Explore chapters and articles related to this topic
Blockchain Technology and Its Emerging Applications
Published in Sudhir Kumar Sharma, Bharat Bhushan, Aditya Khamparia, Parma Nand Astya, Narayan C. Debnath, Blockchain Technology for Data Privacy Management, 2021
N. Rahimi, I. Roy, B. Gupta, P. Bhandari, N. C. Debnath
For blockchain technology to work safely, every transaction needs to have a digital identity. These identities are created by using a combination of private keys and public keys. This combined identity is the digital signature used in blockchain [10,11,12,13,14].
Application of Blockchain Technology to Make Smart Cities Smarter
Published in Arun Solanki, Vishal Jain, Loveleen Gaur, Applications of Blockchain and Big Iot Systems, 2023
Yogita Borse, Purnima Ahirao, Kunal Bohra, Nidhi Dedhia, Yash Jain, Rohit Kasale, Unmesh Madke
Hence it is now vital that traditional identity management systems see the transformation onto digital identity schemes using blockchain, which will let users manage their identity easily.
On-chain global maintenance services: technical, legal and managerial implications
Published in International Journal of Parallel, Emergent and Distributed Systems, 2023
Andrea Vitaletti, Maurizio Pizzonia, Marco Zecchini, Diego Pennino, Salvatore Esposito De Falco, Francesco Pacileo, Alessandro Bellini, Antonio Bonifacio, Domenico Sardanelli, Pietro Vito, Simone Naldini
The GSM requires the identification of the parts, both for the purpose of mapping the responsibilities (accountability) and for verifying the suitable professional skills of the Facility Manager and of the sub-suppliers/contractors. Nowadays, digital identity is usually guaranteed by trusted identity providers such as Facebook (Facebook Connect) and Google (Google Sign-In) which have control of the information associated with users identities. Self-sovereign identity (SSI) [32] is a new approach to digital identity that gives individuals control over the information they use to prove their identity instead of relying on trusted identity providers. In an SSI system, users generate and control unique identifiers called decentralized identifiers (DiD). Most SSI systems are decentralized and the credentials are managed using crypto wallets and verified using public-key cryptography anchored on a distributed ledger [33].
Users’ Adoption of National Digital Identity Systems: Human-Centric Cybersecurity Review
Published in Journal of Computer Information Systems, 2022
Malyun Hilowle, William Yeoh, Marthie Grobler, Graeme Pye, Frank Jiang
National digital identity systems are important because they enable different e-government services to maintain security by only permitting access to legitimate, verified users. This enables the resources (e.g., networks, databases, computer systems, services, websites) to remain protected. As the Internet is a public network, users must prove who they are before being granted access. The different authentication methods (e.g., password-based, multi-factor, certificate-based, biometrics, token-based) enable accountability by allowing access to specific identities. Further, national digital identity systems reduce identity theft and empower the protection of information-driven services for individuals, such as in the healthcare, financial, and education domains. National digital identity systems allow users to establish their digital identity. They must be verified first, so confidential e-authentication facilitates this process to verify users and establish they are who they say they are.9
A secure hash function based on feedback iterative structure
Published in Enterprise Information Systems, 2019
Yijun Yang, Fei Chen, Jianyong Chen, Yong Zhang, Kai Leung Yung
This paper improves Merkle-Damgard construction by using structured message preprocessing, feedback iterative structure framework, truncation module and iteration module, which can accelerate message diffusion and increase uncertainty of hash value. Based on both theoretical and experimental analysis, a hash function with FISH has additional Truncation, Iteration operation and optimized compression function, which can overcome system loopholes such as non-uniform distribution, statistical attack, differential attack, low avalanche properties and low processing speed. Using compression function with less multiplication in Figures 4–6 can effectively improve efficiency. Comparing with other popular hash functions, a hash function with FISH employs dynamic random number generator, which keeps FISH resistant to classical attacks on known hash schemes when high diffusion between message blocks through random behaviour of internal compression function. It brings better performance on statistical properties and avalanche effect, which is reliable and can benefit its implementation. Real-time processing and security will help new technologies such as blockchain to offer a solution to many digital identity issues. Blockchain-based authentication systems are based on irrefutable identity verification using a hash function as one of its core technology, which will certainly become one of its important research direction.