Human-Centric Identity Management
Facebook Twitter LinkedIn

Human-Centric Identity Management

Combined Session
Thursday, May 12, 2022 14:30—15:30
Location: B09

The Identity R/Evolution

The identity r/evolution is ongoing. For a while it seemed that not much has changed since Kim Cameron spearheaded the discussion about “The Laws of identity”. New technologies like Privacy-ABC based on ZKP were ready to provide the user with control over how much personal data he wants to disclose, while promising, commercial solutions were neither accepted by the market nor solving the problem of reliability of transactions exhaustively. Today, the new decentralized digital identity model of Self-Sovereign Identity, utilizing verifiable credentials and Decentralized Identifiers, is giving new hope of finding sustainable solutions. This session will map out the main questions around privacy within this context:

The Identity R/Evolution
Event Recording
The Identity R/Evolution
Click here to watch the recording of this session. You'll need to log in to watch it.
The Identity R/Evolution
Presentation deck
The Identity R/Evolution
Click here to download the slide deck. Please note that downloads are only available for event participants and subscribers. You'll need to log in to download it.
Mark Thompson
Mark Thompson
IAPP - International Association of Privacy Professionals
Mark is Director of Research and Insights at International Association of Privacy Professionals. In this role, Mark is focused on providing, relevant, strategic and pragmatic research and insights...

Credentials and Privacy - History and New Kinds of Cards

David will talk aboout a new technology that allows the person owning a public key to prove that they have memorized a passphrase, from which they could at any time easily compute the private key.
One example use is for votexx.org elections, which are conducted remotely without polling places. The ballot-casting in such elections is done by a signature that is publicly verifiable as corresponding to a particular public key posted in advance by the election authority. The voter registration authority would require a proof that the voter knows the corresponding passphrase and hence ensures that the voter has irrevocable access to the private key corresponding to the posted public key. This lets the voter give all of their keys (in an extreme case) to a vote buyer and/or coercer – while the voter is never able to give up knowledge of the passphrase and the ability that it confers to secretly cancel any vote made with the corresponding private key. This is just one example David will feature in his presentation.

David Chaum
David Chaum
xx network, Elixxir.io
David founded xx network, a lead blockchain platform supporting secure, private decentralized messaging and payments. Designed to address public concern for user privacy and the threat of quantum...

Tickets

On-Demand Access
Re-live EIC 2022
€300
 
Watch 200 sessions on-demand
Download all available presentations
Subscribe for updates
Please provide your email address