{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T16:10:42Z","timestamp":1775146242639,"version":"3.50.1"},"reference-count":215,"publisher":"MDPI AG","issue":"15","license":[{"start":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T00:00:00Z","timestamp":1658966400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Self-Sovereign Identity (SSI) is an identity model centered on the user. The user maintains and controls their data in this model. When a service provider requests data from the user, the user sends it directly to the service provider, bypassing third-party intermediaries. Thus, SSI reduces identity providers\u2019 involvement in the identification, authentication, and authorization, thereby increasing user privacy. Additionally, users can share portions of their personal information with service providers, significantly improving user privacy. This identity model has drawn the attention of researchers and organizations worldwide, resulting in an increase in both scientific and non-scientific literature on the subject. This study conducts a comprehensive and rigorous systematic review of the literature and a systematic mapping of theoretical and practical advances in SSI. We identified and analyzed evidence from reviewed materials to address four research questions, resulting in a novel SSI taxonomy used to categorize and review publications. Additionally, open challenges are discussed along with recommendations for future work.<\/jats:p>","DOI":"10.3390\/s22155641","type":"journal-article","created":{"date-parts":[[2022,7,28]],"date-time":"2022-07-28T22:43:26Z","timestamp":1659048206000},"page":"5641","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":84,"title":["Self-Sovereign Identity: A Systematic Review, Mapping and Taxonomy"],"prefix":"10.3390","volume":"22","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4492-163X","authenticated-orcid":false,"given":"Frederico","family":"Schardong","sequence":"first","affiliation":[{"name":"Graduate Program on Computer Science, Department of Informatics and Statistics, Federal University of Santa Catarina (UFSC), Florian\u00f3polis 88040-370, SC, Brazil"},{"name":"Federal Institute of Education, Science and Technology of Rio Grande do Sul, Rolante 95690-000, RS, Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9611-5694","authenticated-orcid":false,"given":"Ricardo","family":"Cust\u00f3dio","sequence":"additional","affiliation":[{"name":"Graduate Program on Computer Science, Department of Informatics and Statistics, Federal University of Santa Catarina (UFSC), Florian\u00f3polis 88040-370, SC, Brazil"}]}],"member":"1968","published-online":{"date-parts":[[2022,7,28]]},"reference":[{"key":"ref_1","unstructured":"ISO Central Secretary (2019). IT Security and Privacy\u2014A Framework for Identity Management-Part 1: Terminology and Concepts, International Organization for Standardization."},{"key":"ref_2","unstructured":"Bertino, E., and Takahashi, K. (2010). Identity Management: Concepts, Technologies, and Systems, Artech House."},{"key":"ref_3","unstructured":"Allen, C. (2022, February 13). The Path to Self-Sovereign Identity. Available online: http:\/\/www.lifewithalacrity.com\/2016\/04\/the-path-to-self-soverereign-identity.html."},{"key":"ref_4","unstructured":"Hackett, R. (2022, February 13). LinkedIn Lost 167 Million Account Credentials in Data Breach. Available online: https:\/\/fortune.com\/2016\/05\/18\/linkedin-data-breach-email-password\/."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MC.2018.3191268","article-title":"User data privacy: Facebook, Cambridge Analytica, and privacy protection","volume":"51","author":"Isaak","year":"2018","journal-title":"Computer"},{"key":"ref_6","unstructured":"Melendez, S., and Pasternack, A. (2022, February 13). Here Are the Data Brokers Quietly Buying and Selling Your Personal Information. Available online: https:\/\/www.fastcompany.com\/90310803."},{"key":"ref_7","unstructured":"The Sovrin Foundation (2022, February 13). Sovrin. Available online: https:\/\/sovrin.org\/."},{"key":"ref_8","unstructured":"uPort (2022, February 13). uPort. Available online: https:\/\/www.uport.me\/."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"102731","DOI":"10.1016\/j.jnca.2020.102731","article-title":"Blockchain-based identity management systems: A review","volume":"166","author":"Liu","year":"2020","journal-title":"J. Netw. Comput. Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"139009","DOI":"10.1109\/ACCESS.2021.3117588","article-title":"Decentralized and Self-Sovereign Identity: Systematic Mapping Study","volume":"9","year":"2021","journal-title":"IEEE Access"},{"key":"ref_11","doi-asserted-by":"crossref","unstructured":"Ghaffari, F., Gilani, K., Bertin, E., and Crespi, N. (2021). Identity and access management using distributed ledger technology: A survey. Int. J. Netw. Manag., e2180.","DOI":"10.1002\/nem.2180"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1155\/2021\/9910078","article-title":"The Practicality of Adopting Blockchain-Based Distributed Identity Management in Organisations: A Meta-Synthesis","volume":"2021","author":"Mulaji","year":"2021","journal-title":"Secur. Commun. Netw."},{"key":"ref_13","first-page":"1","article-title":"Blockchain-Based Identity Management: A Survey From the Enterprise and Ecosystem Perspective","volume":"67","author":"Kuperberg","year":"2019","journal-title":"IEEE Trans. Eng. Manag."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Zhu, X., and Badr, Y. (2018). Identity Management Systems for the Internet of Things: A Survey Towards Blockchain Solutions. Sensors, 18.","DOI":"10.3390\/s18124215"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1735","DOI":"10.18517\/ijaseit.8.4-2.6838","article-title":"Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey","volume":"8","author":"Lim","year":"2018","journal-title":"Int. J. Adv. Sci. Eng. Inf. Technol."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Kaneriya, J., and Patel, H. (2020, January 3\u20135). A Comparative Survey on Blockchain Based Self Sovereign Identity System. Proceedings of the 2020 3rd International Conference on Intelligent Sustainable Systems (ICISS), Coimbatore, India.","DOI":"10.1109\/ICISS49785.2020.9315899"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Gilani, K., Bertin, E., Hatin, J., and Crespi, N. (2020, January 28\u201330). A survey on blockchain-based identity management and decentralized privacy for personal data. Proceedings of the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France.","DOI":"10.1109\/BRAINS49436.2020.9223312"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"19","DOI":"10.33166\/AETiC.2020.05.002","article-title":"Decentralized identity systems: Architecture, challenges, solutions and future directions","volume":"4","author":"Dib","year":"2020","journal-title":"Ann. Emerg. Technol. Comput."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1016\/j.cosrev.2018.10.002","article-title":"A survey on essential components of a self-sovereign identity","volume":"30","author":"Gayvoronskaya","year":"2018","journal-title":"Comput. Sci. Rev."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Schmidt, K., M\u00fchle, A., Gr\u00fcner, A., and Meinel, C. (2021, January 13\u201315). Clear the Fog: Towards a Taxonomy of Self-Sovereign Identity Ecosystem Members. Proceedings of the 2021 18th International Conference on Privacy, Security and Trust (PST), Auckland, New Zealand.","DOI":"10.1109\/PST52912.2021.9647797"},{"key":"ref_21","unstructured":"ID123 Inc. (2022, February 13). ID123. Available online: https:\/\/www.id123.io\/."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Ometov, A., Bezzateev, S., M\u00e4kitalo, N., Andreev, S., Mikkonen, T., and Koucheryavy, Y. (2018). Multi-Factor Authentication: A Survey. Cryptography, 2.","DOI":"10.3390\/cryptography2010001"},{"key":"ref_23","unstructured":"Stallings, W. (2013). Cryptography and Network Security: Principles and Practice, Prentice Hall Press. [6th ed.]."},{"key":"ref_24","unstructured":"View, M., Rydell, J., Pei, M., and Machani, S. (2011). TOTP: Time-Based One-Time Password Algorithm, RFC Society."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"743","DOI":"10.1109\/TIFS.2018.2866025","article-title":"OTPaaS\u2014One time password as a service","volume":"14","author":"Erdem","year":"2018","journal-title":"IEEE Trans. Inf. Forens. Secur."},{"key":"ref_26","unstructured":"Bank, W. (2022, February 13). ID4D Practitioner\u2019s Guide. Available online: http:\/\/documents.worldbank.org\/curated\/en\/248371559325561562\/ID4D-Practitioner-s-Guide."},{"key":"ref_27","unstructured":"(2022, February 13). Government Digital Service, U. Introducing GOV.UK Verify, Available online: https:\/\/www.gov.uk\/government\/publications\/introducing-govuk-verify\/introducing-govuk-verify."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1093\/ietisy\/e89-d.1.112","article-title":"A Survey on Identity Management Protocols and Standards","volume":"89","author":"Miyata","year":"2006","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"El Maliki, T., and Seigneur, J.M. (2007, January 14\u201320). A Survey of User-centric Identity Management Technologies. Proceedings of the International Conference on Emerging Security Information, Systems, and Technologies (SECUREWARE 2007), Valencia, Spain.","DOI":"10.1109\/SECUREWARE.2007.4385303"},{"key":"ref_30","unstructured":"Ferdous, M. (2015). User-Controlled Identity Management Systems Using Mobile Devices. [Ph.D. Thesis, University of Glasgow]."},{"key":"ref_31","unstructured":"eBay Inc. (2022, February 13). eBay. Available online: https:\/\/www.ebay.com\/."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"79","DOI":"10.1007\/s10683-006-4309-2","article-title":"The value of reputation on eBay: A controlled experiment","volume":"9","author":"Resnick","year":"2006","journal-title":"Exp. Econ."},{"key":"ref_33","unstructured":"Laurent, M., and Bouzefrane, S. (2015). 3\u2014Authentication Systems. Digital Identity Management, Elsevier."},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Ferdous, M.S., Norman, G., and Poet, R. (2014, January 10\u201313). Mathematical Modelling of Identity, Identity Management and Other Related Topics. Proceedings of the 7th International Conference on Security of Information and Networks, Lausanne, Switzerland.","DOI":"10.1145\/2659651.2659729"},{"key":"ref_35","doi-asserted-by":"crossref","unstructured":"Talib, S., Clarke, N.L., and Furnell, S.M. (2010, January 17\u201320). An Analysis of Information Security Awareness within Home and Work Environments. Proceedings of the 2010 International Conference on Availability, Reliability and Security, Krakow, Poland.","DOI":"10.1109\/ARES.2010.27"},{"key":"ref_36","unstructured":"Scarfone, K., and Souppaya, M. (2009). Guide to Enterprise Password Management, National Institute of Standards and Technology. Technical report."},{"key":"ref_37","unstructured":"Hughes, J., and Maler, E. (2005). Security Assertion Markup Language (SAML) V2.0 Technical Overview, OASIS. Technical Report."},{"key":"ref_38","doi-asserted-by":"crossref","unstructured":"Hardt, D. (2012). The OAuth 2.0 Authorization Framework, OAuth.","DOI":"10.17487\/rfc6749"},{"key":"ref_39","unstructured":"Recordon, D., and Reed, D. (October, January 30). OpenID 2.0: A platform for user-centric identity management. Proceedings of the 2nd ACM Workshop on Digital Identity Management, Alexandria, VA, USA."},{"key":"ref_40","unstructured":"J\u00f8sang, A., and Pope, S. (2005). User Centric Identity Management. Proceedings of the AusCERT Asia Pacific Information Technology Security Conference, APCERT Secretariat."},{"key":"ref_41","unstructured":"Ingram, D. (2022, February 13). Facebook Hits 2 Billion-User Mark, Doubling in Size Since 2012. Available online: https:\/\/www.reuters.com\/article\/us-facebook-users-idUSKBN19I2GG."},{"key":"ref_42","unstructured":"Galperin, E., and Ben Hassine, W. (2022, February 13). Changes to Facebook\u2019s \u201cReal Names\u201d Policy Still Don\u2019t Fix the Problem. Available online: https:\/\/www.eff.org\/deeplinks\/2015\/12\/changes-facebooks-real-names-policy-still-dont-fix-problem."},{"key":"ref_43","unstructured":"Searls, D. (2022, February 13). The Identity Problem. Available online: https:\/\/blogs.harvard.edu\/vrm\/2012\/11\/08\/the-identity-problem\/."},{"key":"ref_44","unstructured":"Loffreto, D. (2022, February 13). Administrative Precedence. Available online: https:\/\/www.moxytongue.com\/2013\/01\/administrative-precedence.html."},{"key":"ref_45","unstructured":"European Parliament, Council of the European Union (2022, February 13). Regulation (EU) 2016\/679. Available online: http:\/\/data.europa.eu\/eli\/reg\/2016\/679\/oj."},{"key":"ref_46","unstructured":"Chau, E.P., and Hertzberg, R. (2022, February 13). California Consumer Privacy Act of 2018, Available online: https:\/\/leginfo.legislature.ca.gov\/faces\/billTextClient.xhtml?bill_id=201720180AB375."},{"key":"ref_47","unstructured":"Mill, J.S. (1859). On Liberty, John W. Parker and Son."},{"key":"ref_48","unstructured":"Zalta, E.N. (2020). John Locke. The Stanford Encyclopedia of Philosophy, Spring 2020 ed., Stanford University."},{"key":"ref_49","unstructured":"Loffreto, D. (2022, February 13). What is \u201cSovereign Source Authority\u201d?. Available online: https:\/\/www.moxytongue.com\/2012\/02\/what-is-sovereign-source-authority.html."},{"key":"ref_50","unstructured":"Searls, D. (2022, February 13). Some Perspective on Self-Sovereign Identity. Available online: https:\/\/www.kuppingercole.com\/blog\/guest\/some-perspective-on-self-sovereign-identity."},{"key":"ref_51","first-page":"310","article-title":"The origins of the SSI community","volume":"Volume 1","author":"Young","year":"2021","journal-title":"Self-Sovereign Identity: Decentralized Digital Identity and Verifiable Credentials"},{"key":"ref_52","unstructured":"Vescent, H., Young, K., Duffy, H., Sabadello, M., Zagidulin, D., and Caballero, J. (2019). A Comprehensive Guide to Self Sovereign Identity, Manning."},{"key":"ref_53","unstructured":"Young, K. (2020). The Domains of Identity: A Framework for Understanding Identity Systems in Contemporary Society, Anthem Press."},{"key":"ref_54","unstructured":"Searls, D. (2022, February 13). Leveraging Whitman. Available online: http:\/\/blogs.harvard.edu\/vrm\/2013\/08\/21\/leveraging-whitman\/."},{"key":"ref_55","unstructured":"Searls, D. (2022, February 13). IIW Challenge #1: Sovereign Identity in the Great Silo Forest. Available online: http:\/\/blogs.harvard.edu\/doc\/2013\/10\/14\/iiw-challenge-1-sovereign-identity-in-the-great-silo-forest\/."},{"key":"ref_56","unstructured":"Searls, D. (2022, February 13). Personal = Sovereign. Available online: http:\/\/blogs.harvard.edu\/vrm\/2014\/02\/06\/personal-sovereign\/."},{"key":"ref_57","unstructured":"Loffreto, D. (2022, February 13). Recalibrating Sovereignty. Available online: https:\/\/www.moxytongue.com\/2013\/04\/recalibrating-sovereignty.html."},{"key":"ref_58","unstructured":"Sporny, M., Longley, D., and Chadwick, D. (2022, February 13). Verifiable Credentials Data Model 1.0. Available online: https:\/\/www.w3.org\/TR\/vc-data-model\/."},{"key":"ref_59","unstructured":"Reed, D., Sporny, M., Longley, D., Christopher, A., Grant, R., and Sabadello, M. (2022, February 13). Decentralized Identifiers (DIDs). Available online: https:\/\/www.w3.org\/TR\/did-core\/."},{"key":"ref_60","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MSEC.2018.2888782","article-title":"Self-Sovereign Digital Identity: A Paradigm Shift for Identity","volume":"17","author":"Toth","year":"2019","journal-title":"IEEE Secur. Priv."},{"key":"ref_61","doi-asserted-by":"crossref","unstructured":"Turner, S., Farrell, S., and Housley, R. (2010). An Internet Attribute Certificate Profile for Authorization, RFC Society.","DOI":"10.17487\/rfc5755"},{"key":"ref_62","doi-asserted-by":"crossref","unstructured":"Pfitzmann, B. (2001). An efficient system for non-transferable anonymous credentials with optional anonymity revocation. Proceedings of the Advances in Cryptology\u2014EUROCRYPT 2001, Springer.","DOI":"10.1007\/3-540-44987-6"},{"key":"ref_63","unstructured":"Yung, M. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials. Proceedings of the Advances in Cryptology\u2014CRYPTO 2002."},{"key":"ref_64","doi-asserted-by":"crossref","first-page":"1030","DOI":"10.1145\/4372.4373","article-title":"Security without Identification: Transaction Systems to Make Big Brother Obsolete","volume":"28","author":"Chaum","year":"1985","journal-title":"Commun. ACM"},{"key":"ref_65","first-page":"1459","article-title":"Privacy-preserving Identity Management System","volume":"2021","author":"Lee","year":"2021","journal-title":"Cryptology"},{"key":"ref_66","first-page":"1","article-title":"SIMS: Self-Sovereign Identity Management System with Preserving Privacy in Blockchain","volume":"1","author":"Lee","year":"2019","journal-title":"IACR Cryptol."},{"key":"ref_67","doi-asserted-by":"crossref","unstructured":"Schanzenbach, M., Kilian, T., Sch\u00fctte, J., and Banse, C. (2019). ZKlaims: Privacy-preserving Attribute-based Credentials using Non-interactive Zero-knowledge Techniques. Proceedings of the 16th International Joint Conference on e-Business and Telecommunications-SECRYPT, SciTePress.","DOI":"10.5220\/0007772903250332"},{"key":"ref_68","doi-asserted-by":"crossref","unstructured":"Brassard, G. (1990). Efficient Identification and Signatures for Smart Cards. Proceedings of the Advances in Cryptology\u2014CRYPTO\u2019 89, Springer.","DOI":"10.1007\/0-387-34805-0"},{"key":"ref_69","unstructured":"Swan, M. (2015). Blockchain: Blueprint for a New Economy, O\u2019Reilly Media, Inc."},{"key":"ref_70","first-page":"83","article-title":"Private Data System Enabling Self-Sovereign Storage Managed by Executable Choreographies","volume":"Volume 10320","author":"Alboaie","year":"2017","journal-title":"Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_71","unstructured":"Alp\u00e1r, G., van den Broek, F., Hampiholi, B., Jacobs, B., Lueks, W., and Ringers, S. (2017, January 8). IRMA: Practical, decentralized and privacy-friendly identity management using smartphones. Proceedings of the 10th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2017), Minneapolis, MA, USA."},{"key":"ref_72","first-page":"1","article-title":"Self-Sovereign Identity Solutions: The Necessity of Blockchain Technology","volume":"1904","author":"Hageman","year":"2019","journal-title":"CoRR"},{"key":"ref_73","doi-asserted-by":"crossref","unstructured":"Linklater, G., Herbert, A., Smith, C., Irwin, B., Herbert, A., and Irwin, B. (2018). Toward distributed key management for offline authentication. Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists on\u2014SAICSIT \u201918, Association for Computing Machinery.","DOI":"10.1145\/3278681.3278683"},{"key":"ref_74","doi-asserted-by":"crossref","unstructured":"Zhu, X., and Badr, Y. (August, January 30). Fog computing security architecture for the internet of things using blockchain-based social networks. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada.","DOI":"10.1109\/Cybermatics_2018.2018.00234"},{"key":"ref_75","doi-asserted-by":"crossref","first-page":"475","DOI":"10.1016\/j.future.2019.12.019","article-title":"An overview on smart contracts: Challenges, advances and platforms","volume":"105","author":"Zheng","year":"2020","journal-title":"Future Gener. Comput. Syst."},{"key":"ref_76","doi-asserted-by":"crossref","unstructured":"Finfgeld-Connett, D. (2018). A Guide to Qualitative Meta-Synthesis, Routledge.","DOI":"10.4324\/9781351212793"},{"key":"ref_77","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.infsof.2015.03.007","article-title":"Guidelines for conducting systematic mapping studies in software engineering: An update","volume":"64","author":"Petersen","year":"2015","journal-title":"Inf. Softw. Technol."},{"key":"ref_78","doi-asserted-by":"crossref","unstructured":"Petersen, K., Feldt, R., Mujtaba, S., and Mattsson, M. (2008, January 26\u201327). Systematic Mapping Studies in Software Engineering. Proceedings of the 12th International Conference on Evaluation and Assessment in Software Engineering, Bari, Italy.","DOI":"10.14236\/ewic\/EASE2008.8"},{"key":"ref_79","unstructured":"Kitchenham, B., and Charters, S. (2007). Guidelines for Performing Systematic Literature Reviews in Software Engineering, EBSE. Technical Report."},{"key":"ref_80","unstructured":"Association for Computing Machinery (2022, February 13). ACM Digital Library. Available online: https:\/\/dl.acm.org."},{"key":"ref_81","unstructured":"Institute of Electrical and Electronics Engineers (2022, February 13). IEEE Xplore. Available online: https:\/\/ieeexplore.ieee.org\/."},{"key":"ref_82","unstructured":"Elsevier (2022, February 13). ScienceDirect. Available online: https:\/\/www.sciencedirect.com\/."},{"key":"ref_83","unstructured":"Springer Nature (2022, February 13). Springer Link. Available online: https:\/\/link.springer.com\/."},{"key":"ref_84","unstructured":"Elsevier (2022, February 13). Scopus Preview. Available online: https:\/\/www.scopus.com\/."},{"key":"ref_85","unstructured":"Clarivate Analytics (2022, February 13). Web of Science. Available online: https:\/\/www.webofknowledge.com\/."},{"key":"ref_86","unstructured":"Google (2022, February 13). Google Scholar. Available online: https:\/\/scholar.google.com\/."},{"key":"ref_87","unstructured":"Google (2022, February 13). Google Patents. Available online: https:\/\/patents.google.com\/."},{"key":"ref_88","unstructured":"Elsevier (2022, February 13). Mendeley. Available online: https:\/\/www.mendeley.com\/."},{"key":"ref_89","doi-asserted-by":"crossref","unstructured":"Wohlin, C. (2014). Guidelines for snowballing in systematic literature studies and a replication in software engineering. Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering-EASE \u201914, ACM Press.","DOI":"10.1145\/2601248.2601268"},{"key":"ref_90","unstructured":"Schardong, F., and Cust\u00f3dio, R. (2022, April 23). Study Selection Process, Spreadsheet. Available online: https:\/\/docs.google.com\/spreadsheets\/d\/1FzUJRqe3WUhtsNYV6PyMZO8F14iQO-DXnBHR9xUsaiw."},{"key":"ref_91","doi-asserted-by":"crossref","unstructured":"Lux, Z.A., Beierle, F., Zickau, S., and Gondor, S. (2019, January 22\u201325). Full-text Search for Verifiable Credential Metadata on Distributed Ledgers. Proceedings of the 2019 6th International Conference on Internet of Things: Systems, Management and Security (IOTSMS 2019), Granada, Spain.","DOI":"10.1109\/IOTSMS48152.2019.8939249"},{"key":"ref_92","doi-asserted-by":"crossref","unstructured":"Schardong, F., Cust\u00f3dio, R., Pioli, L., and Meyer, J. (2021). Matching Metadata on Blockchain for Self-Sovereign Identity. Proceedings of the International Conference on Business Process Management, Springer.","DOI":"10.1007\/978-3-030-94343-1_32"},{"key":"ref_93","unstructured":"Anaigoundanpudur Karthikeyan, N. (2021). Cryptographic Implementation of Issuer Policy for Self Sovereign Identity Systems. [Master\u2019s Thesis, University of Twente]."},{"key":"ref_94","doi-asserted-by":"crossref","unstructured":"Kang, M., and Lemieux, V. (2021). A Decentralized Identity-Based Blockchain Solution for Privacy-Preserving Licensing of Individual-Controlled Data to Prevent Unauthorized Secondary Data Usage. Ledger, 6.","DOI":"10.5195\/ledger.2021.239"},{"key":"ref_95","doi-asserted-by":"crossref","unstructured":"Bathen, L., Flores, G.H., Madl, G., Jadav, D., Arvanitis, A., Santhanam, K., Zeng, C., and Gordon, A. (2019). SelfIs: Self-sovereign biometric IDs. Proceedings of the IEEE\/CVF Conference on Computer Vision and Pattern Recognition Workshops (CVPRW), IEEE Computer Society.","DOI":"10.1109\/CVPRW.2019.00344"},{"key":"ref_96","doi-asserted-by":"crossref","unstructured":"Mishra, P., Modanwal, V., Kaur, H., and Varshney, G. (2021, January 9\u201312). Pseudo-Biometric Identity Framework: Achieving Self-Sovereignity for Biometrics on Blockchain. Proceedings of the IEEE 2021 IEEE International Conference on Systems, Man and Cybernetics (SMC), Prague, Czech Republic.","DOI":"10.1109\/SMC52423.2021.9659136"},{"key":"ref_97","doi-asserted-by":"crossref","unstructured":"Abraham, A., Schinnerl, C., and More, S. (2021, January 6\u20138). SSI Strong Authentication using a Mobile-Phone based Identity Wallet reaching a High Level of Assurance. Proceedings of the 18th International Conference on Security and Cryptography-SECRYPT, Lisbon, Portugal.","DOI":"10.5220\/0010542801370148"},{"key":"ref_98","first-page":"307","article-title":"Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems","volume":"Volume 11999","author":"Abraham","year":"2020","journal-title":"Proceedings of the Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"ref_99","doi-asserted-by":"crossref","unstructured":"Gr\u00fcner, A., M\u00fchle, A., and Meinel, C. (2019, January 26\u201328). An Integration Architecture to Enable Service Providers for Self-sovereign Identity. Proceedings of the 2019 IEEE 18th International Symposium on Network Computing and Applications (NCA 2019), Cambridge, MA, USA.","DOI":"10.1109\/NCA.2019.8935015"},{"key":"ref_100","doi-asserted-by":"crossref","first-page":"138553","DOI":"10.1109\/ACCESS.2021.3116095","article-title":"ATIB: Design and Evaluation of an Architecture for Brokered Self-Sovereign Identity Integration and Trust-Enhancing Attribute Aggregation for Service Provider","volume":"9","author":"Meinel","year":"2021","journal-title":"IEEE Access"},{"key":"ref_101","unstructured":"Martinez Jurado, V., Vila, X., Kubach, M., Henderson Johnson Jeyakumar, I., Solana, A., and Marangoni, M. (2021, January 1\u20132). Applying assurance levels when issuing and verifying credentials using Trust Frameworks. Proceedings of the Open Identity Summit 2021, Copenhagen, Denmark."},{"key":"ref_102","doi-asserted-by":"crossref","unstructured":"Lux, Z.A., Thatmann, D., Zickau, S., and Beierle, F. (2020, January 28\u201330). Distributed-Ledger-based Authentication with Decentralized Identifiers and Verifiable Credentials. Proceedings of the 2020 2nd Conference on Blockchain Research & Applications for Innovative Networks and Services (BRAINS), Paris, France.","DOI":"10.1109\/BRAINS49436.2020.9223292"},{"key":"ref_103","doi-asserted-by":"crossref","unstructured":"Lagutin, D., Kortesniemi, Y., Fotiou, N., and Siris, V.A. (2019, January 24\u201327). Enabling decentralised identifiers and verifiable credentials for constrained IoT devices using OAuth-based delegation. Proceedings of the Workshop on Decentralized IoT Systems and Security (DISS 2019), in Conjunction with the NDSS Symposium, San Diego, CA, USA.","DOI":"10.14722\/diss.2019.23005"},{"key":"ref_104","doi-asserted-by":"crossref","unstructured":"Yildiz, H., Ritter, C., Nguyen, L.T., Frech, B., Martinez, M.M., and K\u00fcpper, A. (2021, January 5\u20138). Connecting Self-Sovereign Identity with Federated and User-centric Identities via SAML Integration. Proceedings of the 2021 IEEE Symposium on Computers and Communications (ISCC), Athens, Greece.","DOI":"10.1109\/ISCC53001.2021.9631453"},{"key":"ref_105","doi-asserted-by":"crossref","unstructured":"Zhong, T., Shi, P., and Chang, J. (2021, January 28\u201330). JointCloud Cross-chain Verification Model of Decentralized Identifiers. Proceedings of the 2021 IEEE International Performance, Computing, and Communications Conference (IPCCC), Austin, TX, USA.","DOI":"10.1109\/IPCCC51483.2021.9679363"},{"key":"ref_106","doi-asserted-by":"crossref","unstructured":"Hong, S., and Kim, H. (2020). VaultPoint: A Blockchain-Based SSI Model that Complies with OAuth 2.0. Electronics, 9.","DOI":"10.3390\/electronics9081231"},{"key":"ref_107","doi-asserted-by":"crossref","unstructured":"Schanzenbach, M., Bramm, G., and Sch\u00fctte, J. (2018, January 1\u20133). reclaimID: Secure, Self-Sovereign Identities Using Name Systems and Attribute-Based Encryption. Proceedings of the 2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference On Big Data Science And Engineering (TrustCom\/BigDataSE), New York, NY, USA.","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00134"},{"key":"ref_108","doi-asserted-by":"crossref","first-page":"6688","DOI":"10.1109\/TVT.2020.2986041","article-title":"An Identity Management and Authentication Scheme Based on Redactable Blockchain for Mobile Networks","volume":"69","author":"Xu","year":"2020","journal-title":"IEEE Trans. Veh. Technol."},{"key":"ref_109","unstructured":"Schanzenbach, M. (2020). Towards Self-Sovereign, Decentralized Personal Data Sharing and Identity Management. [Ph.D. Thesis, Technical University of Munich]."},{"key":"ref_110","doi-asserted-by":"crossref","unstructured":"Lauinger, J., Ernstberger, J., Regnath, E., Hamad, M., and Steinhorst, S. (2021, January 3\u20136). A-PoA: Anonymous Proof of Authorization for Decentralized Identity Management. Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia.","DOI":"10.1109\/ICBC51069.2021.9461082"},{"key":"ref_111","unstructured":"Mukta, R., Paik, H.y., Lu, Q., and Kanhere, S.S. (2022, April 19). Credential-Based Trust Management in Self Sovereign Identity. womENcourage 2021. Available online: https:\/\/womencourage.acm.org\/2021\/wp-content\/uploads\/2021\/07\/87_extendedabstract.pdf."},{"key":"ref_112","doi-asserted-by":"crossref","unstructured":"Stokkink, Q., and Pouwelse, J. (August, January 30). Deployment of a Blockchain-Based Self-Sovereign Identity. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada.","DOI":"10.1109\/Cybermatics_2018.2018.00230"},{"key":"ref_113","doi-asserted-by":"crossref","first-page":"388","DOI":"10.1109\/TCSS.2020.3049009","article-title":"A Lightweight Scheme Exploiting Social Networks for Data Minimization According to the GDPR","volume":"8","author":"Lax","year":"2021","journal-title":"IEEE Trans. Comput. Soc. Syst."},{"key":"ref_114","doi-asserted-by":"crossref","unstructured":"Abraham, A., More, S., Rabensteiner, C., and H\u00f6randner, F. (2020). Revocable and offline-verifiable self-sovereign identities. Proceedings of the 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), IEEE Computer Society.","DOI":"10.1109\/TrustCom50675.2020.00136"},{"key":"ref_115","doi-asserted-by":"crossref","first-page":"1857","DOI":"10.1587\/transinf.2021NGP0006","article-title":"Verifiable Credential Proof Generation and Verification Model for Decentralized SSI-Based Credit Scoring Data","volume":"104","author":"Cho","year":"2021","journal-title":"IEICE Trans. Inf. Syst."},{"key":"ref_116","unstructured":"Chotkan, R. (2021). Industry-Grade Self-Sovereign Identity: On the Realisation of a Fully Distributed Self-Sovereign Identity Architecture. [Master\u2019s Thesis, Delft University of Technology]."},{"key":"ref_117","doi-asserted-by":"crossref","first-page":"102050","DOI":"10.1016\/j.cose.2020.102050","article-title":"A zero-knowledge-proof-based digital identity management scheme in blockchain","volume":"99","author":"Yang","year":"2020","journal-title":"Comput. Secur."},{"key":"ref_118","doi-asserted-by":"crossref","unstructured":"Bobolz, J., Eidens, F., Krenn, S., Ramacher, S., and Samelin, K. (2021). Issuer-Hiding Attribute-Based Credentials. Proceedings of the International Conference on Cryptology and Network Security, Springer.","DOI":"10.1007\/978-3-030-92548-2_9"},{"key":"ref_119","doi-asserted-by":"crossref","unstructured":"Jaroucheh, Z., and \u00c1lvarez, I.A. (2021, January 6\u20138). Secretation: Toward a Decentralised Identity and Verifiable Credentials Based Scalable and Decentralised Secret Management Solution. Proceedings of the 2021 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), Sydney, Australia.","DOI":"10.1109\/ICBC51069.2021.9461144"},{"key":"ref_120","doi-asserted-by":"crossref","first-page":"7972","DOI":"10.1109\/JIOT.2021.3112537","article-title":"DT-SSIM: A Decentralized Trustworthy Self-Sovereign Identity Management Framework","volume":"9","author":"Samir","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_121","doi-asserted-by":"crossref","unstructured":"Siddiqui, H., Idrees, M., Gudymenko, I., and Fetzer, C. (2021, January 4\u20138). Credentials as a Service Providing Self Sovereign Identity as a Cloud Service Using Trusted Execution Environments. Proceedings of the 2021 IEEE International Conference on Cloud Engineering (IC2E), San Francisco, CA, USA.","DOI":"10.1109\/IC2E52221.2021.00036"},{"key":"ref_122","doi-asserted-by":"crossref","unstructured":"Gruner, A., Muhle, A., and Meinel, C. (2019, January 6\u20139). Using Probabilistic Attribute Aggregation for Increasing Trust in Attribute Assurance. Proceedings of the 2019 IEEE Symposium Series on Computational Intelligence (SSCI), Xiamen, China.","DOI":"10.1109\/SSCI44817.2019.9003094"},{"key":"ref_123","doi-asserted-by":"crossref","unstructured":"Bhattacharya, M.P., Zavarsky, P., and Butakov, S. (2020). Enhancing the Security and Privacy of Self-Sovereign Identities on Hyperledger Indy Blockchain. Proceedings of the 2020 International Symposium on Networks, Computers and Communications (ISNCC), IEEE Computer Society.","DOI":"10.1109\/ISNCC49221.2020.9297357"},{"key":"ref_124","doi-asserted-by":"crossref","first-page":"18","DOI":"10.3389\/fbloc.2021.622090","article-title":"Evaluating Trust Assurance in Indy-Based Identity Networks Using Public Ledger Data","volume":"4","author":"Abramson","year":"2021","journal-title":"Front. Blockchain"},{"key":"ref_125","doi-asserted-by":"crossref","unstructured":"Gr\u00fcner, A., M\u00fchle, A., Gayvoronskaya, T., and Meinel, C. (August, January 30). A Quantifiable Trust Model for Blockchain-Based Identity Management. Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada.","DOI":"10.1109\/Cybermatics_2018.2018.00250"},{"key":"ref_126","unstructured":"Barclay, I., Freytsis, M., Bucher, S., Radha, S., Preece, A., and Taylor, I. (2020). Towards a Modelling Framework for Self-Sovereign Identity Systems. arXiv."},{"key":"ref_127","doi-asserted-by":"crossref","unstructured":"Liu, J., Hodges, A., Clay, L., and Monarch, J. (2020, January 28\u201330). An analysis of digital identity management systems - a two-mapping view. Proceedings of the 2020 2nd Conference on Blockchain Research and Applications for Innovative Networks and Services (BRAINS), Paris, France.","DOI":"10.1109\/BRAINS49436.2020.9223281"},{"key":"ref_128","doi-asserted-by":"crossref","first-page":"103059","DOI":"10.1109\/ACCESS.2019.2931173","article-title":"In Search of Self-Sovereign Identity Leveraging Blockchain Technology","volume":"7","author":"Ferdous","year":"2019","journal-title":"IEEE Access"},{"key":"ref_129","unstructured":"GWON, O.G. (2022, February 13). Content Wallet Device and Self-Sovereign Identity and Copyright Authentication System Using Same. Available online: https:\/\/patents.google.com\/patent\/WO2021125586A1\/en."},{"key":"ref_130","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1109\/MS.2020.2992783","article-title":"Design Pattern as a Service for Blockchain-Based Self-Sovereign Identity","volume":"37","author":"Liu","year":"2020","journal-title":"IEEE Soft."},{"key":"ref_131","doi-asserted-by":"crossref","unstructured":"Lim, S., Rhie, M.H., Hwang, D., and Kim, K.H. (2021, January 13\u201316). A Subject-Centric Credential Management Method based on the Verifiable Credentials. Proceedings of the 2021 International Conference on Information Networking (ICOIN), Bangkok, Thailand.","DOI":"10.1109\/ICOIN50884.2021.9333857"},{"key":"ref_132","doi-asserted-by":"crossref","unstructured":"Lemieux, V., Voskobojnikov, A., and Kang, M. (2021, January 12\u201316). Addressing Audit and Accountability Issues in Self-Sovereign Identity Blockchain Systems Using Archival Science Principles. Proceedings of the 2021 IEEE 45th Annual Computers, Software, and Applications Conference (COMPSAC), Madrid, Spain.","DOI":"10.1109\/COMPSAC51774.2021.00167"},{"key":"ref_133","doi-asserted-by":"crossref","unstructured":"Laurent, M., and Giannetsos, T. (2020). SSI-AWARE: Self-sovereign Identity Authenticated Backup with Auditing by Remote Entities. Proceedings of the Information Security Theory and Practice, Springer International Publishing.","DOI":"10.1007\/978-3-030-41702-4"},{"key":"ref_134","unstructured":"Soltani, R., Nguyen, U.T., and An, A. (2019, January 5\u20138). Practical Key Recovery Model for Self-Sovereign Identity Based Digital Wallets. Proceedings of the IEEE 17th International Conference on Dependable, Autonomic and Secure Computing, IEEE 17th International Conference on Pervasive Intelligence and Computing, IEEE 5th International Conference on Cloud and Big Data Computing, 4th Cyber Scienc, Fukuoka, Japan."},{"key":"ref_135","unstructured":"Kostadinov, K., de Vos, M., and Pouwelse, J. (2021). Towards Data Resilience for Fully Distributed Self-Sovereign Identity Managers. [Bachelor\u2019s Thesis, Delft University of Technology]."},{"key":"ref_136","unstructured":"Barolli, L., Poniszewska-Maranda, A., and Park, H. (2021). Group Delegated ID-Based Proxy Re-encryption for PHR. Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, Springer International Publishing."},{"key":"ref_137","doi-asserted-by":"crossref","unstructured":"Singh, H.P., Stefanidis, K., and Kirstein, F. (2021, January 19\u201321). A Private Key Recovery Scheme Using Partial Knowledge. Proceedings of the 2021 11th IFIP International Conference on New Technologies, Mobility and Security (NTMS), Paris, France.","DOI":"10.1109\/NTMS49979.2021.9432642"},{"key":"ref_138","doi-asserted-by":"crossref","first-page":"63","DOI":"10.3389\/fbloc.2020.609101","article-title":"An accessible interface layer for Self-Sovereign Identity","volume":"3","author":"Lockwood","year":"2021","journal-title":"Front. Blockchain"},{"key":"ref_139","unstructured":"Mustafa, K., and Sakir, S. (2022, February 13). Computer-Implemented Transaction System and Method. Available online: https:\/\/patents.google.com\/patent\/WO2021064182A1\/en."},{"key":"ref_140","doi-asserted-by":"crossref","unstructured":"Toth, K.C., Cavoukian, A., and Anderson-Priddy, A. (2020). Privacy by Design Identity Architecture Using Agents and Digital Identities. Proceedings of the Annual Privacy Forum, Springer.","DOI":"10.1007\/978-3-030-55196-4_5"},{"key":"ref_141","doi-asserted-by":"crossref","unstructured":"Shanmugarasa, Y., Paik, H.Y., Kanhere, S.S., and Zhu, L. (2021, January 22\u201326). Towards Automated Data Sharing in Personal Data Stores. Proceedings of the 2021 IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events (PerCom Workshops), Pisa, Italy.","DOI":"10.1109\/PerComWorkshops51409.2021.9431001"},{"key":"ref_142","unstructured":"Wohlgemuth, S., Umezawa, K., Mishina, Y., and Takaragi, K. (2020). A Secure Decision-Support Scheme for Self-Sovereign Identity Management. Proceedings of the Symposium on Cryptography and Information Security (SCIS), IEICE."},{"key":"ref_143","doi-asserted-by":"crossref","unstructured":"Inoue, K., Suzuki, D., Kurita, T., and Imai, S. (2020, January 22\u201324). Cooperative Task Scheduling for Personal Identity Verification in Networked Systems. Proceedings of the 2020 32nd International Teletraffic Congress (ITC 32), Osaka, Japan.","DOI":"10.1109\/ITC3249928.2020.00020"},{"key":"ref_144","unstructured":"Ro\u00dfnagel, H., Schunck, C.H., and M\u00f6dersheim, S. (2021). A lightweight trust management infrastructure for self-sovereign identity. Proceedings of the Open Identity Summit 2021, Gesellschaft f\u00fcr Informatik e.V."},{"key":"ref_145","unstructured":"Ro\u00dfnagel, H., Schunck, C.H., and M\u00f6dersheim, S. (2021). Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World. Proceedings of the Open Identity Summit 2021, Gesellschaft f\u00fcr Informatik e.V."},{"key":"ref_146","unstructured":"Hardman, D. (2022, March 12). DIDComm Messaging. Available online: https:\/\/identity.foundation\/didcomm-messaging\/spec\/."},{"key":"ref_147","unstructured":"West, R., Bluhm, D., Hailstone, M., Curran, S., Curren, S., and Aristy, G. (2019). Aries RFC 0023: DID Exchange Protocol 1.0, Linux Foundation. Technical Report."},{"key":"ref_148","unstructured":"Smith, S.M. (2019). Key Event Receipt Infrastructure (KERI). arXiv."},{"key":"ref_149","doi-asserted-by":"crossref","unstructured":"Fedrecheski, G., Costa, L.C., Afzal, S., Rabaey, J.M., Lopes, R.D., and Zuffo, M.K. (2021). A low-overhead approach for self-sovereign identity in IoT. arXiv.","DOI":"10.1007\/978-3-031-20936-9_21"},{"key":"ref_150","doi-asserted-by":"crossref","first-page":"10610","DOI":"10.1109\/JIOT.2021.3121722","article-title":"A New Approach to Constructing Decentralized Identifier for Secure and Flexible Key Rotation","volume":"9","author":"Park","year":"2021","journal-title":"IEEE Internet Things J."},{"key":"ref_151","doi-asserted-by":"crossref","unstructured":"Kim, K.H., Lim, S., Hwang, D.Y., and Kim, K.H. (2021, January 13\u201316). Analysis on the Privacy of DID Service Properties in the DID Document. Proceedings of the 2021 International Conference on Information Networking (ICOIN), Bangkok, Thailand.","DOI":"10.1109\/ICOIN50884.2021.9333997"},{"key":"ref_152","doi-asserted-by":"crossref","unstructured":"Naik, N., Grace, P., and Jenkins, P. (2021, January 5). An Attack Tree Based Risk Analysis Method for Investigating Attacks and Facilitating Their Mitigations in Self-Sovereign Identity. Proceedings of the 2021 IEEE Symposium Series on Computational Intelligence (SSCI), Canberra, Australia.","DOI":"10.1109\/SSCI50451.2021.9659929"},{"key":"ref_153","unstructured":"Apache Software Foundation (2022, February 13). Apache Solr. Available online: https:\/\/lucene.apache.org\/solr\/."},{"key":"ref_154","unstructured":"Hyperledger (2022, February 13). Hyperledger Indy. Available online: https:\/\/www.hyperledger.org\/use\/hyperledger-indy."},{"key":"ref_155","unstructured":"Honnibal, M., Montani, I., Van Landeghem, S., and Boyd, A. (2020). spaCy: Industrial-Strength Natural Language Processing in Python, spaCy."},{"key":"ref_156","unstructured":"Mikolov, T., Chen, K., Corrado, G., and Dean, J. (2013). Efficient estimation of word representations in vector space. arXiv."},{"key":"ref_157","unstructured":"Sakimura, N., Bradley, J., Jones, M., De Medeiros, B., and Mortimore, C. (2014). Openid Connect Core 1.0, The OpenID Foundation. Technical Report."},{"key":"ref_158","unstructured":"Fei, C., Lohkamp, J., Rusu, E., Szawan, K., Wagner, K., and Wittenberg, N. (2018). Self-Sovereign and Decentralised Identity By Design, Joloco. Technical Report."},{"key":"ref_159","unstructured":"Boeyen, S., Santesson, S., Polk, T., Housley, R., Farrell, S., and Cooper, D. (2008). Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile, RFC Society."},{"key":"ref_160","unstructured":"Alliance, F. (2019). Client to Authenticator Protocol (ctap), Alliance FIDO. Technical Report."},{"key":"ref_161","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/MSP.2015.2434151","article-title":"Cancelable biometrics: A review","volume":"32","author":"Patel","year":"2015","journal-title":"IEEE Sign. Process. Mag."},{"key":"ref_162","unstructured":"Hermans, J., Mennink, B., and Peeters, R. (2014, January 10\u201312). When a bloom filter is a doom filter: Security assessment of a novel iris biometric template protection system. Proceedings of the 2014 International Conference of the Biometrics Special Interest Group (BIOSIG), Darmstadt, Germany."},{"key":"ref_163","first-page":"120","article-title":"The openCV library","volume":"25","author":"Bradski","year":"2000","journal-title":"Dr. Dobb\u2019s J. Softw. Tools Prof. Program."},{"key":"ref_164","doi-asserted-by":"crossref","first-page":"709","DOI":"10.1109\/TIFS.2018.2855669","article-title":"Random distance method for generating unimodal and multimodal cancelable biometric features","volume":"14","author":"Kaur","year":"2018","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"ref_165","doi-asserted-by":"crossref","first-page":"612","DOI":"10.1145\/359168.359176","article-title":"How to share a secret","volume":"22","author":"Shamir","year":"1979","journal-title":"Commun. ACM"},{"key":"ref_166","doi-asserted-by":"crossref","unstructured":"Sabt, M., Achemlal, M., and Bouabdallah, A. (2015, January 20\u201322). Trusted execution environment: What it is, and what it is not. Proceedings of the 2015 IEEE Trustcom\/BigDataSE\/ISPA, Washington, DC, USA.","DOI":"10.1109\/Trustcom.2015.357"},{"key":"ref_167","unstructured":"Galperin, S., Adams, D.C., Myers, M., Ankney, R., and Malpani, A.N. (1999). X.509 Internet Public Key Infrastructure Online Certificate Status Protocol-OCSP, RFC Society."},{"key":"ref_168","unstructured":"U.S. Federal Government (2022, April 11). Internet Assigned Numbers Authority (IANA). Available online: https:\/\/www.iana.org\/."},{"key":"ref_169","doi-asserted-by":"crossref","unstructured":"Berners-Lee, T., Fielding, R.T., and Masinter, L.M. (2005). Uniform Resource Identifier (URI): Generic Syntax, RFC Society.","DOI":"10.17487\/rfc3986"},{"key":"ref_170","unstructured":"Sporny, M., Zagidulin, D., and Longley, D. (2022, February 13). The did:key Method. Available online: https:\/\/w3c-ccg.github.io\/did-method-key\/."},{"key":"ref_171","doi-asserted-by":"crossref","unstructured":"Josefsson, S., and Liusvaara, I. (2017). Edwards-Curve Digital Signature Algorithm (EdDSA), RFC Society.","DOI":"10.17487\/RFC8032"},{"key":"ref_172","unstructured":"Benet, J., and Sporny, M. (2021). The Multibase Data Format. Internet-Draft Draft-Multiformats-Multibase-03, Internet Engineering Task Force."},{"key":"ref_173","unstructured":"West, R., Bluhm, D., Hailstone, M., Curran, S., Curren, S., and Aristy, G. (2022, February 13). Aries RFC 0434: Out-of-Band Protocol 1.1. Available online: https:\/\/github.com\/hyperledger\/aries-rfcs\/blob\/main\/features\/0434-outofband\/README.md."},{"key":"ref_174","doi-asserted-by":"crossref","unstructured":"Bormann, C., and Hoffman, P.E. (2013). Concise Binary Object Representation (CBOR), RFC Society.","DOI":"10.17487\/rfc7049"},{"key":"ref_175","doi-asserted-by":"crossref","first-page":"770","DOI":"10.1145\/358790.358797","article-title":"Password authentication with insecure communication","volume":"24","author":"Lamport","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_176","doi-asserted-by":"crossref","unstructured":"Mockapetris, P. (1983). Domain Names: Concepts and Facilities, RFC Society.","DOI":"10.17487\/rfc0882"},{"key":"ref_177","doi-asserted-by":"crossref","unstructured":"Wachs, M., Schanzenbach, M., and Grothoff, C. (2013). On the feasibility of a censorship resistant decentralized name system. Proceedings of the International Symposium on Foundations and Practice of Security, Springer.","DOI":"10.1007\/978-3-319-05302-8_2"},{"key":"ref_178","doi-asserted-by":"crossref","unstructured":"Blaze, M., Bleumer, G., and Strauss, M. (1998). Divertible protocols and atomic proxy cryptography. Proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/BFb0054122"},{"key":"ref_179","unstructured":"Krawczyk, H., and Rabin, T. (2022, February 13). Chameleon Hashing and Signatures. Available online: https:\/\/ia.cr\/1998\/010."},{"key":"ref_180","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Magri, B., Venturi, D., and Andrade, E. Redactable Blockchain-or-Rewriting History in Bitcoin and Friends. Proceedings of the 2017 IEEE European Symposium on Security and Privacy (EuroS&P).","DOI":"10.1109\/EuroSP.2017.37"},{"key":"ref_181","doi-asserted-by":"crossref","unstructured":"Derler, D., Samelin, K., Slamanig, D., and Striecks, C. (2022, February 13). Fine-Grained and Controlled Rewriting in Blockchains: Chameleon-Hashing Gone Attribute-Based. Available online: https:\/\/eprint.iacr.org\/2019\/406.","DOI":"10.14722\/ndss.2019.23066"},{"key":"ref_182","doi-asserted-by":"crossref","unstructured":"Bethencourt, J., Sahai, A., and Waters, B. (2007, January 20\u201323). Ciphertext-policy attribute-based encryption. Proceedings of the 2007 IEEE Symposium on Security and Privacy (SP\u201907), Oakland, CA, USA.","DOI":"10.1109\/SP.2007.11"},{"key":"ref_183","doi-asserted-by":"crossref","unstructured":"Waters, B. (2005). Efficient identity-based encryption without random oracles. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer.","DOI":"10.1007\/11426639_7"},{"key":"ref_184","doi-asserted-by":"crossref","unstructured":"Boneh, D., Lynn, B., and Shacham, H. (2001). Short signatures from the Weil pairing. Proceedings of the International Conference on the Theory and Application of Cryptology and Information Security, Springer.","DOI":"10.1007\/3-540-45682-1_30"},{"key":"ref_185","doi-asserted-by":"crossref","unstructured":"Bitansky, N., Canetti, R., Chiesa, A., and Tromer, E. (2012). From extractable collision resistance to succinct non-interactive arguments of knowledge, and back again. Proceedings of the 3rd Innovations in Theoretical Computer Science Conference, Association for Computing Machinery.","DOI":"10.1145\/2090236.2090263"},{"key":"ref_186","doi-asserted-by":"crossref","unstructured":"Gentry, C. (2009, January 31). Fully homomorphic encryption using ideal lattices. Proceedings of the Forty-First Annual ACM Symposium on Theory of Computing, Bethesda, MD, USA.","DOI":"10.1145\/1536414.1536440"},{"key":"ref_187","unstructured":"Martin, R.C., Riehle, D., and Buschmann, F. (1997). Pattern Languages of Program Design 3, Addison-Wesley Longman Publishing Co., Inc."},{"key":"ref_188","unstructured":"Dalpiaz, F., Franch, X., and Horkoff, J. (2016). iStar 2.0 Language Guide. arXiv."},{"key":"ref_189","doi-asserted-by":"crossref","unstructured":"Mortier, R., Haddadi, H., Henderson, T., McAuley, D., and Crowcroft, J. (2015). Human-Data Interaction: The Human Face of the Data-Driven Society. arXiv.","DOI":"10.2139\/ssrn.2508051"},{"key":"ref_190","first-page":"21","article-title":"Attack trees","volume":"24","author":"Schneier","year":"1999","journal-title":"Dr. Dobb\u2019s J."},{"key":"ref_191","unstructured":"CA\/Browser Forum (2022, April 11). Certification Authority Browser Forum. Available online: https:\/\/cabforum.org\/."},{"key":"ref_192","doi-asserted-by":"crossref","unstructured":"Meng, W., Cofta, P., Jensen, C.D., and Grandison, T. (2019). TPL: A Trust Policy Language. Proceedings of the Trust Management XIII, Springer International Publishing.","DOI":"10.1007\/978-3-030-33716-2"},{"key":"ref_193","doi-asserted-by":"crossref","unstructured":"Menezes, A.J., Van Oorschot, P.C., and Vanstone, S.A. (2018). Handbook of Applied Cryptography, CRC Press.","DOI":"10.1201\/9781439821916"},{"key":"ref_194","doi-asserted-by":"crossref","unstructured":"Barker, E. (2016). Guideline for using cryptographic standards in the federal government: Cryptographic mechanisms. NIST Special Publication, NIST.","DOI":"10.6028\/NIST.SP.800-175B"},{"key":"ref_195","unstructured":"Schrijver, A. (1998). Theory of Linear and Integer Programming, John Wiley & Sons."},{"key":"ref_196","first-page":"110","article-title":"Secure multi-party computation","volume":"78","author":"Goldreich","year":"1998","journal-title":"Manuscript. Prelim. Vers."},{"key":"ref_197","unstructured":"W3C Technology and society domain (2022, February 13). Verifiable Claims Working Group Frequently Asked Questions. Available online: https:\/\/w3c.github.io\/webpayments-ig\/VCTF\/charter\/faq.html#self-sovereign."},{"key":"ref_198","unstructured":"Andrieu, J. (2016). A Technology-Free Definition of Self-Sovereign Identity. Proceedings of the Rebooting the Web of Trust III, Web of Trust."},{"key":"ref_199","doi-asserted-by":"crossref","unstructured":"Naik, N., and Jenkins, P. (2020, January 13\u201316). Self-Sovereign Identity Specifications: Govern Your Identity Through Your Digital Wallet using Blockchain Technology. Proceedings of the 2020 8th IEEE International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), Oxford, UK.","DOI":"10.1109\/MobileCloud48802.2020.00021"},{"key":"ref_200","unstructured":"Ellingsen, J. (2019). Self-Sovereign Identity Systems Opportunities and challenges. [Master\u2019s Thesis, Norwegian University of Science and Technology]."},{"key":"ref_201","unstructured":"Van Wingerde, M. (2017). Blockchain-Enabled Self-Sovereign Identity. [Master\u2019s Thesis, Tilburg University]."},{"key":"ref_202","unstructured":"Abraham, A. (2017). Self-Sovereign Identity: Whitepaper about the Concept of Self-Sovereign Identity Including Its Potential, A-SIT. Technical Report."},{"key":"ref_203","unstructured":"Satybaldy, A., Nowostawski, M., and Ellingsen, J. (2020). Self-Sovereign Identity Systems. Privacy and Identity Management. Data for Better Living: AI and Privacy: 14th IFIP WG 9.2, 9.6\/11.7, 11.6\/SIG 9.2.2 International Summer School, Windisch, Switzerland, 19\u201323 August 2019, Revised Selected Papers, Springer International Publishing."},{"key":"ref_204","unstructured":"Diebold, Z., and O\u2019Mahony, D. (2017). Self-Sovereign Identity Using Smart Contracts on the Ethereum Blockchain. [Master\u2019s Thesis, University of Dublin]."},{"key":"ref_205","unstructured":"Speelman, T. (2020). Self-Sovereign Identity: Proving Power over Legal Entities. [Master\u2019s Thesis, Delft University of Technology]."},{"key":"ref_206","unstructured":"\u010cu\u010dko, \u0160., Be\u0107irovi\u0107, \u0160., Kami\u0161ali\u0107, A., Mrdovi\u0107, S., and Turkanovi\u0107, M. (2021). Towards the classification of Self-Sovereign Identity properties. arXiv."},{"key":"ref_207","unstructured":"Sovrin (2022, March 12). The Principles of SSI. Available online: https:\/\/sovrin.org\/principles-of-ssi\/."},{"key":"ref_208","unstructured":"Schutte, M. (2022, February 13). Schutte\u2019s Critique of the Self-Sovereign Identity Principles. Available online: http:\/\/matthewschutte.com\/2016\/10\/25\/schuttes-critique-of-the-self-sovereign-identity-principles\/."},{"key":"ref_209","unstructured":"Evernym (2022, February 13). Evernym. Available online: https:\/\/www.evernym.com\/."},{"key":"ref_210","unstructured":"Tobin, A., and Reed, D. (2016). The Inevitable Rise of Self-Sovereign Identity, The Sovrin Foundation. Technical Report."},{"key":"ref_211","unstructured":"The Sovrin Foundation (2022, February 13). Write To The Sovrin Public Ledger. Available online: https:\/\/sovrin.org\/issue-credentials\/."},{"key":"ref_212","unstructured":"Cameron, K. (2005). The Laws of Identity, Microsoft Corporation. Technical Report."},{"key":"ref_213","doi-asserted-by":"crossref","unstructured":"Savi\u0107, M., Ivanovi\u0107, M., and Jain, L.C. (2019). Co-authorship Networks: An Introduction. Complex Networks in Software, Knowledge, and Social Systems, Springer International Publishing.","DOI":"10.1007\/978-3-319-91196-0"},{"key":"ref_214","unstructured":"Sporny, M., Longley, D., and Chadwick, D. (2022, February 13). Verifiable Credentials Data Model 1.0-Trust Model. Available online: https:\/\/www.w3.org\/TR\/vc-data-model\/#trust-model."},{"key":"ref_215","doi-asserted-by":"crossref","unstructured":"Meier, S., Schmidt, B., Cremers, C., and Basin, D. (2013). The TAMARIN Prover for the Symbolic Analysis of Security Protocols. Proceedings of the International Conference on Computer Aided Verification, Springer.","DOI":"10.1007\/978-3-642-39799-8_48"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/15\/5641\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T23:58:04Z","timestamp":1760140684000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/22\/15\/5641"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,28]]},"references-count":215,"journal-issue":{"issue":"15","published-online":{"date-parts":[[2022,8]]}},"alternative-id":["s22155641"],"URL":"https:\/\/doi.org\/10.3390\/s22155641","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,7,28]]}}}