Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (3)

Search Parameters:
Keywords = universal digital wallet

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
15 pages, 406 KiB  
Article
Key Backup and Recovery for Resilient DID Environment
by Jihwan Kim, Pyung Kim, Younho Lee and Daeseon Choi
Mathematics 2024, 12(6), 830; https://doi.org/10.3390/math12060830 - 12 Mar 2024
Viewed by 829
Abstract
This paper delves into the advantages of authentication algorithms employing self-sovereign identity, highlighting a reduced communication overhead and the elimination of single points of failure. However, it acknowledges the vulnerability of digital wallets to real-world issues like loss or theft. To address these [...] Read more.
This paper delves into the advantages of authentication algorithms employing self-sovereign identity, highlighting a reduced communication overhead and the elimination of single points of failure. However, it acknowledges the vulnerability of digital wallets to real-world issues like loss or theft. To address these challenges, we propose an efficient key backup and recovery protocol based on the FROST threshold signature algorithm. This protocol involves trusted third parties and backup devices, ensuring secure secret key sharing and rapid key recovery. Performance evaluations, including key recovery time, demonstrate the protocol’s efficiency and reliability, bolstering the overall robustness of self-sovereign identity systems. Full article
(This article belongs to the Special Issue Trends in Cryptography and Information Security)
Show Figures

Figure 1

20 pages, 4593 KiB  
Article
Verification of Education Credentials on European Blockchain Services Infrastructure (EBSI): Action Research in a Cross-Border Use Case between Belgium and Italy
by Evrim Tan, Ellen Lerouge, Jan Du Caju and Daniël Du Seuil
Big Data Cogn. Comput. 2023, 7(2), 79; https://doi.org/10.3390/bdcc7020079 - 18 Apr 2023
Cited by 7 | Viewed by 4388
Abstract
The European Blockchain Services Infrastructure (EBSI) is a major policy initiative of the EU and European Blockchain Partnership, to leverage blockchain to create cross-border services for public administrations, businesses, citizens, and their ecosystems, to verify information and increase trust in services. The EBSI [...] Read more.
The European Blockchain Services Infrastructure (EBSI) is a major policy initiative of the EU and European Blockchain Partnership, to leverage blockchain to create cross-border services for public administrations, businesses, citizens, and their ecosystems, to verify information and increase trust in services. The EBSI aims to provide a secure and interoperable system infrastructure, utilizing new digital technologies such as digital wallets, verifiable credentials, and decentralized identifiers. These technologies are expected to change the way government services are organized between citizens and service providers. This article presents empirical findings from a cross-border pilot that was the first case to utilize this new blockchain infrastructure, and which tested the institutional, technical, and user-specific requirements for wider adoption. The pilot tested and assessed the verification of education credentials through the EBSI blockchain in a cross-border setting between a Belgian and an Italian university. The research was based on action research with the ICT units of the participating universities, wallet solution providers, the Belgian government, and EBSI officials. The findings highlight the following as key challenges for the wider adoption of the EBSI and verification credential use case: (1) onboarding of the EBSI ecosystem governance, (2) issuance of EBSI-compliant digital wallets and data schemes for transcript validation, (3) interoperability issues concerning digital identity systems. Full article
Show Figures

Figure 1

14 pages, 2922 KiB  
Article
A Study on the Interoperability Technology of Digital Identification Based on WACI Protocol with Multiparty Distributed Signature
by Jihwan Kim, Pyung Kim, Daeseon Choi and Younho Lee
Sensors 2023, 23(8), 4061; https://doi.org/10.3390/s23084061 - 17 Apr 2023
Cited by 2 | Viewed by 1743
Abstract
In digital identity authentication, credentials are typically stored in a digital wallet and authenticated through a single key-based signature and public key verification. However, ensuring compatibility between systems and credentials can be challenging and the existing architecture can create a single point of [...] Read more.
In digital identity authentication, credentials are typically stored in a digital wallet and authenticated through a single key-based signature and public key verification. However, ensuring compatibility between systems and credentials can be challenging and the existing architecture can create a single point of failure, which can hinder system stability and prevent data interchange. To address this problem, we propose a multiparty distributed signature structure using FROST, a Schnorr signature-based threshold signature algorithm, applied to the WACI protocol framework for credential interaction. This approach eliminates a single point of failure and secures the signer’s anonymity. Additionally, by following standard interoperability protocol procedures, we can ensure interoperability during the exchange of digital wallets and credentials. This paper presents a method that combines a multiparty distributed signature algorithm and an interoperability protocol, and discusses the implementation results. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

Back to TopTop