Decentralized identifiers

被引:0
作者
Mallare D. [1 ]
Dani N. [1 ]
Bonaci T. [1 ]
机构
[1] Northeastern University, Seattle, 98109, WA
来源
IEEE Potentials | 2023年 / 42卷 / 06期
关键词
723 Computer Software; Data Handling and Applications - 723.5 Computer Applications;
D O I
10.1109/MPOT.2023.3272774
中图分类号
学科分类号
摘要
Today, most of us have more accounts with corresponding usernames and passwords than we can count. Online banking, shopping, streaming, and social media, among other things, require the user to authenticate, or prove, their identity to utilize the provided service. Keeping track of a multitude of accounts becomes burdensome, and many of us turn toward the usage of weak or recycled credentials that pose a security risk. On the other hand, to avoid said security risks, many of us trade our privacy for convenience and use social identities to log in, giving the companies that manage these identities the ability to track our behavior. © 1988-2012 IEEE.
引用
收藏
页码:18 / 24
页数:6
相关论文
共 13 条
  • [1] Allen C., Longley D., Reed D., Sabadello M., Sporny M., Steele O., Decentralized identifiers (DIDs) v1.0 core architecture, data model, and representations, World Wide Web Consortium, W3C Proposed Recommendation, (2021)
  • [2] Avellaneda O., Et al., Decentralized identity: Where did it come from and where is it going?, IEEE Commun. Standards Mag., 3, 4, pp. 10-13, (2019)
  • [3] What is self-sovereign identity?", (2018)
  • [4] SelfKey DID method, (2019)
  • [5] Badretdinov T., How to Create a Bitcoin Wallet Address From a Private Key, (2018)
  • [6] Steele O., JSON web signature 2020, World Wide Web Consortium, (2021)
  • [7] Decentralized identity, own and control your identity [White Paper], (2018)
  • [8] Verifiable credentials, the ultimate beginner's guide, (2021)
  • [9] What are verifiable credentials (VCs), demystified, (2021)
  • [10] Chadwick D., Longley D., Sporny M., Verifiable credentials data model v1.1, World Wide Web Consortium, (2021)