Lecture Note
University
University of California San DiegoCourse
DSC 207R | Python for Data SciencePages
2
Academic year
2023
anon
Views
28
Public Keys as Identities Digital signatures are a crucial part of our online world, allowing us to securely verify the authenticity and integrity of electronic documents and messages. In this article, we'll discussan interesting trick that can be used in combination with digital signatures to createdecentralized identity management. Let's quickly go over the definition and operation of digital signatures first. A mathematical system known as a digital signature can be used to confirm the legitimacy of digitalmessages or documents. It enables recipients to verify that the message or document wasauthored by the stated sender and was not changed in transit. It is the electronic counterpartof a handwritten signature. Digital signatures work by creating a unique electronic signature that can be confirmed by anybody who has access to the public key using a pair of keys, one private and one public.The signer must keep the private key a secret, but anyone who needs to validate thesignature can use the public key without restriction. Let's now discuss how to use digital signatures to establish decentralized identity management. The concept is to use public keys as system IDs. If you consider a public keyto be an actor or party in a system, they have the ability to make claims by signing thoseclaims. According to this way of thinking, a public key is comparable to an identity-a systemactor with certain rights. You can sign communications with a secret key and give statements on behalf of a public key if you are aware of the matching secret key for the public key. If you want an identity tobe something that one person can speak for or on behalf of and that everyone can see, thisindicates that there is an identity within the system that only you can speak for. One of the consequences of treating public keys as identities is that you can make a new identity whenever you want. To create a new identity, you just need to generate a newrandom key pair, one private and one public, using the generate keys operation in our digitalsignature scheme. The public key becomes the name of that identity, and the private key isthe information that lets you speak for that identity. You control the identity because only youknow the secret key. No one needs to know who you are if you generate the public key so that it appears random. You have the ability to create a new identity that resembles a familiar face in thecrowd. The concept of decentralized identity management is thus introduced. Decentralized identity management means that instead of having a central place that you have to go to register as a user in a system, you can create a new identity whenever youwant. You don't need to get a username or inform someone that you're going to be using aparticular name. If you want a new identity, just make one. Anybody can make a new identityat any time, and you can make as many as you want. If you prefer to be known by fivedifferent names, no problem - just make five identities.
This strategy also permits some degree of anonymity. You can create a new identity, use it briefly, then discard it if you wish to remain anonymous for a while. With decentralizedidentity management, all of these things are achievable and there is no need for a singleperson to be in charge of it because there is no single point of control. The system operates in an entirely decentralized way, which is the way Bitcoin does identity. In Bitcoin jargon, these identities are called addresses. So when you hear the termaddress used in talking about Bitcoin and cryptocurrencies, it's referring to the public key thatrepresents an identity. To sum up, using digital signatures is a crucial part of ensuring the reliability and validity of electronic messages and documents.
Creating Identities with Public Keys: A Decentralized Approach
Please or to post comments