Decentralized Public Key Infrastructure(DPKI)
Uses blockchain as a decentralized key-value storage.
Secures data to prevent MITM attacks.
Minimizes the power of third parties.
Allows everyone to create or anchor cryptographic keys on the blockchain.
Enables verification of digital signatures and data encryption.
Control over the identifier is returned to the principal. No longer is it trivial for any one entity to undermine the security of the entire system or to compromise an identifier that is not theirs.
Software for managing identifiers must guarantee that all network communications related to creating, updating, renewing, or deleting identifiers are conducted through a decentralized, peer-to-peer mechanism. This approach ensures that no single entity, such as a registrar, can block the updating or renewal of identifiers.
Last updated