In advance of the ID 2020 Design DesignShop on May 21st and 22nd, all participants were requested to submit a 1 or 2 page topics paper to be shared with other attendees on either:
- A specific decentralized identity use case related to the topic of the UN ID 2020 Summit
- A specific problem that you'd like to solve with a decentralized or web-of-trust solution, and why current solutions (pgp or ca-based pki) can't address the problem
- A specific solution related to the decentralized identity or web-of-trust that you'd like others to use or contribute to.
The topic papers submitted are:
- A Double Edge Sword of Having an Identity — by Marta Piekarska <marta@blockstream.io>
- A Self-Sovereign Identity Architecture - by Manu Sporny @msporny and David Longley
- Blockstack: Design and Implementation of a Global Naming System with Blockchains - by Muneeb Ali @muneeb <muneeb@blockstack.com> and Jude Nelson @judecnelson <jude@blockstack.com> and Ryan Shea @ryaneshea <ryan@blockstack.com>
- From Identity to Refugee Status Determination — by Susan R. Ramonat <SRamonat@seic.com>
- Peer Attestation of Identity in the Real World — by Dr Shaun Conway & Lohan Spies
- Sovereign Identity Namespaces — by Drummond Reed @DrummondReed <drummond@respectnetwork.com>
- Identity System Essentials — by Samuel Smith and Dmitry Khovratovich
- Decentralized Identifiers (DIDs) and Decentralized Identity Management (DIDM) — by Les Chasen
- “Immutable Me” - A Discussion Paper Exploring Data Provenance To Enable New Value Chains - by George Samman @sammantic <George.Samman@meeco.me> and Katryna Dow @katrynadow <Katryna.Dow@meeco.me>
- No Secure Protocol = No Sovereign Identity - by Greg Slepak @taoeffect <hi@okturtles.com>
- Questions around key management for digital ID systems - by Christian Lundkvist @chrislundkvist <christian.lundkvist@consensys.net> and Rouven Heck @rh7 <rouven.heck@consensys.net>
- The Path to Self-Sovereign Identity — by Christopher Allen @ChristopherA <ChristopherA@LifeWithAlacrity.com>
- Distibuted Identity Management - Verifiable Claims Exchange Via Agents — by Gary Zimmerman
- Blockstack Rules and Support for Multiple Blockchains — by Muneeb Ali *@muneeb <muneeb@blockstack.com>
- Plurality of Provenance in Distributed Identity — by Joe Andrieu <joe@joeandrieu.com>
- Identity is a Phenomenon, Not a Property — by Joe Andrieu <joe@joeandrieu.com>
- Dex: Deterministic Predicate Expressions for Smarter Signatures — by Peter Todd
- Scaling a BFT Consensus Protocol for Identity — by Jason Law & Lovesh Harchandani
- XDI Graphs in IPFS — by Markus Sabadello
- [Replace Blockchain with DLT (Distributed Ledger Technology)](topics-and-advance-readings/Erik Anderson-USE CASE story.md) — by Erik Anderson
- Blockchain For Capital Markets — by Erik Anderson
- Identity Management IdSec — by Erik Anderson
- Trust-i-ness — by Kaliya "Identity Woman"
- ID2020 - Self-Sovereign Identity - by Patrick Deegan
- Identity and decentralised Communication - By Harsh Patel
- Advanced Web-of-Trust Concepts
- Attempts at common terminology for digital identity systems
- Authorities vs. Peers: Pain Points in Security
- Avoiding Confused Deputy Attack Using Capabilities
- Binding Identity in a Decentralized System
- Blockchain-based Trust for Software Components
- Blockchain Tech Opportunities in the Web-of-Trust
- Building a Web of Trust for E-commerce
- Cool hack with XDI graphs, blockstore, link contracts, and cryptographic identifiers
- Dealing with key loss in digital identity systems
- Decentralized Authentication with Blockchain Auth
- Decentralized Cooperation Needs Decentralized Reputation
- Different Models for Trust
- Distributed multi-ledger model for financial industry
- Distributed Receptor-Based Computing
- Distributed Trust Systems and the Kenyesian Beauty Contest
- First Encounters with PGP
- Hierarchical Deterministic Keys: BIP32 & Beyond
- Identity, Guidance and Situational Awareness
- Identity, Property and Simulation
- Key revocation of lost and stolen keys
- Key Transparency for End Users
- Knowing When Your Digital Identity Has Been Compromised
- Lightning Network and Web of Trust
- Linked Local Names
- Multiplexed: a 'slightly radical' framing of identity
- Modern PKI: Identity Assertions Forming Trust Networks
- PGP Paradigm
- PKI Tools in EVM-based blockchains
- Progressive Trust
- Real life application of WoT: Refugee Use Case
- Reputation and the Real World
- Schnorr Signatures: An Overview
- Secret Handshake: Key Exchange as a Capability System
- Secure Naming on the Blockchain
- Selective Disclosure of Identity with Hierarchical Deterministic Keys and JSON Web Tokens
- Tensions related to identity and community regulation
- The Naming of Things
- Thin Clients
- Trust Exchange: An Architecture for a Permanent Open Trust Network
- Web of Trust with Blockchain IDs
- White Papers, Specifications & Proofs of Concept
- XDI Link Contracts: An Overview
- RLPx: Network for Decentralized Applications
We ask that participants use this repository's Issues pages for comments and questions. We also invite Pull Requests with clarifications and additional links.
Unless otherwise noted, the contents of the files in this directory are the property of each individual author. No grant of license to copy or reuse is made or implied.