ACKNOWLEDGEMENTS
This work was supported by the European Union’s
Horizon 2020 Framework Programme for Research
and Innovation under grant agreement No. 871473
(KRAKEN).
REFERENCES
Abraham, A. (2017). Self-Sovereign Identity - Whitepa-
per about the Concept of Self-Sovereign Identity
including its Potential. https://technology.a-sit.at/
en/whitepaper-self-sovereign-identity/, Online, Ac-
cessed: 2021-02-10.
Abraham, A., H
¨
orandner, F., Omolola, O., and Ramacher,
S. (2019). Privacy-preserving eid derivation for self-
sovereign identity systems. In Information and Com-
munications Security ICICS 2019, Beijing, China,
volume 11999 of LNCS, pages 307–323. Springer.
Alastria (2021). Alastria Builds Future. https://www.
alastria.io/en/, Online, Accessed: 2021-02-09.
Boneh, D., B
¨
unz, B., and Fisch, B. (2019). Batching tech-
niques for accumulators with applications to iops and
stateless blockchains. In Boldyreva, A. and Miccian-
cio, D., editors, Advances in Cryptology – CRYPTO
2019, pages 561–586, Cham. Springer International
Publishing.
Commission, T. E. (2015). Commission implementing reg-
ulation (eu) 2015/1502. Online, Accessed: 2021-01-
20.
Dai, W., Wang, Q., Wang, Z., Lin, X., Zou, D., and Jin,
H. (2021). Trustzone-based secure lightweight wallet
for hyperledger fabric. Journal of Parallel and Dis-
tributed Computing, 149:66–75.
Dong, C., Wang, Z., Chen, S., and Xiang, Y. (2020). BBM:
A blockchain-based model for open banking via self-
sovereign identity. In Chen, Z., Cui, L., Palanisamy,
B., and Zhang, L., editors, Blockchain - ICBC 2020
- Third International Conference, Held as Part of
the Services Conference Federation, SCF 2020, Hon-
olulu, HI, USA, September 18-20, 2020, Proceedings,
volume 12404 of Lecture Notes in Computer Science,
pages 61–75. Springer.
Foundation, T. L. (2021). dizme. https://www.dizme.io,
Online, Accessed: 2021-02-09.
Houtan, B., Hafid, A. S., and Makrakis, D. (2020). A survey
on blockchain-based self-sovereign patient identity in
healthcare. IEEE Access, 8:90478–90494.
International Organization for Standardization (ISO)
(2013). ISO/IEC 29115:2013(en) Information
technology — Security techniques — Entity authen-
tication assurance framework. Online, Accessed:
2021-01-20.
Iqbal, S., Irfan, M., Ahsan, K., Hussain, M. A., Awais,
M., Shiraz, M., Hamdi, M., and Alghamdi, A.
(2020). A novel mobile wallet model for elderly us-
ing fingerprint as authentication factor. IEEE Access,
8:177405–177423.
Jolocom (2021). Jolocom Decentralized identity & access
management. https://jolocom.io/, Online, Accessed:
2021-02-09.
Kondova, G. and Erbguth, J. (2020). Self-sovereign iden-
tity on public blockchains and the gdpr. In Proceed-
ings of the 35th Annual ACM Symposium on Applied
Computing, SAC ’20, page 342–345, New York, NY,
USA. Association for Computing Machinery.
Li, J., Li, N., and Xue, R. (2007). Universal accumulators
with efficient nonmembership proofs. In Katz, J. and
Yung, M., editors, Applied Cryptography and Network
Security, pages 253–269, Berlin, Heidelberg. Springer
Berlin Heidelberg.
Liu, Y., Lu, Q., Paik, H., Xu, X., Chen, S., and Zhu, L.
(2020). Design pattern as a service for blockchain-
based self-sovereign identity. IEEE Softw., 37(4):30–
36.
Manski, S. (2020). Distributed ledger technologies, value
accounting, and the self sovereign identity. Frontiers
Blockchain, 3:29.
Naik, N. and Jenkins, P. (2020). Self-sovereign iden-
tity specifications: Govern your identity through
your digital wallet using blockchain technology. In
2020 8th IEEE International Conference on Mobile
Cloud Computing, Services, and Engineering (Mo-
bileCloud), pages 90–95.
National Institute of Standards and Technology (NIST)
(2020). NIST Special Publication 800-63 - Digital
Identity Guidelines. Online, Accessed: 2021-02-05.
Sporny, M., Longley, D., and Chadwick, D. (2019). W3C
Verifiable Credentials Data Model 1.0. Online, Ac-
cessed: 2021-01-20.
The FIDO Alliance (2020). Fast Identification Online
(FIDO) - Specifications . Online, Accessed: 2021-
01-20.
W3C (2020a). Verifiable credentials data model 1.0. https://
www.w3.org/TR/vc-data-model/#proof-formats, On-
line, Accessed: 2021-01-27.
W3C (2020b). Webauthn2: Collectedclient-
data. https://www.w3.org/TR/webauthn/
#dictdef-collectedclientdata, Online, Accessed:
2021-01-27.
W3C (2020c). Webauthn2: Packed attestation state-
ment format. https://www.w3.org/TR/webauthn/
#sctn-packed-attestation, Online, Accessed: 2021-01-
27.
W3C (2020d). Webauthn2: Registering a new credential.
W3C Working Draft (2019). Decentralized Identifiers
(DIDs) v1.0 - Core Data Model and Syntaxes. Online,
Accessed: 2021-01-12.
Zwattendorfer, B., Zefferer, T., and Stranacher, K. (2014).
An overview of cloud identity management-models.
In WEBIST (1), pages 82–92. SciTePress.
SECRYPT 2021 - 18th International Conference on Security and Cryptography
148