So a while back I came across the text in “On Identity” by Amin Maalouf (2000)  that the requirement for an identity boils down to the information required to keep someone from impersonating, not really the information required to identify or establish an identity.  Not sure it helps but may  change the perspective, I have found this useful at times.  Sal

 

From: dg-bsc-bounces@kantarainitiative.org [mailto:dg-bsc-bounces@kantarainitiative.org] On Behalf Of j stollman
Sent: Thursday, September 08, 2016 11:42 AM
To: John Wunderlich
Cc: hardjono@media.mit.edu; dg-bsc@kantarainitiative.org
Subject: Re: [DG-BSC] User-Managed Identities for Blockchains (using UMA for user-centric control over blockchain identities)

 

John,

 

With respect to your comment, "I think you have correctly identified a normative inverse relationship  between "Core Identity" attributes what should be written openly to a blockchain":

 

I share your belief in the separation of a Core Identity from attributes included in various personas that may be unveiled to particular RPs.  But it is not clear to me where one can draw the line.  The Core Identity needs to have enough data to authenticate the user and his/her various personas, so that the RP can then authorize activity based on the attributes provided in the persona.  But what data and how much of it do we need to unmistakably authenticate the user?  The more attributes we include in the Core Identity, the more vulnerable the user becomes to having that data used against them by an adversary who can break into the Core Identity repository.  

 

Jeff


 

---------------------------------

Jeff Stollman

+1 202.683.8699

 

Truth never triumphs — its opponents just die out.

Science advances one funeral at a time.

                                    Max Planck

 

On Thu, Sep 8, 2016 at 7:18 AM, John Wunderlich <john@wunderlich.ca> wrote:

Thomas;

 

This aligns well with Canadian privacy views of a 'biographical core' and the social reality that we all have many identities that we present to the world. When I read this and note the piece that I just posted about the potential conflict between the GDPR 'right to erasure' and Blockchain, I think you have correctly identified a normative inverse relationship  between "Core Identity" attributes what should be written openly to a blockchain. Exciting work.

 

John Wunderlich,

Sent frum a mobile device,
Pleez 4give speling erurz

"...a world of near-total surveillance and endless record-keeping is likely to be one with less liberty, less experimentation, and certainly far less joy..." A. Michael Froomkin

 



On Thu, Sep 8, 2016 at 12:23 AM -0400, "Thomas Hardjono" <hardjono@mit.edu> wrote:

Folks,
 
This may or may not be a use-case proper for BSC-DG, but I thought I'd mention it here because its an "infrastructure" technology that supports scaling of blockchains. (analogy:  DNS is not part of Internet routing in TCP/IP, but it sure does help us use the Internet).
 
One of the key concepts we (at MIT) are trying to develop further in CoreID (diagram is here http://www.findthomas.net/blog/). Part of it is the idea of a new kind of identity provider called the "persona provider" (PP)
 
The Persona Provider could be implemented as a combination of an UMA Authorization Server combined with an UMA Resource Server. (PP = AS + RS).
 
When Alice creates an account at the Persona Provider (PP), she convinces the PP initially that she is legit by supplying the PP with signed assertions (blinded assertion) which the Core Identity Issuer (upstream) has created.
 
When Alice needs to transact on the blockchain using an anonymous-verifiable identity, she goes to her account at the PP and self-generates a transaction-identity (transaction-identifier) to be used on the blockchain or within a smart contract. She can self-generate as many transaction-identifiers as she needs -- no limit.  The PP provides the crypto-tools to do this (just like bitcoin-wallets / client softwares or PGP).
 
At the same time, she could optionally set policy on the account, treating the the blinded assertions (from the Core Identity Issuer) as resources.  The transaction identities (which are anonymous-verifiable strings) can also be treated as resources sitting on the PP.
 
The PP keeps these transaction-identifiers as long as she needs, and may even archive them.  
 
The PP also makes available a Identity Verification end-point (API) that allows the counter-party (RP) -- or anyone for that matter -- to verify a transaction-identifier found on a blockchain or in a smart-contract.
 
 
If this is useful, I can write it up for the use-cases page.
 
/thomas/
_______________________________________________
DG-BSC mailing list
DG-BSC@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/dg-bsc

 

 

This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error please notify the system manager. This message contains confidential information and is intended only for the individual named. If you are not the named addressee you should not disseminate, distribute or copy this e-mail. Please notify the sender immediately by e-mail if you have received this e-mail by mistake and delete this e-mail from your system. If you are not the intended recipient you are notified that disclosing, copying, distributing or taking any action in reliance on the contents of this information is strictly prohibited.


_______________________________________________
DG-BSC mailing list
DG-BSC@kantarainitiative.org
http://kantarainitiative.org/mailman/listinfo/dg-bsc