eID and Self-Sovereign Identity Usage: An Overview
Abstract
:1. Introduction
2. Background
2.1. Federated Identity Management
2.1.1. Security Assertion Markup Language
2.1.2. OAuth 2.0 and OpenID Connect
2.1.3. Level of Assurance
- The entity has been adequately verified during credential enrollment by a registration authority or IDP. This process is also called identity proofing;
- The authenticator being used for the authentication process has not been compromised;
- The claim is true and up-to-date;
- The entity owns and controls the claims or credentials they present.
2.2. Self-Sovereign Identities
2.2.1. The Concept around SSI
- Decentralized identifiers (DID) provide a standard, that enables the identification of entities while specifying flexible retrieval methods for many use cases;
- Verifiable credentials are cryptographically signed collections of user attributes;
- Digital wallets are the software to store one’s own private keys, verifiable credentials, and DID documents;
- Digital agents and hubs provide an interface to the user and persistent endpoints—usually offered by third parties—that serve as a proxy for the mobile digital wallets.
2.2.2. Decentralized Identifiers
- The scheme identifier did followed by;
- The DID method (example);
- The identifier, which is specific to the selected DID method.
2.2.3. Current Protocols
3. Previous and Related Work
3.1. Overview of eID and SSI Solutions
3.2. SSI Challenges
3.3. Solving SSI Challenges
3.4. Need for Lessons Learned
4. Taxonomy of Challenges
- Project management: challenges about the project management itself, including resources (e.g., sufficient and appropriate staff);
- Top management: challenges involving the top management. If the top management does not commit to a project, it is likely to fail. Other challenges are related to decisions of the top management, e.g., the choice of business model;
- Technology factors: challenges focusing on technological factors, which are not group- or sector-specific. Within research projects, the novelty within technology factors is especially important as it inherently contains uncertainty;
- Organizational factors: challenges within the organization, such as culture and learning;
- Complexity and inside view: challenges due to complexity and inside view. Large and complex projects are more likely to fail as it is difficult to obtain an overview. At the same time, technology may further advance;
- Process factors: challenges due to processes, e.g., flexibility or conflicting interests;
- Stakeholder management: challenges centering on stakeholders, i.e., users and other involved organizations. This could lead to misunderstanding the user requirements, failure to gain user commitment, lack of adequate user involvement, and failure to manage user expectations;
- Nonfunctional factors: challenges that are closely related to technical factors, such as security and privacy;
- Project resp. domain-specific factors: challenges that are specific for the project or the domain. We decided to add legislation, regulations, and sovereignty to the project-specific factors since these challenges are rather specific for eIDs and SSI. Nevertheless, they are present to a certain extent in every project. Therefore, it is possible to introduce another category containing them.
5. Traditional eID Federations
5.1. Survey of National eID Solutions and Projects
5.1.1. Scandinavia
5.1.2. Baltic States
5.1.3. D-A-CH Region
5.1.4. Southwest Europe
5.1.5. Arabian Peninsula
5.1.6. Nigeria
5.1.7. Asia
5.1.8. Australia
5.1.9. United States
5.1.10. Latin America
5.2. Lessons Learned from National eIDs
5.2.1. Summary of eIDs
5.2.2. Lessons Learned
6. New Directions with Self-Sovereign Identity
6.1. Survey of SSI Projects
6.1.1. Europe
6.1.2. Sierra Leone
6.1.3. Refugees
6.1.4. South Korea
6.1.5. British Columbia, Canada
6.1.6. United States
6.1.7. Latin America
6.2. Conclusions about SSI Projects
6.2.1. Summary of SSI Projects
6.2.2. Lessons Learned
7. Discussion
7.1. Challenges Based on the Taxonomy
7.1.1. Project and Top Management
7.1.2. Technical Factors
7.1.3. Stakeholder Management
7.1.4. Nonfunctional Factors
7.1.5. Project-Specific Factors
7.2. Further Findings
- Location: regional, national, international;
- Identification: parallel systems, nationally harmonized, internationally harmonized;
- Services: core services, e-government, various services including private services;
- Security: almost none, LoAs and security management, advanced backup of registries;
- Usability: almost none, mobile application, easy to use multipurpose apps;
- Privacy: by law, configurable including tell us once, self-sovereign.
8. Conclusions and Outlook
Author Contributions
Funding
Conflicts of Interest
References
- European Union. Regulation (EU) No 910/2014 of the European Parliament and of the Council of 23 July 2014 on Electronic Identification and Trust Services for Electronic Transactions in the Internal Market and Repealing Directive 1999/93/EC. Regulation. 2014. Available online: http://data.europa.eu/eli/reg/2014/910/oj (accessed on 11 November 2021).
- Engelbertz, N.; Erinola, N.; Herring, D.; Somorovsky, J.; Mladenov, V.; Schwenk, J. Security Analysis of eIDAS—The Cross-Country Authentication Scheme in Europe. In Proceedings of the 12th USENIX Conference on Offensive Technologies, WOOT’18, Baltimore, MD, USA, 13–14 August 2018; USENIX Association: Berkley, CA, USA, 2018. [Google Scholar]
- Berbecaru, D.; Lioy, A.; Cameroni, C. Electronic Identification for Universities: Building Cross-Border Services Based on the eIDAS Infrastructure. Information 2019, 10, 210. [Google Scholar] [CrossRef] [Green Version]
- Namirial Information Technology. SPID on High Speed: State of Play on Digital Identity in Italy. 2021. Available online: https://www.namirial.com/en/namirial-spid-digital-identity-electronic-eid-italy-state-of-play-jan-2021/ (accessed on 11 November 2021).
- PagoPA S.p.A. I Numeri dell’App IO. 2021. Available online: https://io.italia.it/dashboard (accessed on 11 November 2021).
- Ragouzis, N.; Hughes, J.; Philpott, R.; Maler, E. Security Assertion Markup Language (SAML) V2.0 Technical Overview; Specification, OASIS: Woburn, MA, USA, 2008. [Google Scholar]
- GEANT. eduGAIN—Enabling Worldwide Access. 2021. Available online: https://edugain.org (accessed on 11 November 2021).
- Hardt, D. The OAuth 2.0 Authorization Framework. RFC 6749, RFC Editor. 2012. Available online: http://www.rfc-editor.org/rfc/rfc6749.txt (accessed on 11 November 2021).
- Sakimura, N.; Bradley, J.; Jones, M.B.; de Medeiros, B.; Mortimore, C. OpenID Connect Core 1.0; Specification, OpenID Foundation: San Ramon, CA, USA, 2014. [Google Scholar]
- Lim, S.Y.; Fotsing, P.; Almasri, A.; Musa, O.; Mat Kiah, M.L.; Ang, T.; Ismail, R. Blockchain Technology the Identity Management and Authentication Service Disruptor: A Survey. Int. J. Adv. Sci. Eng. Inf. Technol. 2018, 8, 1735–1745. [Google Scholar] [CrossRef]
- Toth, K.; Anderson-Priddy, A. Self-Sovereign Digital Identity: A Paradigm Shift for Identity. IEEE Secur. Priv. 2019, 17, 17–27. [Google Scholar] [CrossRef]
- Mühle, A.; Grüner, A.; Gayvoronskaya, T.; Meinel, C. A Survey on Essential Components of a Self-Sovereign Identity. Comput. Sci. Rev. 2018, 30, 80–86. [Google Scholar] [CrossRef] [Green Version]
- Cao, Y.; Yang, L. A survey of Identity Management technology. In Proceedings of the 2010 IEEE International Conference on Information Theory and Information Security, Beijing, China, 17–19 December 2010; pp. 287–293. [Google Scholar] [CrossRef]
- Tobin, A.; Reed, D. The Inevitable Rise of Self-Sovereign Identity. 2017. Available online: https://sovrin.org/wp-content/uploads/2018/03/The-Inevitable-Rise-of-Self-Sovereign-Identity.pdf (accessed on 11 November 2021).
- Tsap, V.; Lips, S.; Draheim, D. eID Public Acceptance in Estonia: Towards Understanding the Citizen. In Proceedings of the 21st Annual International Conference on Digital Government Research, dg.o ’20, Seoul, Korea, 15–19 June 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 340–341. [Google Scholar] [CrossRef]
- CEF Digital. eIDAS eID Profile. 2019. Available online: https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/eIDAS+eID+Profile/ (accessed on 11 November 2021).
- Parecki, A. OAuth 2.0. 2021. Available online: https://oauth.net/2/ (accessed on 11 November 2021).
- Hardt, D.; Parecki, A.; Lodderstedt, T. The OAuth 2.1 Authorization Framework. Internet-Draft Draft-Ietf-Oauth-v2-1-02, IETF Secretariat. 2021. Available online: https://www.ietf.org/Internet-drafts/draft-ietf-oauth-v2-1-02.txt (accessed on 11 November 2021).
- Richer, J.; Parecki, A.; Imbault, F. Grant Negotiation and Authorization Protocol. Internet-Draft Draft-Ietf-Gnap-Core-Protocol-06, IETF Secretariat. 2021. Available online: https://www.ietf.org/archive/id/draft-ietf-gnap-core-protocol-06.txt (accessed on 11 November 2021).
- ISO/IEC. ISO/IEC 29115:2013—Entity Authentication Assurance Framework; Specification, ISO/IEC: Geneva, Switzerland, 2013. [Google Scholar]
- Richer, J.; Johansson, L. Vectors of Trust. RFC 8485, RFC Editor. 2018. Available online: https://datatracker.ietf.org/doc/html/rfc8485 (accessed on 11 November 2021).
- Grassi, P.A.; Garcia, M.E.; Fenton, J.L. NIST Special Publication 800-63-3—Digital Identity Guidelines; Specification, National Institute of Standards and Technology, U.S. Department of Commerce: Gaithersburg, ML, USA, 2017.
- Drummond, R.; Manu, S.; Dave, L.; Markus, S.; Christopher, A.; Orie, S. Decentralized Identifiers (DIDs) v1.0. Proposed Recommendation. 2021. Available online: https://www.w3.org/TR/did-core/ (accessed on 11 November 2021).
- Tobin, A.; Reed, D.; Windley, P.J. The Inevitable Rise of Self-Sovereign Identity; The Sovrin Foundation: Provo, UT, USA, 2016; pp. 1–23. [Google Scholar]
- Windley, P. The Sovrin SSI Stack. 2020. Available online: https://www.windley.com/archives/2020/03/the_sovrin_ssi_stack.shtml (accessed on 11 November 2021).
- Hyperledger White Paper Working Group. An Introduction to Hyperledger; Linux Foundation: San Fransisco, CA, USA, 2018. [Google Scholar]
- George, N. Announcing Hyperledger Aries, Infrastructure Supporting Interoperable Identity Solutions! 2019. Available online: https://www.hyperledger.org/blog/2019/05/14/announcing-hyperledger-aries-infrastructure-supporting-interoperable-identity-solutions (accessed on 11 November 2021).
- Lesavre, L.; Varin, P.; Mell, P.; Davidson, M.; Shook, J. A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems; Whitepaper NIST: Gaithersburg, ML, USA, 2020. [Google Scholar] [CrossRef]
- Kubach, M.; Sellung, R. On the Market for Self-Sovereign Identity: Structure and Stakeholders. In Open Identity Summit 2021; Roßnagel, H., Schunck, C.H., Mödersheim, S., Eds.; Gesellschaft für Informatik e.V.: Bonn, Germany, 2021; pp. 143–154. [Google Scholar]
- Carretero, J.; Izquierdo-Moreno, G.; Vasile-Cabezas, M.; Garcia-Blas, J. Federated Identity Architecture of the European eID System. IEEE Access 2018, 6, 75302–75326. [Google Scholar] [CrossRef]
- Kuperberg, M.; Kemper, S.; Durak, C. Blockchain Usage for Government-Issued Electronic IDs: A Survey. In Advanced Information Systems Engineering Workshops; Proper, H.A., Stirna, J., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 155–167. [Google Scholar]
- Federal Ministry for Economic Affairs and Energy. Showcase Programme “Secure Digital Identities”. 2021. Available online: https://www.digitale-technologien.de/DT/Navigation/EN/Foerderprogramme/Sichere_Digitale_Identitaeten/sichere_digitale_ident.html (accessed on 11 November 2021).
- Gilb, C. Zukunft der Zuger Digitalen ID Ist Ungewiss. 2019. Available online: https://www.luzernerzeitung.ch/zentralschweiz/zug/zukunft-der-digitalen-id-ist-ungewiss-ld.1163192 (accessed on 11 November 2021).
- Danish, M.S.S.; Yona, A.; Senjyu, T. Insights Overview of Afghanistan Electronic National Identification Documents: eGovernment, eID Card, and ePassport Schemes. In Proceedings of the 2014 IEEE International Conference on Internet of Things (iThings), and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom), Taipei, Taiwan, 1–3 September 2014; pp. 251–255. [Google Scholar] [CrossRef]
- Berbecaru, D.; Lioy, A. On the design, implementation and integration of an Attribute Provider in the Pan-European eID infrastructure. In Proceedings of the 2016 IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, 27–30 June 2016; pp. 1263–1269. [Google Scholar] [CrossRef]
- Quiroz, E.P.; Cuno, A.; Sarmiento, E.; Cruzado, E. Requirements for a new Peruvian electronic identity card. In Proceedings of the 2020 IEEE XXVII International Conference on Electronics, Electrical Engineering and Computing (INTERCON), Lima, Peru, 3–5 September 2020; pp. 1–4. [Google Scholar] [CrossRef]
- Lenz, T.; Alber, L. Towards Cross-Domain eID by Using Agile Mobile Authentication. In Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, 1–4 August 2017; pp. 570–577. [Google Scholar] [CrossRef]
- Zefferer, T.; Ziegler, D.; Reiter, A. Best of two worlds: Secure cloud federations meet eIDAS. In Proceedings of the 2017 12th International Conference for Internet Technology and Secured Transactions (ICITST), Cambridge, UK, 11–14 December 2017; pp. 396–401. [Google Scholar] [CrossRef] [Green Version]
- Burgstaller, L.; Gaggl, B.; Koch, K.M.; Leitold, H.; Teufl, P.; Zefferer, T.; Hühnlein, D.; Hammer, S.; Corici, A.A.; Lampoltshammer, T.; et al. D1.1.—Survey of Related Work. Deliverable, mGov4EU. 2021. Available online: https://www.mgov4.eu/fileadmin/mgov-files/pub/mGov4EU-D1.1-PU-M03-website.pdf (accessed on 11 November 2021).
- Dib, O.; Toumi, K. Decentralized Identity Systems: Architecture, Challenges, Solutions and Future Directions. In Annals of Emerging Technologies in Computing (AETiC); International Association of Educators and Researchers (IAER): Wrexham, UK, 2020; Volume 4, pp. 19–40. [Google Scholar] [CrossRef]
- Kubach, M.; Schunck, C.H.; Sellung, R.; Roßnagel, H. Self-sovereign and Decentralized identity as the future of identity management? In Open Identity Summit 2020; Roßnagel, H., Schunck, C.H., Mödersheim, S., Hühnlein, D., Eds.; Gesellschaft für Informatik e.V.: Bonn, Germany, 2020; pp. 35–47. [Google Scholar] [CrossRef]
- Vila, X. SSI eIDAS Bridge Project: ESSIF-Lab/Infrastructure/VALIDATED-ID/SEB Project Summary. 2021. Available online: https://gitlab.grnet.gr/essif-lab/infrastructure/validated-id/seb_project_summary (accessed on 11 November 2021).
- eSSIF-LAB. NGI eSSIF-LAB—European Self-Sovereign Identity Framework Lab. 2021. Available online: https://essif-lab.eu (accessed on 11 November 2021).
- Kubach, M.; Roßnagel, H. A lightweight trust management infrastructure for self-sovereign identity. In Open Identity Summit 2021; Roßnagel, H., Schunck, C.H., Mödersheim, S., Eds.; Gesellschaft für Informatik e.V.: Bonn, Germany, 2021; pp. 155–166. [Google Scholar]
- LIGHTest. 2019. Available online: https://www.lightest.eu/ (accessed on 11 November 2021).
- Alber, L.; More, S.; Mödersheim, S.; Schlichtkrull, A. Adapting the TPL Trust Policy Language for a Self-Sovereign Identity World. In Open Identity Summit 2021; Roßnagel, H., Schunck, C.H., Mödersheim, S., Eds.; Gesellschaft für Informatik e.V.: Bonn, Germany, 2021; pp. 107–118. [Google Scholar]
- Martinez Jurado, V.; Vila, X.; Kubach, M.; Henderson Johnson Jeyakumar, I.; Solana, A.; Marangoni, M. Applying assurance levels when issuing and verifying credentials using Trust Frameworks. In Open Identity Summit 2021; Roßnagel, H., Schunck, C.H., Mödersheim, S., Eds.; Gesellschaft für Informatik e.V.: Bonn, Germany, 2021; pp. 167–178. [Google Scholar]
- Brunner, C.; Gallersdörfer, U.; Knirsch, F.; Engel, D.; Matthes, F. DID and VC:Untangling Decentralized Identifiers and Verifiable Credentials for the Web of Trust. In Proceedings of the 2020 3rd International Conference on Blockchain Technology and Applications, Xi’an, China, 14–16 September 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 61–66. [Google Scholar]
- Aragó-Monzonís, F.J.; Domínguez-García, L.; Basurte-Durán, A.; Ocana, R.; Giralt, V. SEAL Project: User-centric Application of Linked Digital Identity for Students and Citizens. In Proceedings of the ICDS 2020, Fourteenth International Conference on Digital Society, Valencia, Spain, 21–25 November 2020; pp. 108–111. [Google Scholar]
- Abraham, A.; Hörandner, F.; Omolola, O.; Ramacher, S. Privacy-Preserving eID Derivation for Self-Sovereign Identity Systems. In Information and Communications Security; Zhou, J., Luo, X., Shen, Q., Xu, Z., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 307–323. [Google Scholar]
- Stokkink, Q.; Epema, D.H.J.; Pouwelse, J. A Truly Self-Sovereign Identity System. In Proceedings of the 2021 IEEE 46th Conference on Local Computer Networks (LCN), Edmonton, AB, Canada, 4–7 October 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Al-Ahmad, W.; Al-Fagih, K.; Khanfar, K.; Alsamara, K.; Abuleil, S.; Abu-Salem, H. A Taxonomy of an IT Project Failure: Root Causes. Int. Manag. Rev. 2009, 5, 93–104. [Google Scholar]
- Whitney, K.M.; Daniels, C.B. The Root Cause of Failure in Complex IT Projects: Complexity Itself. Procedia Comput. Sci. 2013, 20, 325–330. [Google Scholar] [CrossRef] [Green Version]
- Chapman, P.; Quang, C. Major Project Risk Management: Reconciling Complexity during Delivery with the Inside View in Planning; Center for Open Science: Oxford, UK, 2021. [Google Scholar] [CrossRef]
- Herz, M.; Krezdorn, N. Epic fail: Exploring project failure’s reasons, outcomes and indicators. Rev. Manag. Sci. 2021, 1–25. [Google Scholar] [CrossRef]
- European Commission. Digital Government Factsheet 2019—Norway. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_Norway_2019.pdf (accessed on 11 November 2021).
- Signicat. Norwegian BankID. 2021. Available online: https://developer.signicat.com/enterprise/identity-methods/norwegian-bankid.html (accessed on 11 November 2021).
- Digdir Docs. Docs. 2021. Available online: https://docs.digidr.no/index.html (accessed on 11 November 2021).
- Vipps, A.S. Services—BankID. 2021. Available online: https://www.bankid/en/about-us/services/ (accessed on 11 November 2021).
- European Commission. Digital Government Factsheet 2019—Sweden. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_Sweden_2019.pdf (accessed on 11 November 2021).
- European Commission. Digital Government Factsheet 2019—Finland. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_Finland_2019.pdf (accessed on 11 November 2021).
- Digital Iceland. IceKey. 2021. Available online: https://island.is/en/icekey (accessed on 11 November 2021).
- Nazario, J. Political DDoS: Estonia and Beyond; USENIX Association: San Jose, CA, USA, 2008. [Google Scholar]
- e-Estonia. Security and Safety. 2019. Available online: https://e-estonia.com/solutions/security-and-safety/ksi-blockchain/ (accessed on 11 November 2021).
- European Commission. Digital Government Factsheet 2019—Estonia. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_Estonia_2019.pdf (accessed on 11 November 2021).
- Eichholtzer, M.; Kirova, M. Overview of Pre-Notified and Notified eID Schemes under eIDAS. 2021. Available online: http://ec.europa.eu/cefdigital/wiki/display/EIDCOMMUNITY/Overview+of+pre-notified+and+notified+eID+schemes+under+eIDAS (accessed on 11 November 2021).
- European Commission. Digital Government Factsheet 2019—Latvia. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_Latvia_2019.pdf (accessed on 11 November 2021).
- European Commission. Digital Government Factsheet 2019—Lithuania. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_Lithuania_2019.pdf (accessed on 11 November 2021).
- eGA. e-Governance Academy. 2021. Available online: https://ega.ee (accessed on 11 November 2021).
- Egovernment—Schweiz Suisse Svizzera. Implementing eID. 2021. Available online: https://www.egovernment.ch/en/umsetzung/schwerpunktplan/elektronische-identitat/ (accessed on 11 November 2021).
- Digitales Österreich. Mobile Phone Signature & Citizen Card—The Electronic ID. 2021. Available online: https://www.buergerkarte.at/en/ (accessed on 11 November 2021).
- Federal Office for Information Security. German eID. 2021. Available online: https://www.bsi.bund.de/EN/Topics/ElectrIDDocuments/German-eID/german-eID_node.html (accessed on 11 November 2021).
- BDR. OPTIMOS—A Practical Ecosystem of Secure Identities for Mobile Services. 2021. Available online: https://www.bundesdruckerei.de/en/innovations/optimos (accessed on 11 November 2021).
- Bundesministerium des Innern, für Bau und Heimat. Das Projekt Digitale Identitäten. 2021. Available online: https://www.personalausweisportal.de/Webs/PA/DE/verwaltung/projekt_digitale_identitaeten/projekt_digitale_identitaeten_node.html (accessed on 11 November 2021).
- Governikus, K.G. AusweisApp2. 2021. Available online: https://www.ausweisapp.bund.de/en/ausweisapp2-home/ (accessed on 11 November 2021).
- CSAM. eID Software. 2021. Available online: https://eid.belgium.be/en (accessed on 11 November 2021).
- Belgian Mobile ID SA/NV. Discover Itsme. 2021. Available online: https://www.itsme.be/en/ (accessed on 11 November 2021).
- Het Facilitair Bedrijf for the Flemish Government. About Identity and Access Management Platform of the Flemish Government. 2021. Available online: https://joinup.ec.europa.eu/collection/eidentity-and-esignature/solution/identity-and-access-management-platform-flemish-government/about (accessed on 11 November 2021).
- European Commission. Digital Government Factsheet 2019—France. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_France_2019.pdf (accessed on 11 November 2021).
- République Française. FranceConnect. 2021. Available online: https://github.com/france-connect (accessed on 11 November 2021).
- European Commission. Digital Government Factsheet 2019—Italy. Report. European Commission. 2019. Available online: https://joinup.ec.europa.eu/sites/default/files/inline-files/Digital_Government_Factsheets_Italy_2019.pdf (accessed on 11 November 2021).
- Dipartimento per la Transformazione Digitale + AgID. CIE Eletronic Identity Card. 2021. Available online: https://developers.italia.it/en/cie (accessed on 11 November 2021).
- Agenzia per l’italia Digitale. SPID Public Digital Identity System. 2021. Available online: https://www.spid.gov.it/en (accessed on 11 November 2021).
- AMA Portugal. The Portuguese Digital Identity Ecosystem. 2021. Available online: https://joinup.ec.europa.eu/collection/portuguese-egovernment-solutions/news/portugals-pioneering-eid-solutions (accessed on 11 November 2021).
- Smart Dubai. Smart Dubai. 2021. Available online: https://www.smartdubai.ae (accessed on 11 November 2021).
- Afifi, M.A.M. Insights on National Identity Cards Potential Applications and Digitizing Its Uses Based on the EID Card. In Proceedings of the 2019 International Conference on Digitization (ICD), Sharjah, United Arab Emirates, 18–19 November 2019; pp. 160–166. [Google Scholar] [CrossRef]
- Identity Review. UAE Invests Early in Digital Identity and Blockchain, Pays off during COVID-19 Pandemic. 2020. Available online: https://identityreview.com/uae-invests-early-in-digital-identity-and-blockchain/ (accessed on 11 November 2021).
- Marri, A.A.; Albloosh, F.; Moussa, S.; Elmessiry, H. Study on The Impact of Artificial Intelligence on Government E-service in Dubai. In Proceedings of the 2019 International Conference on Digitization (ICD), Sharjah, United Arab Emirates, 18–19 November 2019; pp. 153–159. [Google Scholar] [CrossRef]
- Ministry of Transport, Communication and Information Technology. National Digital Certification Center. 2021. Available online: https://oman.om/tam/ (accessed on 11 November 2021).
- National Identity Management Commission. MWS NIMC Mobile Identity. 2021. Available online: https://nimcmobile.app (accessed on 11 November 2021).
- National Identity Management Commission. Fraud Alert. 2021. Available online: https://nimc.gov.ng/fraud-alert/ (accessed on 11 November 2021).
- Okunoye, B. Nigeria: There Can Be No Digital Identity (ID) without Digital Security. 2021. Available online: https://www.africaportal.org/features/nigeria-there-can-be-no-digital-identity-id-without-digital-security/ (accessed on 11 November 2021).
- Government of Singapore. SingPass. 2021. Available online: https://www.singpass.gov.sg/main (accessed on 11 November 2021).
- Gibson, R.; Ward, S.J.; Chen, P.; Lusoli, W. Australian Government and Online Communication. In Government Communication in Australia; Young, S., Ed.; Cambridge University Press: Cambridge, UK, 2007; pp. 161–180. [Google Scholar]
- Hanson, G.; Ott, A.; Krenjova, J. Introducing Integrated E-Government in Australia. 2018. Available online: https://www.acs.org.au/content/dam/acs/acs-publications/E-Gov%20Report.pdf (accessed on 11 November 2021).
- Greenleaf, G. The Australia Card: Towards a National Surveillance System. Law Soc. J. 1987, 25, 1–14. [Google Scholar]
- Australian Government. Trusted Digital Identity Framework. 2019. Available online: https://www.digitalidentity.gov.au/privacy-and-security/trusted-digital-identity-framework (accessed on 11 November 2021).
- Australian Postal Cooperation. Digital iD—ID on Your Phone. 2019. Available online: https://www.digitalid.com (accessed on 11 November 2021).
- Coalition, T.B.I. Five Key Initiatives. 2018. Available online: https://www.betteridentity.org/five-key-initiatives (accessed on 11 November 2021).
- Social Security. Social Security: Fraud Prevention and Reporting. 2021. Available online: https://www.ssa.gov/fraud (accessed on 11 November 2021).
- Otto, G. NCIST Gives $15M in Grants for Identity Management Pilots. 2016. Available online: https://statescoop.com/nstic-gives-15m-in-grants-for-identity-management-pilots/ (accessed on 11 November 2021).
- ADOT. Mobile ID. 2021. Available online: https://azdot.gov/motor-vehicles/driver-services/mobile-id (accessed on 11 November 2021).
- Greenwood, D. Wyoming Digital Identity Legislation Update. 2020. Available online: https://civics.com/2020/09/29/wyoming-digital-identity-legislation-update/ (accessed on 11 November 2021).
- Pivcevic, K. Challenges in Latin American Biometric National ID Initiatives Outlined by Women in Identity. 2020. Available online: https://www.biometricupdate.com/202011/challenges-in-latin-american-biometric-national-id-initiatives-outlined-by-women-in-identity (accessed on 11 November 2021).
- de Kalaf, E.H. How Some Countries Are Using Digital ID to Exclude Vulnerable People around the World. 2021. Available online: https://theconversation.com/how-some-countries-are-using-digital-id-to-exclude-vulnerable-people-around-the-world-164879 (accessed on 11 November 2021).
- andina. DNI Electrónico gana Premio al Mejor Documento de Identificación de América Latina. 2015. Available online: https://andina.pe/agencia/noticia-dni-electronico-gana-premio-al-mejor-documento-identificacion-america-latina-562655.aspx (accessed on 11 November 2021).
- Mason, O. Brazil ‘Champion’ in Card Fraud, with 45.4% of Global Cases—Report. 2021. Available online: https://riotimesonline.com/brazil-news/brazil/brazil-champion-in-card-fraud-with-45-4-of-global-cases/ (accessed on 11 November 2021).
- Belli, L. The Largest Personal Data Leakage in Brazilian History. 2021. Available online: https://www.opendemocracy.net/en/largest-personal-data-leakage-brazilian-history/ (accessed on 11 November 2021).
- The Lancet. The unfolding migrant crisis in Latin America. Lancet 2019, 394, 1966. [Google Scholar] [CrossRef]
- Khoury, N. Digital Identity: Enabling Dignified Access to Humanitarian Services in Migration; Report; International Federation of Red Cross and Red Crescent Societies: Geneva, Switzerland, 2021. [Google Scholar]
- McGibbon, A. Review of the Events Surrounding the 2016 eCensus; Technical Report; Australian Government—Office of the Cyber Security Special Adviser: Canberra, Australia, 2016. [Google Scholar]
- Information Commissioner’s Office. ICO Fines Marriott International Inc £18.4million for Failing to Keep Customers’ Personal Data Secure. 2020. Available online: https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2020/10/ico-fines-marriott-international-inc-184million-for-failing-to-keep-customers-personal-data-secure/ (accessed on 11 November 2021).
- ForgeRock. 2021 ForgeRock Consumer Identity Breach Report—Pandemic Exacerbates Vulnerabilities Created by Years of Cybersecurity Complacency; Breach Report; ForgeRock: San Francisco, CA, USA, 2021. [Google Scholar]
- Sportiello, L. “Internet of Smart Cards”: A pocket attacks scenario. Int. J. Crit. Infrastruct. Prot. 2019, 26, 100302. [Google Scholar] [CrossRef]
- Rashid, N. Deploying the Once-Only Policy: A Privacy-Enhancing Guide for Policymakers and Civil Society Actors; Report; Harvard Kennedy School—Ash Center for Democratic Governance and Innovation: Cambridge, MA, USA, 2020. [Google Scholar]
- Krimmer, R.; Prentza, A.; Mamrot, S.; Schmidt, C. The Once-Only Principle: A Matter of Trust. In The Once-Only Principle: The TOOP Project; Krimmer, R., Prentza, A., Mamrot, S., Eds.; Springer International Publishing: Cham, Switzerland, 2021; pp. 1–8. [Google Scholar] [CrossRef]
- Schmidt, C.; Krimmer, R.; Lampoltshammer, T. “When Need Becomes Necessity”—The Single Digital Gateway Regulation and the Once-Only Principle from a European Point of View; Zenodo: Bonn, Germany, 2021. [Google Scholar] [CrossRef]
- Pöhn, D.; Hommel, W. Automated User Information Conversion to improve Identity Federation Scalability. In Proceedings of the 22th Congress of the European University Information Systems Organisation (EUNIS 2016), Thessaloniki, Greece, 2016; Available online: https://docplayer.net/23435729-Automated-user-information-conversion-to-improve-identity-federation-scalability.html (accessed on 16 November 2021).
- European Commission. Digital Identity and Trust: Commission Launches Public Consultation on the eIDAS Regulation. 2020. Available online: https://digital-strategy.ec.europa.eu/en/news/digital-identity-and-trust-commission-launches-public-consultation-eidas-regulation (accessed on 11 November 2021).
- KRAKEN. The Project Kraken. 2021. Available online: https://www.krakenh2020.eu/the_project/overview (accessed on 11 November 2021).
- mGov4EU. mGov4EU Project. 2021. Available online: https://www.mgov4.eu (accessed on 11 November 2021).
- CONCORDIA. CONCORDIA. 2021. Available online: https://www.concordia-h2020.eu (accessed on 11 November 2021).
- CEF Digital. EBSI—Experience the Future with the European Blockchain Services Infrastructure (EBSI). 2021. Available online: https://ec.europa.eu/cefdigital/wiki/display/CEFDIGITAL/EBSI (accessed on 11 November 2021).
- IDunion. IDunion—Enables Self-Determined Identities. 2021. Available online: https://idunion.org/?lang=en (accessed on 11 November 2021).
- ONCE. ONCE Project. 2021. Available online: https://www.once-project.de (accessed on 11 November 2021).
- BDR. From the Almighty Administrator to the Self-Determined User; Whitepaper: Berlin, Germany, 2018. [Google Scholar]
- Lissi. Lissi—Identity Wallet and Identity Management Solution. 2021. Available online: https://lissi.id/start (accessed on 11 November 2021).
- Otte, P.; de Vos, M.; Pouwelse, J. TrustChain: A Sybil-resistant scalable blockchain. Future Gener. Comput. Syst. 2020, 107, 770–780. [Google Scholar] [CrossRef]
- Pouwelse, J. Towards the Science of Essential Decentralised Infrastructures. In Proceedings of the 1st International Workshop on Distributed Infrastructure for Common Good, DICG’20, Online, 7–11 December 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1–6. [Google Scholar] [CrossRef]
- Stokkink, Q.; Pouwelse, J. Deployment of a Blockchain-Based Self-Sovereign Identity. In Proceedings of the 2018 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData), Halifax, NS, Canada, 30 July–3 August 2018; pp. 1336–1342. [Google Scholar] [CrossRef] [Green Version]
- Flemish Government. Blockchain on the Move (BotM). 2021. Available online: https://www.innovatieveoverheidsopdrachten.be/en/projects/blockchain-move-botm (accessed on 11 November 2021).
- DIZME. Dizme. 2021. Available online: https://www.dizme.io (accessed on 11 November 2021).
- Trust over IP Foundation. Introducing the Trust over IP Foundation; Whitepaper: San Francisco, CA, USA, 2020. [Google Scholar]
- Kiva. Kiva Protocol—Building the Credit Bureau of the Future. 2018. Available online: https://www.kiva.org/protocol (accessed on 11 November 2021).
- Wang, F.; De Filippi, P. Self-Sovereign Identity in a Globalized World: Credentials-Based Identity Systems as a Driver for Economic Inclusion. Front. Blockchain 2020, 2, 1–22. [Google Scholar] [CrossRef] [Green Version]
- Cheesman, M.; Slavin, A. Self-sovereign identity and forced migration: Slippery terms and the refugee data apparatus. In Digital Identity, Virtual Borders and Social Media; Edward Elgar Publishing: Cheltenham, UK, 2021; pp. 10–32. [Google Scholar]
- Rohingya Project. Rohingya Project—Financial and Social Inclusion Platform for Stateless—Digitally Empowering Stateless. 2021. Available online: https://rohingyaproject.com (accessed on 11 November 2021).
- Gadnis, A. Opinion: Blockchain Offers Poorest a Real Economic Identity—And a Shot at the SDGs. 2016. Available online: https://www.devex.com/news/opinion-blockchain-offers-poorest-a-real-economic-identity-and-a-shot-at-the-sdgs-89071 (accessed on 11 November 2021).
- Cheesman, M. Self-Sovereignty for Refugees? The Contested Horizons of Digital Identity. Geopolitics 2020, 1–26. [Google Scholar] [CrossRef]
- Coinplug. Busan Blockchain Regulation-Free Zone Project. 2021. Available online: https://coinplug.com/EN/busan (accessed on 11 November 2021).
- British Columbia. British Columbia’s Verifiable Organizations. 2021. Available online: https://orgbook.gov.bc.ca/en/home (accessed on 11 November 2021).
- BCDevExchange. BCDDevExchange. 2021. Available online: https://bcdevexchange.org (accessed on 11 November 2021).
- Hyperledger Foundation. Case Study: BC Aims to Cut Government Red Tape with Hyperledger Indy; Hyperledger Foundation: San Francisco, CA, USA, 2019. [Google Scholar]
- British Columbia. Province of British Columbia. 2021. Available online: https://github.com/bcgov (accessed on 11 November 2021).
- National Alliance to End Homelessness. State of Homelessness: 2021 Edition. 2021. Available online: https://endhomelessness.org/homelessness-in-america/homelessness-statistics/state-of-homelessness-2021/ (accessed on 11 November 2021).
- Iyengar, R.; Albert, J. California Blockchain Working Group—Digital Identity; Report; State of California: Sacramento, CA, USA, 2020. [Google Scholar]
- Mercer, T.; Khurshid, A. Advancing Health Equity for People Experiencing Homelessness Using Blockchain Technology for Identity Management: A Research Agenda. J. Health Care Poor Underserved 2021, 32, 262–277. [Google Scholar] [CrossRef]
- Khurshid, A.; Rajeswaren, V.; Andrews, S. Using Blockchain Technology to Mitigate Challenges in Service Access for the Homeless and Data Exchange Between Providers: Qualitative Study. J. Med. Internet Res. 2020, 22, e16887. [Google Scholar] [CrossRef] [PubMed]
- Blockchain for Change. FUMMI—Blockchain Smart ID and Alternative Financial Services. 2021. Available online: https://blockchainforchange.org/fummi (accessed on 11 November 2021).
- City of Austin. Github—MyPass Project. 2021. Available online: https://github.com/cityofaustin/mypass-project (accessed on 11 November 2021).
- DOIT—Illinois Department of Innovation & Technology. Blockchain in Illinois. 2021. Available online: www2.illinois.gov/sites/doit/pages/BlockChainInitiative.aspx (accessed on 11 November 2021).
- LACChain. LACChain. 2021. Available online: https://www.lacchain.net/home?lang=en (accessed on 11 November 2021).
- Preukschat, A.; Carmona, L.; Paramo, D. The Ecosystem of Decentralised Digital Identity in the Spanish and Portuguese Speaking World; Report; Blockchain Espana and SSIMeetup. 2020. Available online: https://www.ssimeetup.org//latam-spain-identity/ (accessed on 11 November 2021).
- Maram, D.; Malvai, H.; Zhang, F.; Jean-Louis, N.; Frolov, A.; Kell, T.; Lobban, T.; Moy, C.; Juels, A.; Miller, A. CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability. In Proceedings of the 2021 IEEE Symposium on Security and Privacy (SP), Online, 24–27 May 2021; IEEE Computer Society: Los Alamitos, CA, USA, 2021; pp. 1348–1366. [Google Scholar] [CrossRef]
- Zhang, F.; Maram, D.; Malvai, H.; Goldfeder, S.; Juels, A. DECO: Liberating Web Data Using Decentralized Oracles for TLS. In Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, CCS ’20, Online, 9–13 November 2020; Association for Computing Machinery: New York, NY, USA, 2020; pp. 1919–1938. [Google Scholar] [CrossRef]
- Ometov, A.; Bezzateev, S.; Mäkitalo, N.; Andreev, S.; Mikkonen, T.; Koucheryavy, Y. Multi-Factor Authentication: A Survey. Cryptography 2018, 2, 1. [Google Scholar] [CrossRef] [Green Version]
- European Commission. eGovernment and Digital Public Services. 2021. Available online: https://digital-strategy.ec.europa.eu/en/policies/egovernment (accessed on 11 November 2021).
- Brooks, C. Alarming Cybersecurity Stats: What You Need to Know for 2021. 2021. Available online: https://www.forbes.com/sites/chuckbrooks/2021/03/02/alarming-cybersecurity-stats-------what-you-need-to-know-for-2021/ (accessed on 11 November 2021).
- Nemec, M.; Sys, M.; Svenda, P.; Klinec, D.; Matyas, V. The Return of Coppersmith’s Attack: Practical Factorization of Widely Used RSA Moduli. In Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS ’17, Dallas, TX, USA, 30 October–3 November 2017; Association for Computing Machinery: New York, NY, USA, 2017; pp. 1631–1648. [Google Scholar] [CrossRef] [Green Version]
- Lips, S.; Pappel, I.; Tsap, V.; Draheim, D. Key Factors in Coping with Large-Scale Security Vulnerabilities in the eID Field. In Electronic Government and the Information Systems Perspective; Kő, A., Francesconi, E., Eds.; Springer International Publishing: Cham, Switzerland, 2018; pp. 60–70. [Google Scholar]
- Oruaas, M.; Willemson, J. Developing Requirements for the New Encryption Mechanisms in the Estonian eID Infrastructure. In Databases and Information Systems; Robal, T., Haav, H.M., Penjam, J., Matulevičius, R., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 13–20. [Google Scholar]
- Grüner, A.; Mühle, A.; Gayvoronskaya, T.; Meinel, C. A Comparative Analysis of Trust Requirements in Decentralized Identity Management. In Advanced Information Networking and Applications; Barolli, L., Takizawa, M., Xhafa, F., Enokido, T., Eds.; Springer International Publishing: Cham, Switzerland, 2020; pp. 200–213. [Google Scholar]
- Chartrand, J.; Freeman, S.; Gallersdörfer, U.; Lisle, M.; Mühle, A.; van Engelenburg, S. Building the Digital Credential Infrastructure for the Future; Whitepaper. 2020. Available online: https://digitalcredentials.mit.edu/wp-content/uploads/2020/02/white-paper-building-digital-credential-infrastructure-future.pdf (accessed on 11 November 2021).
- Kubicek, H.; Noack, T. Different countries-different paths extended comparison of the introduction of eIDs in eight European countries. Identity Inf. Soc. 2010, 3, 235–245. [Google Scholar] [CrossRef] [Green Version]
- Brugger, J.; Fraefel, M.; Riedl, R. Raising Acceptance of Cross-Border eID Federation by Value Alignment. Electron. J. Gov. 2014, 12, 179–199. [Google Scholar]
- Axelsson, K.; Melin, U. Citizens’ Attitudes towards Electronic Identification in a Public E-Service Context—An Essential Perspective in the eID Development Process; Electronic Government; Scholl, H.J., Janssen, M., Wimmer, M.A., Moe, C.E., Flak, L.S., Eds.; Springer: Berlin/Heidelberg, Germany, 2012; pp. 260–272. [Google Scholar]
- Tsap, V.; Pappel, I.; Draheim, D. Factors Affecting e-ID Public Acceptance: A Literature Review. In Proceedings of the International Conference on Electronic Government and the Information Systems Perspective, Bratislava, Slovakia, 14–17 September 2019; Kő, A., Francesconi, E., Anderst-Kotsis, G., Tjoa, A.M., Khalil, I., Eds.; Springer International Publishing: Cham, Switzerland, 2019; pp. 176–188. [Google Scholar]
- Wallis, C.; McKenzie, R.; Crompton, M. Use Cases for Identity Management in E-Government. IEEE Secur. Priv. 2008, 6, 51–57. [Google Scholar] [CrossRef]
- van Dijck, J.; Jacobs, B. Electronic identity services as sociotechnical and political-economic constructs. New Media Soc. 2020, 22, 896–914. [Google Scholar] [CrossRef] [Green Version]
Region | Features | Lessons Learned |
---|---|---|
Scandinavia | Dominant: bank and mobile ID Protocols: SAML and OIDC, LoA: medium to high | Solution according to business needs; usability and functionality attracts users |
Baltic States | Dominant: mobile ID Protocols: SAML and OIDC Technology: connector, blockchain for registries LoA: different | Starting from scratch can be fast; security is essential and might lead to blockchains; different LoA levels depending on the smartphone hardware ease the usage |
D-A-CH Region | Dominant: (formally) smart card Protocol: SAML Technology: eID ecosystem, LoA: high standards | Revision with a shift from smart card to mobile; usage of smart cards is low; opening up to the private sector helps speed up; take user needs into account |
Southwest Europe | Dominant: mobile ID with apps for different OSs Protocols: SAML and OIDC Feature: one portal | Portal as single point of entry; OIDC easier for apps; different LoAs dependent on the authentication method; features of the solution equal benefits for users; APIs for interoperability; documentation for developers |
Arabian Peninsula | Dominant: unified app for iOS and Android Technology: maybe blockchain usage | Increasing number of services helps to reduce contacts; funded system for more services; open source and information would help others |
Nigeria | Dominant: mobile ID | Funded models for one type; different forms of identification |
Asia | Dominant: mobile ID apps for different OS Protocols: SAML and OIDC Authentication: different methods | Different authentication methods help users; single portal as entry point; public and private services provide a benefit for the user; free of charge helps uptake |
Australia | Protocols: SAML and OIDC Technology: several IDPs | Secure data exchange among government IT systems is important; establish processes; exchange between stakeholders; IT is always progressing; resources and strategies are required to keep up |
United States | Protocols: no federal system Legislation: no law for this Technology: partly private companies instead; different alternative identifiers | Legacy systems can lead to more identity theft and other incidents; education of users is important; funding for modernization; privacy is essential; adaption of laws |
Latin America | Biometrics: mostly Otherwise: diverse | Learn from the best; birth registration system as a basis; harmonization and interoperability among countries; excluding groups of citizens possible |
Country | Status | Lessons Learned |
---|---|---|
Europe | Diverse (from starting to stopped) | Participants: public and private bodies Legislation: eIDAS Version 2; national law has to follow Projects: with potential to gain attention, Technology: diverse Community: competition, but common efforts needed as well, Challenge: how to integrate SSI in infrastructure, Lessons learned: resources needed. |
Sierra Leone | Productive | Participants: Kiva and public bodies Technology: Kiva protocol on Hyperledger Indy, Goal: empowering citizens, Challenge: partly no Internet access. |
Refugees | Up to productive | Technology: Ethereum, partly unknown Goal: empowering refugees with no documents Lessons learned: SSI comes with potentials and risks. |
South Korea | Progressing to productive | Participants: public and private bodies Technology: e.g., Metadium Enterprise Platform Legislation: takes time Lessons learned: alliances enable exchange, documentation in English |
British Columbia | Progressing | Participants: public and private bodies Technology: Sovrin Lessons learned: (1) analyze problem; (2) peer-groups to boost development; (3) choose most suitable open-source framework; (4) contribute code to open-source community. |
United States | Diverse (from started to stopped) | Participants: public and private bodies Legislation: in parallel with technology Goal: resources to empower homeless people, Lessons learned: open source does not automatically mean success. |
Latin America | Diverse | Participants: public and private bodies Technology: diverse including uPort Goal: improve administration Lessons learned: alliances bundle efforts; incentives do not necessarily lead to successful projects. |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Pöhn, D.; Grabatin, M.; Hommel, W. eID and Self-Sovereign Identity Usage: An Overview. Electronics 2021, 10, 2811. https://doi.org/10.3390/electronics10222811
Pöhn D, Grabatin M, Hommel W. eID and Self-Sovereign Identity Usage: An Overview. Electronics. 2021; 10(22):2811. https://doi.org/10.3390/electronics10222811
Chicago/Turabian StylePöhn, Daniela, Michael Grabatin, and Wolfgang Hommel. 2021. "eID and Self-Sovereign Identity Usage: An Overview" Electronics 10, no. 22: 2811. https://doi.org/10.3390/electronics10222811
APA StylePöhn, D., Grabatin, M., & Hommel, W. (2021). eID and Self-Sovereign Identity Usage: An Overview. Electronics, 10(22), 2811. https://doi.org/10.3390/electronics10222811