of their Sovrin Blockchain, which has been designed
only for identity claims and for their own Sovrin To-
ken. This requires any organization that would like to
implement this solution to alter its business model for
compatibility reasons, such as accommodating crypto
assets like the Sovrin Token. Another identified prob-
lem is that an identity claimed verified by a third party
cannot be unilaterally revoked before the expiration
date by said third party. For example, a driver’s li-
cense or student pass cannot be revoked by the state
issuer or by the university, respectively.
In this paper, based on certSIGN’s patent appli-
cation (Lupascu et al., 2021), we present a novel
and flexible solution to the self-sovereign identity
problem that not only addresses the core challenges
but also introduces the possibility of implementing
smart contracts between users. Our approach builds
upon existing an existing implementation and lever-
ages blockchain technology to create a secure and de-
centralized framework for identity management. The
project is currently in late stage development.
In the following sections, we will begin by provid-
ing essential background information about the pro-
posed solution, outlining its specific benefits, and of-
fering practical examples to illustrate its functionality.
We will present an in-depth overview of our proposed
approach, starting with a basic use-case scenario and
addressing the potential challenges that can arise and
will delve into the roles and responsibilities of each
participant within the network, highlighting their in-
teractions. We will provide a chronological list of data
transactions within a generalized scenario, illustrating
the sequence of events and data flow among the par-
ticipants. For better clarity, we will showcase a step-
by-step interaction between the different entities and
how they engage with the system. Finally, we will
draw conclusions based on our findings and discuss
potential avenues for future work.
2 THE PROPOSED SOLUTION
2.1 Overview
The solution (Lupascu et al., 2021) claims to meet
the self-sovereign identity requirements in a more
business-friendly way. Specifically, it can be imple-
mented over any type of blockchain, whether pub-
lic or private, and does not require the acquisition of
any specific crypto asset. While the proposed solu-
tion refers to Bitcoin as the blockchain in use for con-
venience purposes, it can be applied to any generic
blockchain. Because blockchains are immutable,
storing personal data on a blockchain is strongly dis-
couraged, even if said data is in encrypted form. Peo-
ple can reveal their private keys by mistake, and dig-
ital information can get leaked, so good practice dic-
tates that all the information stored on the blockchain
has to be hashed, and only the hashes are stored on
the blockchain. It is also assumed that blockchain
users carry digital identifiers that are used to iden-
tify them by way of digital signatures that accompany
each transaction they take part in. User identity infor-
mation can be hashed and then encrypted to be stored
on the blockchain at the time of enrolling the user on
the platform. Management trust is provided by a root
user/ platform owner that authorizes new users and
user roles, such a the role of a trusted third-party, by
recording their authorization on the blockchain.
Users have the ability to create their own digi-
tal identifiers and trusted third-party users can en-
roll identity owners (users who will use the plat-
form for their ID authentication) by collecting their
data in a secure way such as face-to-face verifica-
tion, and storing encrypted hashes of the data on
the blockchain alongside the user’s digital identifier.
Each data exchange between users must be authorized
by the trusted third-party that verified the user’s at-
tributes. This authorization process involves a multi-
stage verification protocol that accesses information
stored on the blockchain. These interactions between
users, or between users and trusted third-parties are
also archived on the blockchain.
By utilizing information stored on the blockchain
and a user identifier (ex: the user’s public key) pro-
vided by the user, a computing device can obtain a
particular assertion from the multiple proofs recorded
on the blockchain. The assertion obtained by the com-
puting device can be checked by using information
provided by the user, alongside a secret key, via the
blockchain, from a trusted third-party. The secret key
is generated based on two public keys: one associated
with the computing device that wants to check the as-
sertion and the other based on the computing device
controlled by the trusted third-party. This approach
allows users to choose which aspects of their identity
they want to share with information consumers.
For example, a student accessing a virtual library
might want to share a proof that containing their name
and university status, but not their home address. In
this scenario the library acts as the information con-
sumer, the student as the user, and the University that
emitted the student license as the trusted third-party.
The library wants to check the assertion that the user
is a student, and based on the user’s identifier, infor-
mation stored on the blockchain, and after a exchange
of information with the University via the blockchain
with the aid of a secure communication protocol it can
A Blockchain Self-Sovereign Solution for Secure Generation, Exchange and Management of User Identity Data
745