July 2018
Intermediate to advanced
324 pages
9h 31m
English
Decentralized identity management promises to overcome key and certificate management challenges, when scaled to millions of machines and human users. Vulnerability, errors, and single points of failure, associated with a centralized root of trust, are also addressed by a decentralized identity scheme.
Public blockchains, such as Bitcoin, use a consensus algorithm, which is replicated across participating nodes. Each transaction is digitally signed by the originator using a private key, and is chained to prior transactions with a digital hash. These cryptographic controls vouchsafe the public key associated with its owner within the blockchain. At the time of this writing, W3C is standardizing an address ...
Read now
Unlock full access