A Truly Self-Sovereign Identity System

Research output: Chapter in Book/Conference proceedings/Edited volumeConference contributionScientificpeer-review

14 Citations (Scopus)


Existing digital identity management systems fail to deliver the desirable properties of control by the users of their own identity data, credibility of disclosed identity data, and network-level anonymity. The recently proposed Self-Sovereign Identity (SSI) approach promises to give users these properties. However, we argue that without addressing privacy at the network level, SSI systems cannot deliver on this promise. In this paper we present the design and analysis of our solution TCID, created in collaboration with the Dutch government. TCID is a system consisting of a set of components that together satisfy seven functional requirements to guarantee the desirable system properties. We show that the latency incurred by network-level anonymization in TCID is significantly larger than that of identity data disclosure protocols but is still low enough for practical situations. We conclude that current research on SSI is too narrowly focused on these data disclosure protocols.
Original languageEnglish
Title of host publicationProceedings of the IEEE 46th Conference on Local Computer Networks, LCN 2021
Subtitle of host publicationProceedings
EditorsLyes Khoukhi, Sharief Oteafy, Eyuphan Bulut
Place of PublicationPiscataway
Number of pages9
ISBN (Electronic)978-1-6654-1886-7
ISBN (Print)978-1-6654-4800-0
Publication statusPublished - 2021
Event2021 IEEE 46th Conference on Local Computer Networks (LCN) - Virtual at Edmonton, Canada
Duration: 4 Oct 20217 Oct 2021
Conference number: 46th

Publication series

NameProceedings - Conference on Local Computer Networks, LCN


Conference2021 IEEE 46th Conference on Local Computer Networks (LCN)
CityVirtual at Edmonton


  • Anonymity
  • Identity management systems
  • Peer-to-peer
  • Privacy
  • Pseudonymity
  • Self-sovereign identity


Dive into the research topics of 'A Truly Self-Sovereign Identity System'. Together they form a unique fingerprint.

Cite this