SlideShare ist ein Scribd-Unternehmen logo
1 von 16
Downloaden Sie, um offline zu lesen
A system for distributed minting and
management of persistent identifiers
Ł. Bolikowski, A. Nowiński, W. Sylwestrzak
ICM, University of Warsaw
IDCC 2015, London, 9-10 February 2015
Motivation and vision
The problem
Truly long-term persistence of identifiers should account
for risks to managing organizations’ longevity.
Internal risks: solvency, good will.
External risks: political, economic, military.
The approach
Decentralize!
First steps already taken: w3id is based on a social
contract between several managing organizations.
We can do even better (in terms of security, scala-
bility, robustness), thanks to two great innovations in
computer science: public-key cryptography and P2P
networks.
Peer-Minted Persistent Identifiers (PMPIs)
Introducing Peer-Minted Persistent Identifiers (PMPIs), a distributed system in which
anyone can mint and manage their IDs. The entire database with full history is public
and stored in many copies (LOCKSS-like approach to long-term preservation).
If you know Bitcoin, keep this analogy in mind throughout this talk:
PMPI is to a traditional PID
(backed by a minting org.)
as
Bitcoin is to a traditional currency
(backed by a central bank)
Business models
Monetizing trust and QoS instead of being first.
Vision: the PMPI protocol as a common good, with
multiple stakeholders building their business models
around it.
Analogy: the Internet Protocol is a common good, yet
we have for-profit and non-profit organizations offer-
ing their services on top of it (ISPs, domain names,
hosting, SSL certificates).
Technical details
Desired properties of the system
Anyone can mint an ID and associate with it a
URL to content + a list of authorized keys.
For a given ID, any authorized key owner can
alter the URL and the list of authorized keys.
Anyone can download the complete set of IDs
with full revision history and verify its integrity.
No proper subset of participants is capable of
shutting down the system.
Chain of operations
An operation is the basic building block:
mint a new identifier (set the URL to metadata + the list of authorized keys)
update an identifier (change the URL to metadata + the list of authorized keys)
Operations form a chain, each operation is signed with an authorized private key,
each includes the hash of the previous operation in the chain.
(Operations are immutable, tampering with the past is practically impossible)
Adding an operation to the chain requires a proof-of-work.
(Prevents spam and gives time to propagate operations across the network — we want a chain not a tree)
Chain of operations
More technical details (and differences wrt. BTC/NMC)
For the sake of mass imports/modifications, users with high reputation (many op-
eration earlier in the chain) can add multiple operations in one bundle (w/ one
proof-of-work).
Certain useful actions, e.g. blacklisting a known offender, or reclaiming a long-lost
key, should be agreed by the community. For that purpose, key owners may vote for
motions, the votes are yet another type of operations that are added to the chain.
(X% of users, weighted by operations, have to agree for a motion to pass)
Authorized keys for a given identifier can be differentiated by roles. This will enable
delegation of concerns to various third-party service providers.
Next steps
Roadmap
Find interested stakeholders
(libraries, archives, minting orgs., research centres)
Secure funding
(most likely public research funding agencies)
Implement and deploy
Maintain and promote
Fine-tuning
Several parameters in the protocol need to be cali-
brated. Where applicable, by further research and
simulations. In other cases, by consensus.
Fine-tune the hardness of proofs-of-work
Establish a catalogue of roles for auth. keys
Quantify benefits of high reputation
Agree on the P2P network topology
Thank you for your attention. Let’s stay in touch!
linkedin.com/in/bolikowski
twitter.com/bolikowski
lukasz.bolikowski@icm.edu.pl
License
c 2015 ICM, University of Warsaw. Some rights reserved. This presentation is available under a CC BY 4.0 license, uses materials from the following sources:
https://commons.wikimedia.org/wiki/File:Lange-MigrantMother02.jpg (p. 3, public domain)
https://www.flickr.com/photos/bohman/210977249 (p. 4, CC BY 2.0)
https://www.flickr.com/photos/txopi/8490786464 (p. 4, CC BY 2.0)
https://www.flickr.com/photos/59937401@N07/5929622407 (p. 6, CC BY 2.0)
https://www.flickr.com/photos/124247024@N07/13903385550 (p. 13, CC BY-SA 2.0)
https://www.flickr.com/photos/jannem/3312115991 (p. 14, CC BY-SA 2.0)

Weitere ähnliche Inhalte

Was ist angesagt?

Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docxAnbuShare
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationGokul Alex
 
Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...Shakas Technologies
 
Open Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH PilotOpen Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH PilotLucas Cioffi
 
Enhance Your Mobile Application with The Use of Blockchain Technology
Enhance Your Mobile Application with The Use of Blockchain TechnologyEnhance Your Mobile Application with The Use of Blockchain Technology
Enhance Your Mobile Application with The Use of Blockchain TechnologyDivyaConsagous
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...JPINFOTECH JAYAPRAKASH
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...ijtsrd
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionGokul Alex
 
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia CommunitiesIEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia CommunitiesKalman Graffi
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptKrushna Panda
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...IEEEFINALYEARPROJECTS
 
Document control policy for project teams
Document control policy for project teamsDocument control policy for project teams
Document control policy for project teamsPaul Mayes
 
A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud
A Distributed Trust Evaluation Protocol with Privacy Protection for IntercloudA Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud
A Distributed Trust Evaluation Protocol with Privacy Protection for IntercloudJAYAPRAKASH JPINFOTECH
 
An introduction for blockcahin
An introduction for blockcahinAn introduction for blockcahin
An introduction for blockcahin学劢 俞
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?Ulf Mattsson
 

Was ist angesagt? (20)

Certificate Locker.docx
Certificate Locker.docxCertificate Locker.docx
Certificate Locker.docx
 
Applying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital TransformationApplying Blockchain Technology for Digital Transformation
Applying Blockchain Technology for Digital Transformation
 
Portfolio Usccb
Portfolio   UsccbPortfolio   Usccb
Portfolio Usccb
 
Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...Scalable and secure of personal health records in cloud computing using attri...
Scalable and secure of personal health records in cloud computing using attri...
 
48
4848
48
 
Open Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH PilotOpen Identity for Open Government Initiative - NIH Pilot
Open Identity for Open Government Initiative - NIH Pilot
 
Block chain
Block chainBlock chain
Block chain
 
Enhance Your Mobile Application with The Use of Blockchain Technology
Enhance Your Mobile Application with The Use of Blockchain TechnologyEnhance Your Mobile Application with The Use of Blockchain Technology
Enhance Your Mobile Application with The Use of Blockchain Technology
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
Investigation of Blockchain Based Identity System for Privacy Preserving Univ...
 
Blockchain in life sciences
Blockchain in life sciencesBlockchain in life sciences
Blockchain in life sciences
 
Decentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An IntroductionDecentralised AI and Distributed Ledgers - An Introduction
Decentralised AI and Distributed Ledgers - An Introduction
 
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia CommunitiesIEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
IEEE ISM 2008: Kalman Graffi: A Distributed Platform for Multimedia Communities
 
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-pptMona secure multi owner data sharing for dynamic groups in the cloud-ppt
Mona secure multi owner data sharing for dynamic groups in the cloud-ppt
 
Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...Enforcing secure and privacy preserving information brokering in distributed ...
Enforcing secure and privacy preserving information brokering in distributed ...
 
Document control policy for project teams
Document control policy for project teamsDocument control policy for project teams
Document control policy for project teams
 
A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud
A Distributed Trust Evaluation Protocol with Privacy Protection for IntercloudA Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud
A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud
 
An introduction for blockcahin
An introduction for blockcahinAn introduction for blockcahin
An introduction for blockcahin
 
Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017Pistoia Alliance Blockchain Webinar 20 June 2017
Pistoia Alliance Blockchain Webinar 20 June 2017
 
What is tokenization in blockchain?
What is tokenization in blockchain?What is tokenization in blockchain?
What is tokenization in blockchain?
 

Ähnlich wie A system for distributed minting and management of persistent identifiers

Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identityIan Beckett
 
Integrating blockchain and traditional web
Integrating blockchain and traditional webIntegrating blockchain and traditional web
Integrating blockchain and traditional webMichael Coon
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structurekasthurimukila
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universitygugan7097
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and DemonstrationYao Yao
 
HDI - Blockchain White Paper
HDI - Blockchain White PaperHDI - Blockchain White Paper
HDI - Blockchain White PaperDavid MANSET
 
University of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxUniversity of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxMahdi_Fahmideh
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINIRJET Journal
 
Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Mike Nejad
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger TechnologyIRJET Journal
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...IRJET Journal
 
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...Dazza Greenwood
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem IJECEIAES
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfMahdi_Fahmideh
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesHitachi ID Systems, Inc.
 
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docxRunning head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docxtoddr4
 

Ähnlich wie A system for distributed minting and management of persistent identifiers (20)

Uport a blockchain platform for self-sovereign identity
Uport   a blockchain platform for self-sovereign identityUport   a blockchain platform for self-sovereign identity
Uport a blockchain platform for self-sovereign identity
 
Integrating blockchain and traditional web
Integrating blockchain and traditional webIntegrating blockchain and traditional web
Integrating blockchain and traditional web
 
Blockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its StructureBlockchain Technology ,Architecture and its Structure
Blockchain Technology ,Architecture and its Structure
 
blockchain ppt for research puropse in the university
blockchain ppt for research puropse in the universityblockchain ppt for research puropse in the university
blockchain ppt for research puropse in the university
 
Blockchain Security and Demonstration
Blockchain Security and DemonstrationBlockchain Security and Demonstration
Blockchain Security and Demonstration
 
GM_12_161.pptx
GM_12_161.pptxGM_12_161.pptx
GM_12_161.pptx
 
HDI - Blockchain White Paper
HDI - Blockchain White PaperHDI - Blockchain White Paper
HDI - Blockchain White Paper
 
University of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptxUniversity of Borås-full talk-2023-12-09.pptx
University of Borås-full talk-2023-12-09.pptx
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAINAN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
AN IDENTITY MANAGEMENT SYSTEM USING BLOCKCHAIN
 
Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper Blockchain for ePedigree - Whitepaper
Blockchain for ePedigree - Whitepaper
 
IRJET- Credible Data through Distributed Ledger Technology
IRJET-  	  Credible Data through Distributed Ledger TechnologyIRJET-  	  Credible Data through Distributed Ledger Technology
IRJET- Credible Data through Distributed Ledger Technology
 
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
A Robust finger Print Authentication Scheme viaBlockchain to retrieve Citizen...
 
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
Daniel "Dazza" Greenwood's Keynote Address on Digital Identity to the OECD in...
 
A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem  A decentralized consensus application using blockchain ecosystem
A decentralized consensus application using blockchain ecosystem
 
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdfAdoption Blockchain Smart Contracts in Developing Information Systems.pdf
Adoption Blockchain Smart Contracts in Developing Information Systems.pdf
 
Network Security
Network SecurityNetwork Security
Network Security
 
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment ChallengesSuccessful Enterprise Single Sign-on: Addressing Deployment Challenges
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
 
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docxRunning head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
Running head BLOCKCHAIN TECHNOLOGY BEYOND CRYPTOCURRENCY1B.docx
 
Iot 7-12-2021
Iot 7-12-2021Iot 7-12-2021
Iot 7-12-2021
 

Kürzlich hochgeladen

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...Neha Pandey
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistKHM Anwar
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...sonatiwari757
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Servicesexy call girls service in goa
 

Kürzlich hochgeladen (20)

AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Noida 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Noida 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
𓀤Call On 7877925207 𓀤 Ahmedguda Call Girls Hot Model With Sexy Bhabi Ready Fo...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
SEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization SpecialistSEO Growth Program-Digital optimization Specialist
SEO Growth Program-Digital optimization Specialist
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
10.pdfMature Call girls in Dubai +971563133746 Dubai Call girls
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
Call Girls in Mayur Vihar ✔️ 9711199171 ✔️ Delhi ✔️ Enjoy Call Girls With Our...
 
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine ServiceHot Service (+9316020077 ) Goa  Call Girls Real Photos and Genuine Service
Hot Service (+9316020077 ) Goa Call Girls Real Photos and Genuine Service
 

A system for distributed minting and management of persistent identifiers

  • 1. A system for distributed minting and management of persistent identifiers Ł. Bolikowski, A. Nowiński, W. Sylwestrzak ICM, University of Warsaw IDCC 2015, London, 9-10 February 2015
  • 3. The problem Truly long-term persistence of identifiers should account for risks to managing organizations’ longevity. Internal risks: solvency, good will. External risks: political, economic, military.
  • 4. The approach Decentralize! First steps already taken: w3id is based on a social contract between several managing organizations. We can do even better (in terms of security, scala- bility, robustness), thanks to two great innovations in computer science: public-key cryptography and P2P networks.
  • 5. Peer-Minted Persistent Identifiers (PMPIs) Introducing Peer-Minted Persistent Identifiers (PMPIs), a distributed system in which anyone can mint and manage their IDs. The entire database with full history is public and stored in many copies (LOCKSS-like approach to long-term preservation). If you know Bitcoin, keep this analogy in mind throughout this talk: PMPI is to a traditional PID (backed by a minting org.) as Bitcoin is to a traditional currency (backed by a central bank)
  • 6. Business models Monetizing trust and QoS instead of being first. Vision: the PMPI protocol as a common good, with multiple stakeholders building their business models around it. Analogy: the Internet Protocol is a common good, yet we have for-profit and non-profit organizations offer- ing their services on top of it (ISPs, domain names, hosting, SSL certificates).
  • 8. Desired properties of the system Anyone can mint an ID and associate with it a URL to content + a list of authorized keys. For a given ID, any authorized key owner can alter the URL and the list of authorized keys. Anyone can download the complete set of IDs with full revision history and verify its integrity. No proper subset of participants is capable of shutting down the system.
  • 9. Chain of operations An operation is the basic building block: mint a new identifier (set the URL to metadata + the list of authorized keys) update an identifier (change the URL to metadata + the list of authorized keys) Operations form a chain, each operation is signed with an authorized private key, each includes the hash of the previous operation in the chain. (Operations are immutable, tampering with the past is practically impossible) Adding an operation to the chain requires a proof-of-work. (Prevents spam and gives time to propagate operations across the network — we want a chain not a tree)
  • 11. More technical details (and differences wrt. BTC/NMC) For the sake of mass imports/modifications, users with high reputation (many op- eration earlier in the chain) can add multiple operations in one bundle (w/ one proof-of-work). Certain useful actions, e.g. blacklisting a known offender, or reclaiming a long-lost key, should be agreed by the community. For that purpose, key owners may vote for motions, the votes are yet another type of operations that are added to the chain. (X% of users, weighted by operations, have to agree for a motion to pass) Authorized keys for a given identifier can be differentiated by roles. This will enable delegation of concerns to various third-party service providers.
  • 13. Roadmap Find interested stakeholders (libraries, archives, minting orgs., research centres) Secure funding (most likely public research funding agencies) Implement and deploy Maintain and promote
  • 14. Fine-tuning Several parameters in the protocol need to be cali- brated. Where applicable, by further research and simulations. In other cases, by consensus. Fine-tune the hardness of proofs-of-work Establish a catalogue of roles for auth. keys Quantify benefits of high reputation Agree on the P2P network topology
  • 15. Thank you for your attention. Let’s stay in touch! linkedin.com/in/bolikowski twitter.com/bolikowski lukasz.bolikowski@icm.edu.pl
  • 16. License c 2015 ICM, University of Warsaw. Some rights reserved. This presentation is available under a CC BY 4.0 license, uses materials from the following sources: https://commons.wikimedia.org/wiki/File:Lange-MigrantMother02.jpg (p. 3, public domain) https://www.flickr.com/photos/bohman/210977249 (p. 4, CC BY 2.0) https://www.flickr.com/photos/txopi/8490786464 (p. 4, CC BY 2.0) https://www.flickr.com/photos/59937401@N07/5929622407 (p. 6, CC BY 2.0) https://www.flickr.com/photos/124247024@N07/13903385550 (p. 13, CC BY-SA 2.0) https://www.flickr.com/photos/jannem/3312115991 (p. 14, CC BY-SA 2.0)