Who Watches the Watchmen? A Review of Subjective Approaches for Sybil-resistance in Proof of Personhood Protocols

07/26/2020
by   Divya Siddarth, et al.
0

Most current self-sovereign identity systems may be categorized as strictly objective, consisting of cryptographically signed statements issued by trusted third party attestors. This failure to provide an input for subjectivity accounts for a central challenge: the inability to address the question of "Who verifies the verifier?". Instead, these protocols outsource their legitimacy to mechanisms beyond their internal structure, relying on traditional centralized institutions such as national ID issuers and KYC providers to verify the claims they hold. This reliance has been employed to safeguard applications from a vulnerability previously thought to be impossible to address in distributed systems: the Sybil attack problem, which describes the abuse of an online system by creating many illegitimate virtual personas. Inspired by the progress in cryptocurrencies and blockchain technology, there has recently been a surge in networked protocols that make use of subjective inputs such as voting, vouching, and interpreting, to arrive at a decentralized and sybil-resistant consensus for identity. In this article, we will outline the approaches of these new and natively digital sources of authentication – their attributes, methodologies strengths, and weaknesses – and sketch out possible directions for future developments.

READ FULL TEXT
research
11/10/2017

Consensus in the Age of Blockchains

The blockchain initially gained traction in 2008 as the technology under...
research
12/17/2021

Decentralized Identifiers and Self-sovereign Identity in 6G

One of the key challenges for mobile network operators in the future wil...
research
07/01/2020

A Truly Self-Sovereign Identity System

Digital identity is essential to access services such as: online banking...
research
08/10/2022

Distributed Attestation Revocation in Self-Sovereign Identity

Self-Sovereign Identity (SSI) aspires to create a standardised identity ...
research
07/17/2018

A Survey on Essential Components of a Self-Sovereign Identity

This paper provides an overview of the Self-Sovereign Identity (SSI) con...
research
03/01/2022

Towards Decentralized Identity Management in Multi-stakeholder 6G Networks

Trust-building mechanisms among network entities of different administra...
research
12/01/2019

VMV: Augmenting an Internet Voting System with Selene Verifiability

Online voting in the UK generally takes place without verifiability mech...

Please sign up or login with your details

Forgot password? Click here to reset