Key-Audit Chain (KAC): A Resilient and Reliable Key Management Framework for DID-Based Decentralized Environments
This paper proposes an integrated authentication framework to enhance trust, key security, and auditability in Self-Sovereign Identity (SSI) environments. Existing SSI systems face structural limitations: users must manage private keys directly, and there is a lack of mechanisms to verify the state...
| Published in: | IEEE Access |
|---|---|
| Main Authors: | Jihwan Kim, Younho Lee, Daeseon Choi |
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2025-01-01
|
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/11122458/ |
Similar Items
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity
by: Junli Fang, et al.
Published: (2024-11-01)
by: Junli Fang, et al.
Published: (2024-11-01)
From Model to Mechanism: Enforcing Delegated Authority in SSI with Language-Based Security
by: Muhamed Turkanović, et al.
Published: (2025-09-01)
by: Muhamed Turkanović, et al.
Published: (2025-09-01)
A Novel Model for Authority and Access Delegation Utilizing Self-Sovereign Identity and Verifiable Credentials
by: Spela Cucko, et al.
Published: (2025-01-01)
by: Spela Cucko, et al.
Published: (2025-01-01)
SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access
by: Daniel Paredes-García, et al.
Published: (2025-08-01)
by: Daniel Paredes-García, et al.
Published: (2025-08-01)
Verification of Education Credentials on European Blockchain Services Infrastructure (EBSI): Action Research in a Cross-Border Use Case between Belgium and Italy
by: Evrim Tan, et al.
Published: (2023-04-01)
by: Evrim Tan, et al.
Published: (2023-04-01)
Technical Design and Development of a Self-Sovereign Identity Management Platform for Patient-Centric Healthcare Using Blockchain Technology
by: Daniel Toshio Harrell, et al.
Published: (2022-04-01)
by: Daniel Toshio Harrell, et al.
Published: (2022-04-01)
Towards a Catalogue of Self-Sovereign Identity Design Patterns
by: Špela Čučko, et al.
Published: (2023-04-01)
by: Špela Čučko, et al.
Published: (2023-04-01)
Editorial: Establishing Self Sovereign Identity with Blockchain
by: Alan Sherriff, et al.
Published: (2022-08-01)
by: Alan Sherriff, et al.
Published: (2022-08-01)
Challenges of user data privacy in self-sovereign identity verifiable credentials for autonomous building access during the COVID-19 pandemic
by: Denver Naicker, et al.
Published: (2024-03-01)
by: Denver Naicker, et al.
Published: (2024-03-01)
A Proposal for Decentralized, Global, Verifiable Health Care Credential Standards Grounded in Pharmaceutical Authorized Trading Partners
by: Victor Dods, et al.
Published: (2021-04-01)
by: Victor Dods, et al.
Published: (2021-04-01)
Evaluation of Decentralized Verifiable Credentials to Authenticate Authorized Trading Partners and Verify Drug Provenance
by: Ghada L. Ashkar, et al.
Published: (2021-03-01)
by: Ghada L. Ashkar, et al.
Published: (2021-03-01)
Potentiality of Self Sovereign Identities in Smart Grid
by: Luisanna Cocco, et al.
Published: (2025-01-01)
by: Luisanna Cocco, et al.
Published: (2025-01-01)
Technologies and Applications for Decentralized Identity in Healthcare
by: Daniela Barbosa, et al.
Published: (2025-04-01)
by: Daniela Barbosa, et al.
Published: (2025-04-01)
did:blox: A Secure and Efficient Decentralized Identifier Method for Scientific IoT Ecosystems Leveraging the Bloxberg Blockchain
by: Andrej Gono, et al.
Published: (2025-01-01)
by: Andrej Gono, et al.
Published: (2025-01-01)
Sybil-Resistant Self-Sovereign Identity Utilizing Attested Execution Secure Processors and Zero-Knowledge Membership Proofs
by: Koichi Moriyama, et al.
Published: (2025-01-01)
by: Koichi Moriyama, et al.
Published: (2025-01-01)
Know Your Customer: Balancing innovation and regulation for financial inclusion
by: Karen Elliott, et al.
Published: (2022-01-01)
by: Karen Elliott, et al.
Published: (2022-01-01)
A Reliable and Privacy-Preserving Vehicular Energy Trading Scheme Using Decentralized Identifiers
by: Myeonghyun Kim, et al.
Published: (2024-05-01)
by: Myeonghyun Kim, et al.
Published: (2024-05-01)
Selective disclosure in digital credentials: A review
by: Šeila Bećirović Ramić, et al.
Published: (2024-08-01)
by: Šeila Bećirović Ramić, et al.
Published: (2024-08-01)
A Self-Sovereign Identity Based on Zero-Knowledge Proof and Blockchain
by: Mohameden Dieye, et al.
Published: (2023-01-01)
by: Mohameden Dieye, et al.
Published: (2023-01-01)
Blockchain-Based Supply Chain Systems, Interoperability Model in a Pharmaceutical Case Study
by: Yeray Mezquita, et al.
Published: (2023-02-01)
by: Yeray Mezquita, et al.
Published: (2023-02-01)
A Consortium Blockchain-Based Secure and Trusted Electronic Portfolio Management Scheme
by: Mpyana Mwamba Merlec, et al.
Published: (2022-02-01)
by: Mpyana Mwamba Merlec, et al.
Published: (2022-02-01)
An Improved Scheme for Blockchain Oracle Based on Schnorr Signature
by: Huaiyong CUI, Shaohua ZHANG, Chao LI, Bingrong DAI
Published: (2024-01-01)
by: Huaiyong CUI, Shaohua ZHANG, Chao LI, Bingrong DAI
Published: (2024-01-01)
Identity Management Systems: A Comprehensive Review
by: Zhengze Feng, et al.
Published: (2025-09-01)
by: Zhengze Feng, et al.
Published: (2025-09-01)
Connect2NFT: A Web-Based, Blockchain Enabled NFT Application with the Aim of Reducing Fraud and Ensuring Authenticated Social, Non-Human Verified Digital Identity
by: Jagger Bellagarda, et al.
Published: (2022-10-01)
by: Jagger Bellagarda, et al.
Published: (2022-10-01)
Improving Transitions of Care: Designing a Blockchain Application for Patient Identity Management
by: Mustafa Abdul-Moheeth, et al.
Published: (2022-03-01)
by: Mustafa Abdul-Moheeth, et al.
Published: (2022-03-01)
Key Backup and Recovery for Resilient DID Environment
by: Jihwan Kim, et al.
Published: (2024-03-01)
by: Jihwan Kim, et al.
Published: (2024-03-01)
A Blockchain-Based Decentralized Public Key Infrastructure for Information-Centric Networks
by: Jia Shi, et al.
Published: (2022-05-01)
by: Jia Shi, et al.
Published: (2022-05-01)
A Blockchain Based Decentralized Identifiers for Entity Authentication in Electronic Health Records
by: Manoj T, et al.
Published: (2022-12-01)
by: Manoj T, et al.
Published: (2022-12-01)
PriSign, A Privacy-Preserving Single Sign-On System for Cloud Environments
by: Rui Shi, et al.
Published: (2023-01-01)
by: Rui Shi, et al.
Published: (2023-01-01)
Privacy and Trust Redefined in Federated Machine Learning
by: Pavlos Papadopoulos, et al.
Published: (2021-03-01)
by: Pavlos Papadopoulos, et al.
Published: (2021-03-01)
A Self-Sovereign Identity–Blockchain-Based Model Proposal for Deep Digital Transformation in the Healthcare Sector
by: Luisanna Cocco, et al.
Published: (2024-12-01)
by: Luisanna Cocco, et al.
Published: (2024-12-01)
Blockchain-Based Model for Secure and Fair Data Provision in Crowdsourced Drone Services
by: Junaid Akram, et al.
Published: (2025-01-01)
by: Junaid Akram, et al.
Published: (2025-01-01)
Blockchain-cloud privacy-enhanced distributed industrial data trading based on verifiable credentials
by: Junli Fang, et al.
Published: (2024-02-01)
by: Junli Fang, et al.
Published: (2024-02-01)
A Blockchain-Based E-Commerce Reputation System Built With Verifiable Credentials
by: Omer Dogan, et al.
Published: (2023-01-01)
by: Omer Dogan, et al.
Published: (2023-01-01)
Lattice-based verifiable timed signature and application
by: CHEN Huiyan, et al.
Published: (2024-10-01)
by: CHEN Huiyan, et al.
Published: (2024-10-01)
A Traceable Universal Designated Verifier Transitive Signature Scheme
by: Shaonan Hou, et al.
Published: (2024-01-01)
by: Shaonan Hou, et al.
Published: (2024-01-01)
Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing
by: Mengdi Zhao, et al.
Published: (2025-07-01)
by: Mengdi Zhao, et al.
Published: (2025-07-01)
Soulbound Tokens: Enabler for Privacy-Aware and Decentralized Authentication Mechanism in Medical Data Storage
by: Biagio Boi, et al.
Published: (2024-08-01)
by: Biagio Boi, et al.
Published: (2024-08-01)
Self-Sovereign Identity for Organizations: Requirements for Enterprise Software
by: Ricardo Bochnia, et al.
Published: (2024-01-01)
by: Ricardo Bochnia, et al.
Published: (2024-01-01)
Analyzing the Threats to Blockchain-Based Self-Sovereign Identities by Conducting a Literature Survey
by: Daniela Pöhn, et al.
Published: (2023-12-01)
by: Daniela Pöhn, et al.
Published: (2023-12-01)
Similar Items
-
Privacy-enhanced distributed revocable identity management scheme based self-sovereign identity
by: Junli Fang, et al.
Published: (2024-11-01) -
From Model to Mechanism: Enforcing Delegated Authority in SSI with Language-Based Security
by: Muhamed Turkanović, et al.
Published: (2025-09-01) -
A Novel Model for Authority and Access Delegation Utilizing Self-Sovereign Identity and Verifiable Credentials
by: Spela Cucko, et al.
Published: (2025-01-01) -
SIBERIA: A Self-Sovereign Identity and Multi-Factor Authentication Framework for Industrial Access
by: Daniel Paredes-García, et al.
Published: (2025-08-01) -
Verification of Education Credentials on European Blockchain Services Infrastructure (EBSI): Action Research in a Cross-Border Use Case between Belgium and Italy
by: Evrim Tan, et al.
Published: (2023-04-01)
