#NOTRUST Identities, DIDs, and confidentiality...2019/11/26  · CONFIDENTIALITY • Don’t trust,...

Post on 15-Jul-2020

1 views 0 download

transcript

#NOTRUST

Identities, DIDs, and confidentiality

HW & SW based secure

Identities (DLT attestation -> trust, provenance, context)

Interaction (e.g. DID based https)

Processes (e.g. Verifiable Claims)

DLTINFRASTRUCTURE

.

TRUSTED

NODE

WEB

INTERFACE

DEVICE 4

DEVICE 1

DEVICE 3

DEVICE 2

SWITZERLAND JAPAN

Secure Multi Party Computing

DIGITAL ASSETMANAGEMENT

TRACK RECORD

• 1 DISTRIBUTED ENERGY SOLUTIONS

• 2 TRUSTED SENSOR SOLUTIONS

• 3 CAR WALLETS (M2M ECONOMY)

USE CASES

TRUSTED PROBE SENSOR

1

2

3

CONFIDENTIALITY

• Don’t trust, proof!

• Ensure integrity.

• No need to trust partners/providers.

• Innovative signing schemes (SMPC)

• Secrets are never stored (SMPC).

Juergen@riddleandcode.com

THANK YOU