Most current self-sovereign identity systems may be categorized as strictly objective, consisting of cryptographically signed statements issued by trusted third party attestors. This failure to provide an input for subjectivity accounts for a central challenge: the inability to address the question of "Who verifies the verifier?". Instead, these protocols outsource their legitimacy to mechanisms beyond their internal structure, relying on traditional centralized institutions such as national ID issuers and KYC providers to verify the claims they hold. This reliance has been employed to safeguard applications from a vulnerability previously thought to be impossible to address in distributed systems: the Sybil attack problem, which describes the abuse of an online system by creating many illegitimate virtual personas. Inspired by the progress in cryptocurrencies and blockchain technology, there has recently been a surge in networked protocols that make use of subjective inputs such as voting, vouching, and interpreting, to arrive at a decentralized and sybil-resistant consensus for identity. In this article, we will outline the approaches of these new and natively digital sources of authentication -- their attributes, methodologies strengths, and weaknesses -- and sketch out possible directions for future developments.
翻译:目前大多数自我主权身份系统都可归为严格客观的,包括由受信任的第三方验证人发布的加密签名声明。这种未能为主观性提供投入的情况说明一个中心挑战:无法解决“谁核查核查人”的问题。相反,这些协议将其合法性外包给内部结构以外的机制,依靠传统的中央机构,如国家身份证明发行人和KYC提供者等,以核实他们拥有的主张。这种依赖是为了保护申请,使其免受先前认为在分布式系统中无法解决的脆弱性:Sybil袭击问题,它描述了通过制造许多非法虚拟人物滥用在线系统的情况。在加密和闭锁技术的进展的启发下,最近出现了网络协议激增,利用了投票、投注和解释等主观投入,就身份问题达成分散和相互抗争的共识。在本条中,我们将概述这些新的和本地数字认证来源的各种方法 -- -- 其属性、方法强弱点和弱点 -- -- 以及未来发展可能的方向的草图。