3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography
Title | 3BI-ECC: a Decentralized Identity Framework Based on Blockchain Technology and Elliptic Curve Cryptography |
Publication Type | Conference Paper |
Year of Publication | 2020 |
Authors | Maldonado-Ruiz, D., Torres, J., Madhoun, N. El |
Conference Name | 2020 2nd Conference on Blockchain Research Applications for Innovative Networks and Services (BRAINS) |
Keywords | 3BI-ECC, Authentication protocols, authentication server, authorisation, autonomous network, blockchain, blockchain technology, Blockchains Identity Management, certificate authority, computer network management, computer network security, cryptographic protocols, cybersecurity, decentralize identity management system, Elliptic curve cryptography, elliptic curves cryptography, Identity management, Internet, Metrics, pubcrawl, public key cryptography, Resiliency, Scalability, self-generated certificates, self-generated identity, telecommunication security, three blockchains identity management, trusted third party, TTP |
Abstract | Most of the authentication protocols assume the existence of a Trusted Third Party (TTP) in the form of a Certificate Authority or as an authentication server. The main objective of this research is to present an autonomous solution where users could store their credentials, without depending on TTPs. For this, the use of an autonomous network is imperative, where users could use their uniqueness in order to identify themselves. We propose the framework "Three Blockchains Identity Management with Elliptic Curve Cryptography (3BI-ECC)". Our proposed framework is a decentralize identity management system where users' identities are self-generated. |
DOI | 10.1109/BRAINS49436.2020.9223300 |
Citation Key | maldonado-ruiz_3bi-ecc_2020 |
- decentralize identity management system
- TTP
- trusted third party
- three blockchains identity management
- telecommunication security
- self-generated identity
- self-generated certificates
- Scalability
- Resiliency
- public key cryptography
- pubcrawl
- Metrics
- internet
- elliptic curves cryptography
- Elliptic curve cryptography
- Identity management
- Cybersecurity
- Cryptographic Protocols
- computer network security
- computer network management
- certificate authority
- Blockchains Identity Management
- blockchain technology
- blockchain
- autonomous network
- authorisation
- authentication server
- Authentication Protocols
- 3BI-ECC