related drawbacks have been presented. Finally, a
Proof of Concept about delegated credentials has
been implemented following the Aries RFC proposal,
which avoids some implementation issues for most
technologies and presents better characteristics in
terms of privacy.
ACKNOWLEDGEMENTS
This work has been supported by Izertis through the
SSI4.0 project, which is a collaborative project co-
funded by the Department of Economic
Development, Sustainability and Environment of the
Vice-Ministry of Technology, Innovation and
Competitiveness of the Basque Government within
the HAZITEK program. (File: ZE-2020/00020).
This work has also been partially supported by
Spanish Government-Ministry of Science and
Innovation through project SICRAC (PID2020-
114495RB-I00).
REFERENCES
Preuveneers, D., & Ilie-Zudor, E. (2017, April). The
intelligent industry of the future: A survey on emerging
trends, research challenges and opportunities in
Industry 4.0. Journal of Ambient Intelligence and Smart
Environments, 9(3), 287-298.
W3C. (2021, November). Verifiable Credentials Data
Model 1.1: Expressing Verifiable Information on the
Web. https://www.w3.org/TR/vc-data-model/.
Accessed on: Feb 21, 2022.
Reed, D., Sporny, M., Longley, D., Allen, C., Grant, R.,
Sabadello, M., & Holt, J. (2021, August). Decentralized
identifiers (DIDs) v1. 0. Draft Community Group
Report. [Online]. Available: https://www.w3.org/TR/
did-core/. Accessed on: Feb 21, 2022.
Fedrecheski, G., Rabaey, J. M., Costa, L. C., Ccori, P. C.
C., Pereira, W. T., & Zuffo, M. K. (2020, June). Self-
sovereign identity for IoT environments: a perspective.
In 2020 Global Internet of Things Summit (GIoTS) (pp.
1-6). IEEE.
Mahalle, P. N., Shinde, G., & Shafi, P. M. (2020, February).
Rethinking decentralised identifiers and verifiable
credentials for the Internet of Things. In Internet of
Things, Smart Computing and Technology: A
Roadmap Ahead (pp. 361-374). Springer, Cham.
Bartolomeu, P. C., Vieira, E., Hosseini, S. M., & Ferreira,
J. (2019, September). Self-sovereign identity: Use-
cases, technologies, and challenges for industrial IoT.
In 2019 24th IEEE International Conference on
Emerging Technologies and Factory Automation
(ETFA) (pp. 1173-1180). IEEE.
Niya, S. R., Jeffrey, B., & Stiller, B. (2020, November).
KYoT: Self-sovereign IoT Identification with a
Physically Unclonable Function. In 2020 IEEE 45th
Conference on Local Computer Networks (LCN) (pp.
485-490). IEEE.
Kortesniemi, Y., Lagutin, D., Elo, T., & Fotiou, N. (2019,
March). Improving the privacy of IoT with
decentralised identifiers (DIDs). Journal of Computer
Networks and Communications, 2019.
Windley, P., & Reed, D. (2018, January). Sovrin: A
protocol and token for self-sovereign identity and
decentralized trust. Whitepaper, The Sovrin
Foundation.
Hyperledger Aries. (2020). [Online]. Available:
https://github.com/hyperledger/aries. Accessed on: Feb
21, 2022.
Veramo – Performant and modular APIs for Verifiable Data
and SSI. 2021. [Online]. Available: https://veramo.io/.
Accessed on: Feb 21, 2022
Veres One - A Globally Interoperable Blockchain for
Identity. 2022. [Online]. Available: https://veres.one/.
Accessed on: Feb 21, 2022.
Jolocom - A Decentralized, Open Source Solution for
Digital Identity and Access Management. [Online].
2019. Available: https://jolocom.io/wp-content/
uploads/2019/12/Jolocom-Whitepaper-v2.1-A-
Decentralized-Open-Source-Solution-for-Digital-
Identity-and-Access-Management.pdf. Accessed on:
Feb 21, 2022
Belenkiy, M., Camenisch, J., Chase, M., Kohlweiss, M.,
Lysyanskaya, A., & Shacham, H. (2009, August).
Randomizable proofs and delegatable anonymous
credentials. In Annual International Cryptology
Conference (pp. 108-125). Springer, Berlin,
Heidelberg.
Chase, M., Kohlweiss, M., Lysyanskaya, A., & Meiklejohn,
S. (2013, March). Malleable Signatures: Complex
Unary Transformations and Delegatable Anonymous
Credentials. IACR Cryptol. ePrint Arch., 2013, 179.
Camenisch, J., Drijvers, M., & Dubovitskaya, M. (2017,
October). Practical UC-secure delegatable credentials
with attributes and their application to blockchain. In
Proceedings of the 2017 ACM SIGSAC Conference on
Computer and Communications Security (pp. 683-699).
Blömer, J., & Bobolz, J. (2018, July). Delegatable attribute-
based anonymous credentials from dynamically
malleable signatures. In International Conference on
Applied Cryptography and Network Security (pp. 221-
239). Springer, Cham.
Crites, E. C., & Lysyanskaya, A. (2019, March).
Delegatable anonymous credentials from mercurial
signatures. In Cryptographers’ Track at the RSA
Conference (pp. 535-555). Springer, Cham.
Hardman D., Harchandani, L. Aries RFC 0104: Chained
Credentials. (2021). [Online]. Available: https://github.
com/hyperledger/aries-rfcs/tree/main/concepts/0104-
chained-credentials. Accessed on: Feb 21, 2022
Lim, S., Rhie, M. H., Hwang, D., & Kim, K. H. (2021,
January). A Subject-Centric Credential Management
Method based on the Verifiable Credentials. In 2021
International Conference on Information Networking
(ICOIN) (pp. 508-510). IEEE.