<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Ethereum Transactions and Smart Contracts among Secure Identities</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Francesco Buccafurri</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Gianluca Lax</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Lorenzo Musarella</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Antonia Russo</string-name>
          <email>antonia.russog@unirc.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>University Mediterranea of Reggio Calabria</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>One of the limitations of the current Blockchains is that recipients of transactions (originated from both users and smart contracts) must preliminarily sign up the system. In contrast, the nature of Blockchain would allow the implementation of services with a high degree of exibility and interoperability, once the subjects can be securely identi ed someway. In this paper, we overcome this limitation by integrating Public Digital Identity with Ethereum via Identity-Based-Encryption (IBE). An important feature of the solution is that it does not require additional trust w.r.t. that necessary for IBE and Public Digital Identity systems.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        compliant in EU with the eIDAS regulation [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ], this is the best way to follow. Thus, in our
paper we refer to SPID [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ], which is the Italian System of Public Digital Identity introduced
in accordance with the eIDAS initiative.
      </p>
      <p>
        The second point is how to link in a secure way digital identities and Ethereum addresses.
Our solution leverages Identity-Based-Encryption (IBE) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ], which gives a direct role to the
notion of identity and then a direct link between Ethereum keys and identity of the user, once
she/he is able to provide the PKG (i.e., the party issuing the IBE private key) with the proof of
her/his SPID identity. From this point of view, this paper is an evolution of the work presented
in [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ], in which the idea of integrating IBE and Blockchain is presented for the rst time in
the simpler context of Bitcoin Blockchain, thus without the possibility of involving unregistered
users. We highlight that the role of IBE is crucial in our proposal, because a direct integration of
SPID with Blockchain (like in [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]) would require that a Blockchain-side entity (an application
or a smart contract) should play as a Service Provider of the public digital identity system.
This would require the full trust in this entity, concerning the assessment of identity.
      </p>
      <p>The paper is structured as follow. In Section 2, we introduce the notion of digital identity
with the related technologies and Identity-Based Encryption, which is used to bind a digital
identity and a public key. In Section 3, we describe our proposal aiming at associating a public
digital identity with a blockchain transaction. In Section 4, we provide the technical details
about how our solution works. The related work is discussed in Section 5. Finally, in Section
6, we draw our conclusions.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Background</title>
      <p>In this section, we recall two concepts related to our proposal, which are public digital identity
and identity-based encryption.</p>
      <p>
        A digital identity is de ned as information on an entity used by computer systems to
represent an external agent that may be a person, organization, application, or device [
        <xref ref-type="bibr" rid="ref4">4</xref>
        ]. Another
similar de nition given by ISO/IEC 24760-1 reports digital identity as a set of attributes related
to an entity [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ].
      </p>
      <p>
        In this paper, we refer to a speci c notion of digital identity, the public digital identity,
which is recognized by law at international level making the basis for non-repudiable
accountable applications. A concrete instantiation of this notion in the European Union is based on
the Regulation (EU) N. 910/2014 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ] on electronic identi cation and trust services for
electronic transactions in the internal market (eIDAS Regulation), issued on 23 July 2014 and
fully e ective from 1 July 2016. It has the purpose of providing a normative basis at EU level
for duciary services and providing the means of Member States' electronic identi cation: the
eIDAS regulation aims to provide a common regulatory basis for secure electronic interactions
between citizens, businesses and public administrations and to increase the security and
effectiveness of e-business services and e-business and e-commerce transactions in the European
Union. Thanks to the principle of mutual recognition and reciprocal acceptance of interoperable
electronic identi cation schemes, eIDAS wants to simplify the use of electronic authentication
against public administrations, both by companies and by citizens. Each Member State
maintains it own electronic identi cation systems, which have to be accepted by all other member
states. For example, Italy has noti ed the EU Commission the institution of SPID, the Italian
public system for the management of the digital identity of citizens and businesses [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. Thanks
to the eIDAS regulation, it is possible for Italian citizens to access the online services of other
EU countries (university services, banking, public administration services, other online services)
using SPID credentials, and at the same time, European citizens in possession of recognized
national digital identities within the eIDAS framework will have access to the services of Italian
public administrations.
      </p>
      <p>The second concept we present is Identity-based Encryption. It is known that in
asymmetric cryptography, each user owns a public and a private key, and public keys are typically
arranged by a Public Key Infrastructure, which binds public keys with the respective identities
of entities through a process of registration and issuance of certi cates by a certi cate authority
(CA). Identity-based Encryption is a solution in those cases in which pre-distribution of keys
is inconvenient or infeasible due to technical restraints.</p>
      <p>
        Identity-based Encryption (IBE) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] allows any party to generate a public key from a known
identity value (for example, an e-mail address). A trusted third party, called the Private Key
Generator (PKG), generates the corresponding private key. To operate, the PKG rst publishes
a master public key and retains the corresponding master private key (referred to as master
key). Given the master public key, any party can compute a public key corresponding to an
identity by suitably combining the master public key with the identity value. To obtain a
corresponding private key, the party authorized to use the identity ID contacts the PKG, which
uses the master private key to generate the private key for the identity ID. The operations
carried out in an IBE scheme are summarized in Figure 1.
      </p>
      <p>
        As a result, parties may encrypt messages (or verify signatures) with no prior distribution of
keys between individual participants, once their identity is known and well-de ned. However,
to decrypt or sign messages, the authorized user must obtain the appropriate private key from
the PKG, by proving the possession of the proper identity. The most used IBE systems have
been proposed by Boneh-Franklin [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] and by SakaiKasahara [
        <xref ref-type="bibr" rid="ref33">33</xref>
        ].
      </p>
    </sec>
    <sec id="sec-3">
      <title>Our proposal</title>
      <p>
        The goal of this paper is to allow the association of a digital identity with a blockchain
transaction. Among the possible mechanisms to handle digital identity, such as OAuth [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], OpenID
[
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] Windows CardSpace [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], we refer to the notion of public digital identity, which has been
de ned by the Regulation (EU) N. 910/2014 [
        <xref ref-type="bibr" rid="ref5">5</xref>
        ]. Our choice is motivated by the fact that we
expected that, in the next years, public digital identity will involve the most of EU people:
for example, on February 2017, Germany noti ed its national identity which has more than 40
million registered citizens [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ].
      </p>
      <p>In our solution, we have the following types of entity:
a user, a physical or legal person using a digital identity for authentication. Each user
can be associated with one or more public digital identities.
a public identity digital system with identity provider IP, which creates and manages
public digital identities. Without loss of generality, we assume it is unique.
an IBE system with Private Key Generator PKG (see Section 2). It is managed by a
public or private organization and provides the mapping between a digital identity and a
pair of asymmetric encryption keys (called IBE keys).</p>
      <p>a Distributed Ledger allowing smart contracts (i.e., Blockchain 2.0).</p>
      <p>In this scenario, we identify the following types of operation that users carry out.
1. Digital Identity Registration. To obtain a digital identity, a user must be registered to the
public identity digital system. In this phase, the real identity of the user is veri ed before
issuing the public digital identity and the security credentials.</p>
      <p>A public digital identity is identi ed by the pair husername; IP i, where IP is the
identi er of the identity provider that issued the public digital identity and username is a
string. For example, the user X registered by the Identity Provider Y is identi ed by the
X@Y. Moreover, any Public Digital Identity System compliant with eIDAS de nes also a
string UID (Universal ID), which is a single numeric identi er independent of the identity
provider, in case of multiple identity providers.
2. IBE private key gathering. To obtain the IBE private key, a user contacts the Private
Key Generator (PKG) of the IBE service to receive the master public key, if it is not
already known. Then, the Private Key Generator, by acting as a service provider of the
public digital identity system, authenticates the user by an eIDAS-compliant scheme, as
illustrated in Figure 2.</p>
      <p>First, the user using a browser (User Agent) sends to PKG a request for gathering the IBE
private key (Step 1). Then, PKG replies with an authentication request to be forwarded
to Identity Provider (Step 2). If the received request is valid, Identity Provider performs a
challenge-response authentication with the user (Steps 3 and 4). In case of successful user
authentication, Identity Provider prepares the statement of user authentication, which is
forwarded to PKG (Step 6). Finally, PKG provides the user with the IBE private key
(Step 7).</p>
      <p>Observe that the IBE public key is always calculable from the digital identity of a user,
provided that the IBE master public key is known.
3. Blockchain Binding. By this operation, a user associates his IBE public key IBEpK with
his Blockchain address A. First, the user generates a pair of private and public blockchain
keys, and, then, the blockchain address A of the user is computed as the cryptographic
hash of the public key. Then, the user generates a transaction from A to A on the
blockchain, having in data eld hU ID; E(A)i, where UID is the universal ID of the public
digital identity of the user, and E(A) is the encryption of the user's blockchain address
by the user's IBE secret key. This transaction is called binding transaction. By this
transaction, the user links her/his public digital identity to the blockchain address A:
indeed, by computing E(A), the user proves the knowledge of the IBE secret key associated
with this UID.
4. Transaction. Suppose a user S (sender) wants to send to a user R (receiver) a transaction
and let v be the value of the transaction (i.e., the amount of virtual money to transfer).
In this case, the following operations are done. First, S obtains the universal ID of R, say
U IDr and searches for the most recent binding transaction having U IDr in the payload:
this search can be successful or not. If a transaction T = hU IDr; E(Ar)i of this type is
found, then:
(a) S deciphers E(Ar) by using the IBE public key calculated from U IDr, to verify that
the authenticity of the signature (observe that E(Ar) works as a signature to prove
that the right user has generated the binding transaction). If this check fails, T is
ignored and another search is carried out.
(b) After deciphering E(Ar), the blockchain address of U IDr is obtained.
(c) S generates a blockchain transaction from his blockchain address As to Ar, with
value v.</p>
      <p>Consider now the case in which no transaction of this type is found, which is the most
interesting case. This means that the user R exists but has not yet joined the blockchain.
In this case, S generates a blockchain transaction from his blockchain address As to the
blockchain address of a speci c smart contract, say Asc, specifying both U IDr and v.
This smart contract stores the information that there is a sleeping transaction to U IDr,
from the sender As and value v.
5. Cashing. Suppose that a user R, after registering to the blockchain, wants to receive the
sleeping transactions sent to him before his registration (i.e., those transactions sent to the
smart contract sm and intended for him). Then, he generates a blockchain transaction,
named cashing transaction, from his blockchain address Ar to the blockchain address Asc
(i.e., the same smart contract referred above), having his UID (i.e., UIDr) in the payload.
Now, the smart contract searches for the most recent binding transaction T sent from Asc
and computes the IBE public key IBEr calculated from U IDr. Then, it extracts E(A)
from the payload of T and deciphers E(A), verifying that U IDr is obtained. Finally,
it extract from the stored sleeping transactions those sent to U IDr (if any): for each
transaction found, a new transaction to Ar is generated, with the same value as the found
transaction.</p>
      <p>In the next section, we show how to implement this solution in Ethereum.
4</p>
    </sec>
    <sec id="sec-4">
      <title>Implementation</title>
      <p>In this section, we instantiate the general approach presented in the previous section to the
speci c environment of Ethereum: in particular, we show all the operations carried out by two
Ethereum users, say Alice and Bob.</p>
      <p>1. Digital Identity Registration. Both Alice and Bob have a public digital identity: thus,
they have been identi ed by an identity provider, say example.com, which gave each
of them a public digital identity and a credential for authentication (typically, a
password). Now, assume that the username of Alice is alice and the username of Bob is bob.
Thus, the UIDs of Alice and Bob are alice@example.com and bob@example.com,
respectively. Observe that, for the sake of presentation, we used the same identity provider (i.e.,
example.com) for both the users: however, no problem arises in case the public digital
identities are issued by di erent identity providers, because the solution does not depend
on the particular UID of the user.
2. IBE private key gathering. To obtain the IBE private key, a user connects to the site of
the IBE system by the browser (i.e., the user agent) and sends a request for accessing
the service. Observe that the IBE system acts as a service provider in this step, because
it needs to authenticate the user before issuing the private key. Then, the IBE system
replies to the user agent with an authentication request to be forwarded to the identity
provider. The identity provider is selected according to the user's UID.</p>
      <p>
        If the received request is valid, the identity provider performs a challenge-response
authentication with the user. In case of successful user authentication, the identity provider
prepares the assertion containing the statement of the user authentication for the IBE
service provider. The assertion contains the reference to the request message, the
authenticated user, the identity provider, the personal information about the authenticated
user, the temporal range of validity, and the description of the authentications context.
The assertion is signed by the identity provider to guarantee integrity and authenticity.
Now, the assertion returned to the user agent is forwarded via http POST Binding to the
IBE service provider. The IBE system veri es the assertion and provides the user with
her/his IBE private key. We denote by IBEUS the IBE private key of the user U .
Concerning the user's IBE public key, they are computed starting from the master public
key and the user's UID. We denote by IBEUP the IBE public key of the user U .
3. Blockchain Binding. Each user needs to have a private and a public blockchain key. The
private key is a randomly generated 256-bit string. The public key is generated by the
private one by means of a cryptographic function named elliptic curve point multiplication.
In particular, the used algorithm is Curve Digital Signature Algorithm (ECDSA) and the
elliptic curve is secp256k1 [
        <xref ref-type="bibr" rid="ref29">29</xref>
        ].
      </p>
      <p>
        The Ethereum address A of a user is computed from the public key K by apply Keccak-256
[
        <xref ref-type="bibr" rid="ref10">10</xref>
        ], and nally taking the last 20 bytes of that hash. We denoted by AU the blockchain
address of the user U . Finally, each user generates the binding transaction having as
payload hU ID; E(A)i, where UID is the universal ID of the public digital identity of the
user, and E(A) is the encryption of the user's Ethereum address done by the user's IBE
private key.
4. Transaction. Now, both Alice and Bob have their public digital identity associated with
a blockchain address. Suppose that Alice has to send some Ether money to Bob, but
Bob has not an Ethereum wallet (i.e., he has not an Ethereum address). Clearly, we can
image that users run an application (on a PC or a smartphones) to manage transaction
generations.
      </p>
      <p>
        First, Alice has to know the UID of Bob: the UID of Bob as well as the amount of money
to transfer are inserted into the application, which generates a transaction to the smart
contract. In Figure 3, we give an implementation of this contract written in Solidity,
which is a JavaScript-like language. For the sake of presentation, we do not explain every
line of the code: we assume the reader is familiar with Solidity and Oraclize, which is the
leading oracle service for smart contracts and blockchain [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ] In particular, it is called the
function pay, using the UID of Bob as parameter (Lines 13-15): this function stores the
amount that will be given to Bob when he will register (by payUID).
5. Cashing. After Bob creates his wallet, he can ask for receiving the amount from the
sleeping transactions sent to him before his registration. To do this, he generates a
cashing transaction to the smart contract illustrated in Figure 3, by calling the function
cash. The smart contract rst checks if there is some amount for Bob. If any, an oraclize
function is used (Line 21), which returns the Ethereum address of Bob by the callback
function. Finally, a money transfer to Bob is carried out by the smart contract and the
amount to pay to bob is reset (Lines 33-34).
      </p>
      <p>By this protocol, we enable on Ethereum the possibility to send money to users without the
need to know their blockchain address. The suitable use of the secure digital identity guarantees
that only the correct user receives money.
In this section, we survey the approaches present in the literature related to our topic.</p>
      <p>
        Thanks to the assurance of authenticity and uniqueness of transactions, blockchain starts
to become the technical core of cryptocurrency, access control systems, asset management,
banking, e-voting, etc. [
        <xref ref-type="bibr" rid="ref18 ref24 ref28 ref32">28, 32, 18, 24</xref>
        ].
      </p>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref31">31</xref>
        ] provide an overview of the blockchain technology and its potential
to disrupt the world of banking through facilitating global money remittance, smart contracts,
automated banking ledgers and digital assets. In this regard, they provide a brief overview of the
core aspects of this technology, as well as the second-generation contract-based developments.
From there, their work enforces key issues that must be considered in developing such ledger
based technologies in a banking context.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], the authors review applications relying on blockchain by highlighting the potential
bene t of such technology in the manufacturing supply chain. Furthermore, they propose a
vision for the future blockchain ready manufacturing supply chain.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ] provides a high-level understanding of how blockchain technology will be a
fundamental tool to improve supply chain operations. It illustrates theoretical and conceptual
models for use of open blockchain in di erent supply chain applications with real-life practical
use cases as is being developed and deployed in various industries and business functions.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref26">26</xref>
        ], the authors observe that digital supply chain integration is becoming increasingly
dynamic and investigate the requirements and functionalities of supply chain integration,
concluding that cloud integration can be expected to o er a cost-e ective business model for
interoperable digital supply chains. Furthermore, they explain how supply chain integration through
the blockchain technology can achieve important transformation in digital supply chains and
networks.
      </p>
      <p>
        The authors of [
        <xref ref-type="bibr" rid="ref35">35</xref>
        ] propose an overview of what smart contracts are and what are their
main challenges for the future. In particular, they state that smart contracts have three main
characteristics: (i) autonomy, (ii) self-su ciency and (iii) decentralization. Autonomy means
that the contracts and the initiating agents do not need to be in further contact. Self-su cient
means that smart contracts are able to raise funds by providing services and spending them
when needed. Furthermore, smart contracts are decentralized as they do not are valid on a
single centralized server, but they are distributed and self-executed across network nodes. As
they can be seen as a distributed application, they have to face almost the well-known challenges
of them, such as the reentrancy vulnerability, the privacy issues, how to guarantee the reliability
of external information, and so on.
      </p>
      <p>
        Another topic related to our proposal regards digital identity, in which we can nd a rich
literature. Bitnation [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] is the world's rst Decentralized Borderless Voluntary Nation (DBVN).
Bitnation started in July 2014 and hosted the rst blockchain for refugee emergency ID,
marriage, birth certi cate, World Citizenship and more. The website proof-of-concept, including
the blockchain ID and Public Notary, is used by tens of thousands of Bitnation Citizens and
Embassies around the world.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref21">21</xref>
        ], the authors focus on the Public Digital Identity System (SPID), the Italian
government framework compliant with the eIDAS regulatory environment. They observe that a
drawback limiting the real di usion of this framework is that, despite the fact that identity
and service providers might be competitor private companies, SPID authentication results in
the information leakage about the customers of identity providers. To overcome this potential
limitation, they propose a modi cation of SPID to allow user authentication by preserving
the anonymity of the identity provider that grants the authentication credentials. This way,
information leakage about the customers of identity providers is fully prevented.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref25">25</xref>
        ], the authors highlight that, since we are in the Internet era, it is necessary a right
blockchain-based identity management, as we have faced identity management challenges since
the sunrise of the Internet. In particular, they observe that blockchain technology should o er
a way to circumvent this problem by delivering a secure solution without the need for a trusted,
central authority. It can be used for creating an identity on the blockchain, making it easier
to manage for individuals, giving them greater control over who has their personal information
and how they access it. The proposed solution stores the encrypted identity of users, allowing
them to share their data with companies and manage it on their own terms.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref34">34</xref>
        ] focuses on pseudonymization, a concept that was only recently formally
introduced in the EU regulatory landscape. In particular, it attempts to derive the e ects of the
introduction of pseudonyms (or pseudonymous credentials) as part of the eIDAS Regulation on
electronic identi cation and trust services and, ultimately, to compare them with the e ects of
pseudonymization within the meaning of the General Data Protection Regulation (the GDPR).
The work examines how eIDAS conceives pseudonymization and explains how this interpretation
would translate in practical uses in the context of a pan-European interoperability framework.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref20">20</xref>
        ], an advanced electronic signature protocol that relies on a public system for the
management of the digital identity is proposed by the authors. The work aims at implementing
an e ective synergy to provide the citizen with a unique, uniform, portable, and e ective tool
applicable to both authentication and document signature.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ], the authors proposed SCPKI, an alternative PKI system based on a decentralized and
transparent design using a web-of-trust model and a smart contract on the Ethereum blockchain,
to make it easily possible for rogue certi cates to be detected when they are published. The
web-of-trust model is designed such that an entity or authority in the system can verify
negrained attributes of another entity's identity, as an alternative to the centralized certi cate
authority identity veri cation model.
      </p>
      <p>
        The paper [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ] argues that existing laws, speci cally the federal Electronic Signatures in
Global and National Commerce Act (\ESIGN") and state laws modeled on the Uniform
Electronic Transaction Act (\UETA"), render blockchain-based smart contracts enforceable and
therefore immediately usable.
      </p>
      <p>From the analysis of the state of the art, we conclude that the topic of this paper is surely
important. Moreover, to the best of our knowledge, this is the rst paper aiming at addressing
the important issue of allowing payment towards blockchain users who have not yet joined the
blockchain.
6</p>
    </sec>
    <sec id="sec-5">
      <title>Conclusion and Future Work</title>
      <p>
        In this paper, we presented a solution to integrate Public Digital Identity with Ethereum
to enable transactions (both external and internal) directed to subjects not yet registered to
the system. The solution leverages the concept of Identity-Based-Encryption (IBE). The goal
is achieved by giving to the Private Key Generator (PKG) of the IBE the role of Service
Provider of the Public Digital Identity system. It is worth noting that, in this paper, we only
treat the case in which a given amount of cryptocurrency is transferred, but the transfer of
tokens with identi er can be easily implemented by using the interface ERC721 [
        <xref ref-type="bibr" rid="ref6">6</xref>
        ] and we will
address this improvement as a future work. Another direction for the evolution of this work is
the complete elimination of centralization introduced by both the IBE and the Public Digital
Identity systems. To do this, we can use distributed versions of such systems [
        <xref ref-type="bibr" rid="ref25 ref27">27, 25</xref>
        ]. Finally,
we plan to complete the implementation and to apply it to the industrial projects in which our
proposal is contextualized.
      </p>
    </sec>
    <sec id="sec-6">
      <title>Acknowledgment</title>
      <p>This paper has been partially supported by the projects \Id Service - Digital Identity and Service
Accountability" funded by the Ministry of Economic Development (MISE), project code number
F/050238/03/X32, and \SecureOpenNets-Distributed Ledgers for Secure Open Communities",
funded by Ministry of Research and Education (MIUR), project id ARS01 00587.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1] ISO/IEC 24760-
          <article-title>1:2011 Information technology Security techniques A framework for identity management Part 1: Terminology and concepts (</article-title>
          <year>2011</year>
          ), http://standards.iso.org/ittf/ PubliclyAvailableStandards/index.html
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Oraclize</surname>
          </string-name>
          (
          <year>2016</year>
          ), http://www.oraclize.it/
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Bitnation</given-names>
            <surname>Pangea | Your Blockchain Jurisdiction</surname>
          </string-name>
          (
          <year>2018</year>
          ), https://tse.bitnation.co/
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] Digital identity (</article-title>
          <year>2018</year>
          ), https://en.wikipedia.org/wiki/Digital_identity/
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <fpage>eIDAS</fpage>
          - Interoperability
          <string-name>
            <surname>Architecture</surname>
          </string-name>
          (
          <year>2018</year>
          ), https://ec.europa.eu/futurium/en/content/ eidas
          <article-title>-regulation-regulation-eu-ndeg9102014</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6] ERC-721
          <string-name>
            <surname>Token</surname>
          </string-name>
          (
          <year>2018</year>
          ), http://erc721.org/
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>ID-based Encryption</surname>
          </string-name>
          (
          <year>2018</year>
          ), https://en.wikipedia.org/wiki/ID-based_encryption
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>OAuth</given-names>
            <surname>Community Site</surname>
          </string-name>
          (
          <year>2018</year>
          ), https://oauth.net/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>OpenID</given-names>
            <surname>The Internet Identity Layer</surname>
          </string-name>
          (
          <year>2018</year>
          ), https://openid.net/
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          <source>[10] SHA-3</source>
          (
          <year>2018</year>
          ), https://en.wikipedia.org/wiki/SHA-3
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>SPID</given-names>
            <surname>Sistema Pubblico di Identita Digitale</surname>
          </string-name>
          (
          <year>2018</year>
          ), https://www.spid.gov.it/
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <article-title>The eIDAS Regulation in 2017 A pivotal year for digital services in the EU (</article-title>
          <year>2018</year>
          ), https: //www.gemalto.com/govt/identity/eidas-regulation-in-2017
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Windows</surname>
            <given-names>CardSpace</given-names>
          </string-name>
          (
          <year>2018</year>
          ), https://en.wikipedia.org/wiki/Windows_CardSpace
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Abeyratne</surname>
            ,
            <given-names>S.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Monfared</surname>
            ,
            <given-names>R.P.</given-names>
          </string-name>
          :
          <article-title>Blockchain ready manufacturing supply chain using distributed ledger (</article-title>
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Al-Bassam</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Scpki: A smart contract-based pki and identity system</article-title>
          .
          <source>In: Proceedings of the ACM Workshop on Blockchain, Cryptocurrencies and Contracts</source>
          . pp.
          <volume>35</volume>
          {
          <fpage>40</fpage>
          .
          <string-name>
            <surname>ACM</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Angiulli</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fassetti</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Furfaro</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Piccolo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Sacca</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          :
          <article-title>Achieving service accountability through blockchain and digital identity</article-title>
          .
          <source>In: International Conference on Advanced Information Systems Engineering</source>
          . pp.
          <volume>16</volume>
          {
          <fpage>23</fpage>
          . Springer (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Banerjee</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          :
          <article-title>Blockchain technology: Supply chain insights from erp</article-title>
          .
          <source>Advances in Computers</source>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Bistarelli</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mantilacci</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santancini</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Santini</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          :
          <article-title>An end-to-end voting-system based on bitcoin</article-title>
          .
          <source>In: Proceedings of the Symposium on Applied Computing</source>
          . pp.
          <year>1836</year>
          {
          <year>1841</year>
          . ACM (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Boneh</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Franklin</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Identity-based encryption from the weil pairing</article-title>
          . In: Annual international cryptology conference. pp.
          <volume>213</volume>
          {
          <fpage>229</fpage>
          . Springer (
          <year>2001</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Buccafurri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fotia</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lax</surname>
          </string-name>
          , G.:
          <article-title>Implementing advanced electronic signature by public digital identity system (spid)</article-title>
          .
          <source>In: International Conference on Electronic Government and the Information Systems Perspective</source>
          . pp.
          <volume>289</volume>
          {
          <fpage>303</fpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Buccafurri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Fotia</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lax</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mammoliti</surname>
          </string-name>
          , R.:
          <article-title>Enhancing public digital identity system (spid) to prevent information leakage</article-title>
          .
          <source>In: International Conference on Electronic Government and the Information Systems Perspective</source>
          . pp.
          <volume>57</volume>
          {
          <fpage>70</fpage>
          . Springer (
          <year>2015</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Buccafurri</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lax</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Russo</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Zunino</surname>
            ,
            <given-names>G.</given-names>
          </string-name>
          :
          <article-title>Integrating digital identity and blockchain</article-title>
          . In:
          <article-title>OTM Confederated International Conferences" On the Move to Meaningful Internet Systems"</article-title>
          . pp.
          <volume>568</volume>
          {
          <fpage>585</fpage>
          . Springer (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Cohn</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>West</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Parker</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          :
          <article-title>Smart after all: Blockchain, smart contracts, parametric insurance, and smart energy grids</article-title>
          .
          <source>Georgetown Law Technology Review</source>
          <volume>1</volume>
          (
          <issue>2</issue>
          ),
          <volume>273</volume>
          {
          <fpage>304</fpage>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Dai</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Shi</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Meng</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wei</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ye</surname>
            ,
            <given-names>Z.</given-names>
          </string-name>
          :
          <article-title>From bitcoin to cybersecurity: A comparative study of blockchain application and security issues</article-title>
          .
          <source>In: Systems and Informatics (ICSAI)</source>
          ,
          <year>2017</year>
          4th International Conference on. pp.
          <volume>975</volume>
          {
          <fpage>979</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Jacobovitz</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          :
          <article-title>Blockchain for identity management</article-title>
          .
          <source>The Lynne and William</source>
          Frankel Center for Computer Science Department of Computer Science. Ben-Gurion University, Beer Sheva Google Scholar (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Korpela</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Hallikas</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Dahlberg</surname>
            ,
            <given-names>T.</given-names>
          </string-name>
          :
          <article-title>Digital supply chain transformation toward blockchain integration</article-title>
          .
          <source>In: proceedings of the 50th Hawaii international conference on system sciences (</source>
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <surname>Lewko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Waters</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          :
          <article-title>Decentralizing attribute-based encryption</article-title>
          . In:
          <article-title>Annual international conference on the theory and applications of cryptographic techniques</article-title>
          . pp.
          <volume>568</volume>
          {
          <fpage>588</fpage>
          . Springer (
          <year>2011</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28]
          <string-name>
            <surname>Maesa</surname>
            ,
            <given-names>D.D.F.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mori</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Ricci</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          :
          <article-title>Blockchain based access control</article-title>
          .
          <source>In: IFIP International Conference on Distributed Applications and Interoperable Systems</source>
          . pp.
          <volume>206</volume>
          {
          <fpage>220</fpage>
          . Springer (
          <year>2017</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref29">
        <mixed-citation>
          [29]
          <string-name>
            <surname>Mayer</surname>
            ,
            <given-names>H.</given-names>
          </string-name>
          :
          <article-title>Ecdsa security in bitcoin and ethereum: a research survey</article-title>
          .
          <source>CoinFaabrik, June</source>
          <volume>28</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref30">
        <mixed-citation>
          [30]
          <string-name>
            <surname>Nakamoto</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          :
          <article-title>Bitcoin: A peer-to-peer electronic cash system (</article-title>
          <year>2008</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref31">
        <mixed-citation>
          [31]
          <string-name>
            <surname>Peters</surname>
            ,
            <given-names>G.W.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Panayi</surname>
          </string-name>
          , E.:
          <article-title>Understanding modern banking ledgers through blockchain technologies: Future of transaction processing and smart contracts on the internet of money</article-title>
          .
          <source>In: Banking Beyond Banks and Money</source>
          , pp.
          <volume>239</volume>
          {
          <fpage>278</fpage>
          . Springer (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref32">
        <mixed-citation>
          [32]
          <string-name>
            <surname>Pilkington</surname>
            ,
            <given-names>M.:</given-names>
          </string-name>
          <article-title>11 blockchain technology: principles and applications</article-title>
          . Research handbook on digital transformations p.
          <volume>225</volume>
          (
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref33">
        <mixed-citation>
          [33]
          <string-name>
            <surname>Sakai</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kasahara</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          :
          <article-title>Id based cryptosystems with pairing on elliptic curve</article-title>
          .
          <source>IACR Cryptology ePrint Archive</source>
          <year>2003</year>
          ,
          <volume>54</volume>
          (
          <year>2003</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref34">
        <mixed-citation>
          [34]
          <string-name>
            <surname>Tsakalakis</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Stalla-Bourdillon</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          , O'hara, K.:
          <article-title>What's in a name: the con icting views of pseudonymisation under eidas and the general data protection regulation (</article-title>
          <year>2016</year>
          )
        </mixed-citation>
      </ref>
      <ref id="ref35">
        <mixed-citation>
          [35]
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Yuan</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>X.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Li</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Qin</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Wang</surname>
            ,
            <given-names>F.Y.</given-names>
          </string-name>
          :
          <article-title>An overview of smart contract: architecture, applications, and future trends</article-title>
          .
          <source>In: 2018 IEEE Intelligent Vehicles Symposium (IV)</source>
          . pp.
          <volume>108</volume>
          {
          <fpage>113</fpage>
          .
          <string-name>
            <surname>IEEE</surname>
          </string-name>
          (
          <year>2018</year>
          )
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>