{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,16]],"date-time":"2026-02-16T08:59:28Z","timestamp":1771232368081,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,12,14]],"date-time":"2021-12-14T00:00:00Z","timestamp":1639440000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12,14]]},"DOI":"10.1145\/3486622.3493917","type":"proceedings-article","created":{"date-parts":[[2022,4,14]],"date-time":"2022-04-14T01:18:53Z","timestamp":1649899133000},"page":"128-135","source":"Crossref","is-referenced-by-count":27,"title":["Blockchain-Based Self-Sovereign Identity: Survey, Requirements, Use-Cases, and Comparative Study"],"prefix":"10.1145","author":[{"given":"Razieh","family":"Nokhbeh Zaeem","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"given":"Kai Chih","family":"Chang","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"given":"Teng-Chieh","family":"Huang","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"given":"David","family":"Liau","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"given":"Wenting","family":"Song","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"given":"Aditya","family":"Tyagi","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"given":"Manah","family":"Khalil","sequence":"additional","affiliation":[{"name":"Verizon, USA"}]},{"given":"Michael","family":"Lamison","sequence":"additional","affiliation":[{"name":"Verizon, USA"}]},{"given":"Siddharth","family":"Pandey","sequence":"additional","affiliation":[{"name":"Verizon, USA"}]},{"given":"K. Suzanne","family":"Barber","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,4,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Civic Decentralized Reusable KYC Services - Blockchain-Powered. https:\/\/www.civic.com\/solutions\/kyc-services\/. (Accessed on 04\/11\/2019).  [n.d.]. Civic Decentralized Reusable KYC Services - Blockchain-Powered. https:\/\/www.civic.com\/solutions\/kyc-services\/. (Accessed on 04\/11\/2019)."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. ShoCard Identity Management Use Cases | ShoCard. https:\/\/shocard.com\/identity-management-use-cases\/. (Accessed on 04\/11\/2019).  [n.d.]. ShoCard Identity Management Use Cases | ShoCard. https:\/\/shocard.com\/identity-management-use-cases\/. (Accessed on 04\/11\/2019)."},{"key":"e_1_3_2_1_3_1","volume-title":"Towards self-sovereign identity using blockchain technology. Master\u2019s thesis","author":"Baars DS","unstructured":"DS Baars . 2016. Towards self-sovereign identity using blockchain technology. Master\u2019s thesis . University of Twente . DS Baars. 2016. Towards self-sovereign identity using blockchain technology. Master\u2019s thesis. University of Twente."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ETFA.2019.8869262"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2950872"},{"key":"e_1_3_2_1_6_1","unstructured":"Christian Cachin and Marko Vukoli\u0107. 2017. Blockchain consensus protocols in the wild. arXiv preprint arXiv:1707.01873(2017).  Christian Cachin and Marko Vukoli\u0107. 2017. Blockchain consensus protocols in the wild. arXiv preprint arXiv:1707.01873(2017)."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3111247"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMMNET.2019.8742375"},{"key":"e_1_3_2_1_9_1","unstructured":"J\u00f8rgen Ellingsen. 2019. Self-Sovereign Identity Systems: Opportunities and challenges. Master\u2019s thesis. NTNU.  J\u00f8rgen Ellingsen. 2019. Self-Sovereign Identity Systems: Opportunities and challenges. Master\u2019s thesis. NTNU."},{"key":"e_1_3_2_1_10_1","unstructured":"Evernym. [n.d.]. Evernym. https:\/\/www.evernym.com  Evernym. [n.d.]. Evernym. https:\/\/www.evernym.com"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2931173"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2842685"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3211933.3211945"},{"key":"e_1_3_2_1_14_1","volume-title":"Self-Sovereign Identity for IoT Devices. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT)","author":"Gebresilassie Samson\u00a0Kahsay","unstructured":"Samson\u00a0Kahsay Gebresilassie , Joseph Rafferty , Philip Morrow , Liming\u00a0Luke Chen , Mamun Abu-Tair , and Zhan Cui . 2020. Distributed, Secure , Self-Sovereign Identity for IoT Devices. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT) . IEEE , 1\u20136. Samson\u00a0Kahsay Gebresilassie, Joseph Rafferty, Philip Morrow, Liming\u00a0Luke Chen, Mamun Abu-Tair, and Zhan Cui. 2020. Distributed, Secure, Self-Sovereign Identity for IoT Devices. In 2020 IEEE 6th World Forum on Internet of Things (WF-IoT). IEEE, 1\u20136."},{"key":"e_1_3_2_1_15_1","volume-title":"International Conference on Advanced Information Networking and Applications. Springer, 200\u2013213","author":"Gr\u00fcner Andreas","year":"2019","unstructured":"Andreas Gr\u00fcner , Alexander M\u00fchle , Tatiana Gayvoronskaya , and Christoph Meinel . 2019 . A comparative analysis of trust requirements in decentralized identity management . In International Conference on Advanced Information Networking and Applications. Springer, 200\u2013213 . Andreas Gr\u00fcner, Alexander M\u00fchle, Tatiana Gayvoronskaya, and Christoph Meinel. 2019. A comparative analysis of trust requirements in decentralized identity management. In International Conference on Advanced Information Networking and Applications. Springer, 200\u2013213."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2994090"},{"key":"e_1_3_2_1_17_1","first-page":"118","article-title":"The truth about blockchain","volume":"95","author":"Iansiti Marco","year":"2017","unstructured":"Marco Iansiti and Karim\u00a0 R Lakhani . 2017 . The truth about blockchain . Harvard Business Review 95 , 1 (2017), 118 \u2013 127 . Marco Iansiti and Karim\u00a0R Lakhani. 2017. The truth about blockchain. Harvard Business Review 95, 1 (2017), 118\u2013127.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_18_1","volume-title":"Blockchain for identity management","author":"Jacobovitz Ori","year":"2016","unstructured":"Ori Jacobovitz . 2016. Blockchain for identity management . The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University , Beer Sheva ( 2016 ). Ori Jacobovitz. 2016. Blockchain for identity management. The Lynne and William Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva (2016)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS49785.2020.9315899"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341105.3374066"},{"key":"e_1_3_2_1_21_1","first-page":"118","article-title":"The truth about blockchain","volume":"95","author":"Lakhani R","year":"2017","unstructured":"Karim\u00a0 R Lakhani and M Iansiti . 2017 . The truth about blockchain . Harvard Business Review 95 (2017), 118 \u2013 127 . Karim\u00a0R Lakhani and M Iansiti. 2017. The truth about blockchain. Harvard Business Review 95 (2017), 118\u2013127.","journal-title":"Harvard Business Review"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.18517\/ijaseit.8.4-2.6838"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102731"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCICT.2018.8325891"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2018.10.002"},{"key":"e_1_3_2_1_26_1","unstructured":"Atif\u00a0Ghulam Nabi. 2017. Comparative study on identity management methods using blockchain. University of Zurich 118(2017).  Atif\u00a0Ghulam Nabi. 2017. Comparative study on identity management methods using blockchain. University of Zurich 118(2017)."},{"key":"e_1_3_2_1_27_1","volume-title":"Bitcoin: A peer-to-peer electronic cash system","author":"Nakamoto Satoshi","year":"2019","unstructured":"Satoshi Nakamoto . 2019 . Bitcoin: A peer-to-peer electronic cash system (2008). Technical Report. Manubot . Satoshi Nakamoto. 2019. Bitcoin: A peer-to-peer electronic cash system (2008). Technical Report. Manubot."},{"key":"e_1_3_2_1_28_1","volume-title":"An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. In 2019 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 26\u201333","author":"Rana Rima","year":"2019","unstructured":"Rima Rana , Razieh\u00a0Nokhbeh Zaeem , and K\u00a0Suzanne Barber . 2019 . An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. In 2019 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 26\u201333 . Rima Rana, Razieh\u00a0Nokhbeh Zaeem, and K\u00a0Suzanne Barber. 2019. An Assessment of Blockchain Identity Solutions: Minimizing Risk and Liability of Authentication. In 2019 IEEE\/WIC\/ACM International Conference on Web Intelligence (WI). 26\u201333."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Reza Soltani Uyen\u00a0Trang Nguyen and Aijun An. 2018. A new approach to client onboarding using self-sovereign identity and distributed ledger. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE 1129\u20131136.  Reza Soltani Uyen\u00a0Trang Nguyen and Aijun An. 2018. A new approach to client onboarding using self-sovereign identity and distributed ledger. In 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData). IEEE 1129\u20131136.","DOI":"10.1109\/Cybermatics_2018.2018.00205"},{"key":"e_1_3_2_1_30_1","volume-title":"Deployment of a blockchain-based self-sovereign identity. In 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications","author":"Stokkink Quinten","unstructured":"Quinten Stokkink and Johan Pouwelse . 2018. Deployment of a blockchain-based self-sovereign identity. In 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). IEEE , 1336\u20131342. Quinten Stokkink and Johan Pouwelse. 2018. Deployment of a blockchain-based self-sovereign identity. In 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData). IEEE, 1336\u20131342."},{"key":"e_1_3_2_1_31_1","volume-title":"Vol.\u00a02","author":"Takemiya Makoto","unstructured":"Makoto Takemiya and Bohdan Vanieiev . 2018. Sora identity: Secure, digital identity on the blockchain. In 2018 ieee 42nd annual computer software and applications conference (compsac) , Vol.\u00a02 . IEEE , 582\u2013587. Makoto Takemiya and Bohdan Vanieiev. 2018. Sora identity: Secure, digital identity on the blockchain. In 2018 ieee 42nd annual computer software and applications conference (compsac), Vol.\u00a02. IEEE, 582\u2013587."},{"key":"e_1_3_2_1_32_1","volume-title":"The inevitable rise of self-sovereign identity","author":"Tobin Andrew","year":"2016","unstructured":"Andrew Tobin and Drummond Reed . 2016. The inevitable rise of self-sovereign identity . The Sovrin Foundation 29( 2016 ). Andrew Tobin and Drummond Reed. 2016. The inevitable rise of self-sovereign identity. The Sovrin Foundation 29(2016)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2994581"},{"key":"e_1_3_2_1_34_1","unstructured":"uPort. [n.d.]. uPort. https:\/\/www.uport.me  uPort. [n.d.]. uPort. https:\/\/www.uport.me"},{"key":"e_1_3_2_1_35_1","unstructured":"Dirk van Bokkem Rico Hageman Gijs Koning Luat Nguyen and Naqib Zarin. 2019. Self-sovereign identity solutions: The necessity of blockchain technology. arXiv preprint arXiv:1904.12816(2019).  Dirk van Bokkem Rico Hageman Gijs Koning Luat Nguyen and Naqib Zarin. 2019. Self-sovereign identity solutions: The necessity of blockchain technology. arXiv preprint arXiv:1904.12816(2019)."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2019.00028"},{"key":"e_1_3_2_1_37_1","volume-title":"International Conference on Business Information Systems. Springer, 158\u2013168","author":"Zaeem Razieh\u00a0Nokhbeh","year":"2020","unstructured":"Razieh\u00a0Nokhbeh Zaeem and K\u00a0Suzanne Barber . 2020 . How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft . In International Conference on Business Information Systems. Springer, 158\u2013168 . Razieh\u00a0Nokhbeh Zaeem and K\u00a0Suzanne Barber. 2020. How Much Identity Management with Blockchain Would Have Saved Us? A Longitudinal Study of Identity Theft. In International Conference on Business Information Systems. Springer, 158\u2013168."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCST.2016.7815701"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2016.11.002"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/joca.12191"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.3390\/s18124215"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/2867541.2867781"}],"event":{"name":"WI-IAT '21: IEEE\/WIC\/ACM International Conference on Web Intelligence","location":"ESSENDON VIC Australia","acronym":"WI-IAT '21","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence"]},"container-title":["IEEE\/WIC\/ACM International Conference on Web Intelligence"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493917","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3486622.3493917","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:12:06Z","timestamp":1750191126000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3486622.3493917"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12,14]]},"references-count":42,"alternative-id":["10.1145\/3486622.3493917","10.1145\/3486622"],"URL":"https:\/\/doi.org\/10.1145\/3486622.3493917","relation":{},"subject":[],"published":{"date-parts":[[2021,12,14]]}}}