We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Keyoxide: verifying online identity with cryptography

00:00

Formal Metadata

Title
Keyoxide: verifying online identity with cryptography
Subtitle
A novel approach to secure decentralized online identity
Title of Series
Number of Parts
542
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Just as we need the ability to prove real-world identity, so will the need arise in the digital domain as the offline world slowly merges with the online world. But this time, let's improve on the concept and give people full sovereignty over their identity. Keyoxide is a new decentralized tool to verify online identities using modern cryptography through a system of claims and proofs. People use it to establish a verifiable digital passport that links to all their online accounts. These passports can even be anonymous. This talk briefly introduces the concept of online identity and explains how Keyoxide went about solving it in a decentralized way, using established cryptography standards and infrastructure, without needing blockchain-related technologies.
Software developerIdentity managementCryptographyInternetworkingProjective planeRight angleFormal verificationIdentity managementCryptographyAsynchronous Transfer ModeIdentical particlesFigurate numberKey (cryptography)Link (knot theory)InternetworkingProfil (magazine)Matrix (mathematics)Basis <Mathematik>NumberElectronic visual displayIdentifiabilityWeb pageContent (media)Server (computing)Revision controlService (economics)Domain nameQuicksortString (computer science)Point (geometry)SoftwareMessage passingInstance (computer science)Public-key cryptographyMereologyValidity (statistics)Touch typingComputer animation
User profileFormal verificationIdentity managementElectronic signatureMobile appWebsiteClient (computing)Personal digital assistantConvex hullBroadcast programmingCASE <Informatik>Source codeFreewareCodeMatrix (mathematics)FreewareComputer configurationIdentical particlesTask (computing)CASE <Informatik>Link (knot theory)Client (computing)WebsiteFigurate numberFormal verificationComputing platformWeb 2.0Server (computing)Key (cryptography)Directory serviceMobile appProfil (magazine)Distribution (mathematics)Field (computer science)Projective planeFront and back endsDifferent (Kate Ryan album)Software developerPresentation of a groupElectronic mailing listSoftware testingService (economics)Public-key cryptographySymmetric-key algorithmOpen sourceSign (mathematics)Right angleTouch typingData storage deviceIdentity managementProcess (computing)Functional (mathematics)Asynchronous Transfer ModeComputer animation
Program flowchart
Transcript: English(auto-generated)