a local public key, which is different from the public
key existing in DIDDoc and which is used for the en-
cryption of the current session communications. Re-
play and Repudiation Attacks are mitigated using the
mechanisms of the message signature, or more pre-
cisely, the DIDComm V1 Signed Envelopes. The cre-
dential presentation is signed by both parties, in such
a way the typical user is sure to answer to the Veri-
fier server, which is unable to behave maliciously, by
re-using the proposed credentials since the presenta-
tion is signed in conjunction with a challenge. DoS
attacks depend on server implementation; a filter or
firewall on requests of such a server can be enough to
guarantee a good level of prevention.
6 CONCLUSIONS
A distributed approach based on Blockchain for han-
dling authentication in the context of attribute-based
authentication has been proposed, in conjunction with
a preliminary security analysis. We have planned to
use formal methods, such as ProVerif (Blanchet et al.,
2018), to verify the security of the used communi-
cation protocols. SSIs are increasingly widespread
and interoperable (Yildiz et al., 2022). A more spe-
cific use case can be found within the context of the
Solid project, which has been considered a promis-
ing solution for e-government services (Sambra et al.,
2016). A schema of ZKP it’s been taken into con-
sideration for increasing the overall level of privacy.
The main advantages in adopting a Blockchain-based
solution are related to the possibility to revoke and
update VCs when not still valid; on the counter limi-
tations of the proposed architecture are related to the
scalability of permissioned Blockchain, required for
secure implementation. Future works may include
these kinds of credentials also in other projects, like
Algorand (Gilad et al., 2017), which offer different
consensus mechanisms, able to guarantee both secu-
rity and scalability.
ACKNOWLEDGEMENTS
This work was partially supported by project SER-
ICS (PE00000014) under the NRRP MUR program
funded by the EU - NGEU.
REFERENCES
Blanchet, B., Smyth, B., Cheval, V., and Sylvestre, M.
(2018). Proverif 2.00: automatic cryptographic pro-
tocol verifier, user manual and tutorial. Version from,
pages 05–16.
Ferdous, M. S., Ionita, A., and Prinz, W. (2023). Ssi4web:
A self-sovereign identity (ssi) framework for the web.
In Prieto, J., Ben
´
ıtez Mart
´
ınez, F. L., Ferretti, S., Ar-
royo Guarde
˜
no, D., and Tom
´
as Nevado-Batalla, P., ed-
itors, Blockchain and Applications, 4th International
Congress, page 366–379, Cham. Springer Interna-
tional Publishing.
Ghorbani Lyastani, S., Schilling, M., Neumayr, M., Backes,
M., and Bugiel, S. (2020). Is fido2 the kingslayer of
user authentication? a comparative usability study of
fido2 passwordless authentication. In 2020 IEEE Sym-
posium on Security and Privacy (SP), pages 268–285.
Gilad, Y., Hemo, R., Micali, S., Vlachos, G., and Zeldovich,
N. (2017). Algorand: Scaling byzantine agreements
for cryptocurrencies. In Proceedings of the 26th sym-
posium on operating systems principles, pages 51–68.
Jones, M. and Sakimura, N. (2015). Json web key (jwk)
thumbprint. Technical report.
Li, Y., Yu, Y., Lou, C., Guizani, N., and Wang, L.
(2020). Decentralized public key infrastructures atop
blockchain. IEEE Network, 34(6):133–139.
Lodder, D. M. and Khovratovich, D. (2019). Anonymous
credentials 2.0.
M
¨
uhle, A., Gr
¨
uner, A., Gayvoronskaya, T., and Meinel, C.
(2018). A survey on essential components of a self-
sovereign identity. Computer Science Review, 30:80–
86.
Ometov, A., Bezzateev, S., M
¨
akitalo, N., Andreev, S.,
Mikkonen, T., and Koucheryavy, Y. (2018). Multi-
factor authentication: A survey. Cryptography, 2(1):1.
Pflanzner, T., Baniata, H., and Kertesz, A. (2022). Latency
analysis of blockchain-based ssi applications. Future
Internet, 14(10):282.
Reed, D., Law, J., and Hardman, D. (2016). The technical
foundations of sovrin. The Technical Foundations of
Sovrin.
Sambra, A. V., Mansour, E., Hawke, S., Zereba, M., Greco,
N., Ghanem, A., Zagidulin, D., Aboulnaga, A., and
Berners-Lee, T. (2016). Solid: a platform for decen-
tralized social applications based on linked data. MIT
CSAIL & Qatar Computing Research Institute, Tech.
Rep.
Shostack, A. (2014). Threat modeling: Designing for secu-
rity. John Wiley & Sons.
Sporny, M., Longley, D., Sabadello, M., Reed, D., Steele,
O., and Allen, C. (2021). Decentralized identifiers
(dids) v1. 0. w3c.
Sporny, M., Noble, G., Longley, D., Burnett, D. C., Zundel,
B., and Hartog, K. D. (2022). Verifiable credentials
data model v1.1.
Tamburri, D. A. (2020). Design principles for the gen-
eral data protection regulation (gdpr): A formal con-
cept analysis and its evaluation. Information Systems,
91:101469.
Yildiz, H., K
¨
upper, A., Thatmann, D., G
¨
ond
¨
or, S., and Her-
bke, P. (2022). A tutorial on the interoperability of
self-sovereign identities.
Self-Sovereign Identity (SSI) Attribute-Based Web Authentication
763