T Dursun, A Doğan, H Er… - 2023 - researchgate.net
In this study, it was aimed to examine the effects that can be seen in eliminating the security
vulnerabilities encountered in the cyber security domain with the use of self-sovereign …

FutureDID: A Fully Decentralized Identity System with Multi-Party Verification

H Deng, J Liang, C Zhang, X Liu… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Decentralized identity (DID) systems conforming to the World Wide Web Consortium (W3C)
Decentralized Identifiers (DIDs) and Verifiable Credentials Data Model recommendations …

TrustVault: A privacy-first data wallet for the European Blockchain Services Infrastructure

S Jacobino, J Pouwelse - arxiv preprint arxiv:2210.02987, 2022 - arxiv.org
The European Union is on course to introduce a European Digital Identity that will be
available to all EU citizens and businesses. This will have a huge impact on how citizens …

CRSet: Non-Interactive Verifiable Credential Revocation with Metadata Privacy for Issuers and Everyone Else

F Hoops, J Gebele, F Matthes - arxiv preprint arxiv:2501.17089, 2025 - arxiv.org
Like any digital certificate, Verifiable Credentials (VCs) require a way to revoke them in case
of an error or key compromise. Existing solutions for VC revocation, most prominently …

Combining Verifiable Credentials and Blockchain Tokens for Traceable and Offline Token Operations

S Chenna, C Prehofer - 2023 IEEE 9th World Forum on Internet …, 2023 - ieeexplore.ieee.org
As data becomes an integral part of various industries, it introduces new challenges in the
increasingly connected environment. This gives rise to the necessity for new data sharing …

Enhancing Security in User-Centered Authentication Using KERI

B Boi, M De Santis, C Esposito - 2024 32nd Euromicro …, 2024 - ieeexplore.ieee.org
In the context of the widespread adoption of user-centric authentication methods,
safeguarding the confidentiality of private keys during the exchange of credentials has …

Unstoppable DAOs for web3 disruption

R Chotkan, J Decouchant, J Pouwelse - Proceedings of the 3rd …, 2022 - dl.acm.org
Decentralised Autonomous Organisations (DAOs) have the capability of being a disruptive
Web3 technology. Their usage of cryptographically secure distributed ledgers shows …