<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Assessing the Anonymity of DIDs in Self-Sovereing Identity</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Alessio Breglia</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Andrea De Salve</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paolo Mori</string-name>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Laura Ricci</string-name>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Institute of Applied Sciences and Intelligent Systems, National Research Council</institution>
          ,
          <addr-line>Campus Universitario, 73100 Lecce</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Institute of Informatics and Telematics, National Research Council</institution>
          ,
          <addr-line>Via Giuseppe Moruzzi, 1 56124 Pisa</addr-line>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Pisa, Department of Computer Science</institution>
          ,
          <addr-line>Largo B. Pontecorvo, 3 56127 Pisa</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2025</year>
      </pub-date>
      <abstract>
        <p>Self-Sovereign Identity (SSI) represents a paradigm of identity management which resolves issues of current Identity Management System (IMS) by providing to users full control over their personal data without relying on third-party providers. Decentralized Identifiers (DIDs) are essential components of SSI as they provide a new type of identifier enabling to uniquely and globally identify an entity without having to rely on a central authority. In this paper, we investigate the anonimity of DIDs used in SSI by using diferent sources of information to assess if these systems expose sensitive information that can be exploited to infer personal information about users. We leverage the proposed framework to evaluate the anonymity properties of a real-world DID implementation based on the Ethereum blockchain, highlighting the system's strengths and weaknesses in terms of privacy and de-anonymization risks.</p>
      </abstract>
      <kwd-group>
        <kwd>eol&gt;Identity Management System</kwd>
        <kwd>Privacy</kwd>
        <kwd>Anonymity</kwd>
        <kwd>Blockchain</kwd>
        <kwd>Self-Sovereign Identity</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>In today’s interconnected world, the concept of digital identity has become a fundamental part of how
individuals interact online, including personal, social and professional aspects. Digital identity can be
defined, therefore, as the collection of a person’s attributes or characteristics that are exhibited in online
interactions.</p>
      <p>A traditional digital identity uniquely represents an individual or entity in the context of a specific
digital service and it consists of two main components: i) the identifier that an entity uses to uniquely
recognize and diferentiate themselves from other entities, and ii) the personal information associated
to the identifiers, such as personal profile information, driver’s licenses, and university degrees. Typical
examples of identifiers we use every day include email addresses, social network usernames, ID numbers,
and product identifiers. Identity Management Systems (IMS) are responsible for managing diferent
aspects of digital identities, including how identifiers are created, stored, accessed, and authenticated
within a system. The majority of IMSs are based on a centralized or federated architecture consisting of
two diferent types of actors: i) the identity providers, which act as IMS by providing identity creation,
storage and authentication, and ii) the service providers, which request authentication decisions from
identity providers in order to assert the identity of a user and retrieve their attributes. Both centralized
and federated identity models sufer from significant vulnerabilities, such as single points of failure,
privacy concerns related to the control of identifiers to a central authority, and dependency on third-party
providers.</p>
      <p>
        Self-Sovereign Identity (SSI) [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] represents a new paradigm in identity management which resolves
vulnerabilities of current IMS by providing to users full control over their personal data without having
to rely on a central authority. Unlike centralized or federated systems, where identities are managed by
third parties, the SSI architecture enables individuals to manage and share their credentials in a secure
and transparent manner. The management of identifiers in SSI is based on Decentralized Identifiers
(DIDs), a new type of identifier which is cryptographically verifiable, and entirely controlled by their
owners. For these reasons, DIDs promise a high level of privacy and anonymity for users, as long
as identifier is only shared in a controlled way and users can create DIDs that are unlinkable across
diferent interactions.
      </p>
      <p>
        Despite the privacy-preserving promises of SSI, DIDs can still expose users to identification and
deanonymization risks if they are not managed properly by identity owners [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. As for example, the
metadata and the information that can be retrieved from DIDs could potentially be exploited by malicious
actors to compromise their anonymity, infer sensitive information or tracking them. For this reason,
it becomes crucial to investigate the ways in which anonymity of DIDs could be compromised and
mitigate any potential vulnerabilities.
      </p>
      <p>
        The goal of this paper is to investigate the anonimity of DIDs used in SSI by using diferent sources
of information to assess whether these systems expose sensitive information that can be exploited
to infer personal information about users. To achieve this, the paper proposes a framework that is
responsible for the acquisition of information related to DIDs, the modeling, and the analysis of the
extracted information. The framework is designed and specialized to operate on blockhain-based DIDs
[
        <xref ref-type="bibr" rid="ref3">3</xref>
        ], one of the most widespread implementations of DIDs where the management and verification
of DIDs is supported by blockchain. We exploited the proposed framework to assess the anonymity
properties of a real DID implementation based on Ethereum blockchain, highlighting the strengths and
weaknesses of the system in terms of privacy and de-anonymization risks. This paper presents several
significant contributions that are outlined below:
• Analysis and identification of metadata, attributes, and any embedded information in DID
documents that could inadvertently expose user identities.
• Definition of a framework for managing the acquisition of DIDs data which provides mechanisms
to assess the anonymity of DIDs in Ethereum by discovering critical information leading to the
deanonymization of users.
• Information about DIDs is obtained by leveraging data stored on the Ethereum blockchain as
well as utilizing external data sources (e.g., Blockhain explorer, and Analytics platform).
• Modeling of DID information through graph formalism to facilitate the analysis of their
relationships, patterns, and dependencies.
• The evaluation results of the proposed framework, used to assess the anonymity of a DIDs
implementation in Ethereum, are described.
      </p>
      <p>The outline of the paper is as follows. The foundational concepts related to SSI are described in
Section 2 while the related works regarding de-anonymization and security of DIDs are presented in
Section 3. The analysis and identification of the risks for anonymity in DIDs is described in 4. The
architecture and functionalities of the proposed framework are described in Section 5, while Section 6
presents the results of the proposed framework on an Ethereum-based DID implementation. Finally,
Section 7 draws conclusions and future improvements.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Background</title>
      <sec id="sec-2-1">
        <title>This section introduces basic concepts related to SSI and blockchain technology.</title>
        <sec id="sec-2-1-1">
          <title>2.1. Self-Sovereign Identity (SSI)</title>
          <p>
            SSI represents an innovative paradigm in identity management, where users have full control over their
personal data without having to rely on a central authority. Unlike centralized or federated systems,
where identities are managed by third parties, the SSI architecture enables individuals to create, manage,
and share their credentials in a secure and transparent manner. The foundation of SSI is based on 10
principles firstly defined in [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ], which collectively enhance the security, control, and portability of
this new paradigm for digital identities [
            <xref ref-type="bibr" rid="ref1">1</xref>
            ]. The security of users is guaranteed by the persistence of
their identities as long as users require it, by the protection of the rights of users, and by the selective
disclosure of their identity information. Users have complete control over their identities, which must
exist independently of the required services, and the sharing of identity information must only occur
with the consent of the user. The portability of users’ identities is guaranteed by the transparency of
the systems and algorithms used to manage identities. This transparency ensures that users can always
retrieve and access their data, making identity information usable and transportable. Furthermore,
identities must not be held by any singular third-party entity.
          </p>
          <p>In order to guarantee these principles, the SSI relies on three fundamental pillars: Decentralized
Identifiers (DID) to represents users’ identities, Verifiable Credentials (VC) and Verifiable Presentation
(VP) to represents identities information, and Verifiable Data Registry to support credential/identity
management and verification.</p>
        </sec>
        <sec id="sec-2-1-2">
          <title>2.2. Decentralized IDentifiers (DIDs)</title>
          <p>
            Decentralized Identifiers (DIDs) provide a new type of identifier which enables to uniquely and globally
identifies an entity. Unlike traditional identifiers, DIDs are cryptographically verifiable and controlled
by the entity (individual or organization) that owns them. Unlike traditional identifiers like e-mail,
phone number, or username, which are managed and owned by centralized authorities, DIDs remain
under the control of their owners as long as they possess the corresponding criptographic material. A
DID, as described in W3C documentation [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ], is defined as an Uniform Resource Identifier (URI) which
refers to a DID subject, such as a person, organization, or object. Each DID is formatted according to
the syntax did:did-method:identifier, consisting of three components: i) a did scheme, ii) the
name of the DID method used to create and manage DID, and iii) the specific unique identifier provided
by the corresponding DID method. Each DID is paired to a DID Document, a set of data describing
the public keys and methods used to authenticate the DID subject, to interact with the DID subject by
establishing a secure communication channel, to assert claims, or to create the cryptographic proofs to
demonstrate control over the DID. The process of transforming a DID into its DID document is called
DID resolution and it must be provided by each DID method by specifying a DID resolver, i.e., a method
that fetches from a Verifiable Data Registry the necessary information for building the DID document.
          </p>
          <p>
            As for example, the DID method did:ethr is a library providing DIDs under the Ethereum domain
[
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], where each DID corresponds to an address of an Ethereum blockchain (such as the mainnet or a
testnet), resulting in DIDs having the following syntax did:ethr:0x123456789.... By default, the did:ethr
assumes that each Ethereum address is paired to a standard DID document. Listing 1 shows the standard
DID document resulting from the resolution of the DID did:ethr:0x123456789.... The DID document is
encoded in JSON by using JSON-LD format and the @context attribute defines the semantics of the
document. The id attribute specifies the DID itself. The assertion method specifies the method used
by the entity to issue assertions and claims, while the authentication attribute specifies the methods
used to prove control over the DID. In particular, in Listing 1 the specific properties of the assertion and
authentication methods are defined by the verification method of the DID document. The verification
method contains the necessary information about the type of cryptographic key, who controls the
cryptographic key, and the Ethereum blockchain account from which the verification public key can be
derived.
          </p>
          <p>Listing 1: DID document example.
{
’ @context ’ : [
’ h t t p s : / / www. w3 . o r g / ns / d i d / v1 ’ ,
’ h t t p s : / / w3id . o r g / s e c u r i t y / s u i t e s / s e c p 2 5 6 k 1 r e c o v e r y − 2 0 2 0 / v2 ’
] ,
i d : ’ d i d : e t h r : 0 x 1 2 3 4 5 6 7 8 9 . . . ’ ,
v e r i f i c a t i o n M e t h o d : [
{
i d : ’ d i d : e t h r : 0 x 1 2 3 4 5 6 7 8 9 . . . # c o n t r o l l e r ’ ,
t y p e : ’ E c d s a S e c p 2 5 6 k 1 R e c o v e r y M e t h o d 2 0 2 0 ’ ,
c o n t r o l l e r : ’ d i d : e t h r : 0 x 1 2 3 4 5 6 7 8 9 . . . ’ ,
b l o c k c h a i n A c c o u n t I d : ’ e i p 1 5 5 : 1 : 0 x 1 2 3 4 5 6 7 8 9 . . . ’
}
] ,
a s s e r t i o n M e t h o d : [</p>
          <p>’ d i d : e t h r : 0 x 1 2 3 4 5 6 7 8 9 . . . # c o n t r o l l e r ’
] ,
a u t h e n t i c a t i o n : [</p>
          <p>’ d i d : e t h r : 0 x 1 2 3 4 5 6 7 8 9 . . . # c o n t r o l l e r ’
}</p>
        </sec>
        <sec id="sec-2-1-3">
          <title>2.3. Verifiable Credentials and Verifiable Presentations</title>
          <p>
            A Verifiable Credential, as described in W3C documentation [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], can describe specific attributes or
properties being asserted from an issuing authority about the subject of the credential. The digital
signature makes VCs verifiable and tamper-evident. A VC is a set of one or more claims expressed using
subject-property-value relationships. They define assertions or statements made by the issuer about
the subject of the credential. Examples of verifiable credentials include digital employee identification
cards, digital certificates, digital birth certificates, and digital educational certificates. VC also includes
metadata that allows a verifier to understand the origin and context of the credential. Such metadata
are also used to describe properties of the credential, such as the claim-issuer, the validity date and
time period, a representative image, verification material, the revocation mechanism, and so on. The
metadata and the credential data are signed by the claim-issuer and can be cryptographically verified.
The storage of the VCs and the management of the corresponding cryptographic material is performed
by specialized Wallet application.
          </p>
          <p>Users can generate Verifiable Presentations from VC and then share them with a verifier to prove
that they possess VCs with certain characteristics. A Verifiable Presentation (VP) is the sharing of a
subset of data regarding a user, and they can express data from multiple VCs. VPs are created by the
VC’s owner (the user itself) and they may contain metadata that describes contextual information for
proper verification (e.g., creation time, and validity) and selective disclosure information regarding the
credential. Selective disclosure approaches can be used to limit the exposure of data to a verifier and to
select the data of the credential to be revealed to the verifier. The VP and the corresponding metadata
are cryphographically signed by the user in order to ensure its authenticity and integrity. Both VCs and
VPs can be transmitted directly to the verifier, who being able to verify them without the intervention
of third parties.</p>
        </sec>
        <sec id="sec-2-1-4">
          <title>2.4. Blockchain data registry</title>
          <p>
            Several properties of the blockchain, such as decentralization, the tamper-evident and verifiable nature
of the data stored on the blockchain, align with SSI principles and make the blockchain one of the leading
solutions for supporting the creation, management, and verification of DIDs. Several DID methods
exploit the blockchain solution as a verifiable data registry where DIDs can be easily discovered and
resolved [
            <xref ref-type="bibr" rid="ref3">3</xref>
            ]. Indeed, the blockchain accounts are based on asymmetric cryptography, and each user
is able to self-create an account and use it as an identifier. The blockchain-based system ensures
that the owner of the identifier is managed directly by the user and that any associated claim can be
independently verified by providing cryptographic proofs regarding their ownership. The decentralized,
tamper-resistant nature of blockchain ensures that information about an identifier can be modified
only by the corresponding entity who controls the private key paired to the identifier. By storing
cryptographic information of identities on the blockchain, the system allows these identities to be
independently verified. In addition to support DID verification, the blockchain helps manage credentials,
such as credential revocation, in a transparent way.
          </p>
          <p>
            The did:ethr is a practical example of a DID method that uses the Ethereum blockchain as a verifiable
data registry to manage DID documents [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ]. Similarly, other methods have been developed for the
Bitcoin blockchain and various other distributed ledgers, each ofering similar features and benefits
for decentralized identity management. The did:ethr uses Ethereum address as specific DID identifier.
For this reason, each DID identifier is paired to a pair of keys generated by using Elliptic Curve
Cryptography (ECC) [
            <xref ref-type="bibr" rid="ref7">7</xref>
            ]. The private key is securely stored by the identity owner, who utilizes it
as default authentication method for proving control over the DID identifier and to assert claims.
The public key is utilized to generate the DID identifier and to verify the authentication of it. Any
modification to the default verification methods associated with a DID identifier must be communicated
to the Ethereum blockchain by sending a transaction to the smart contract ethr-did-registry1. This smart
contract allows the owner of a DID identifier to specify additional attributes of a DID or verification
methods. The resolution of a DID in did:ethr starts by querying the blockchain for any updates stored
on the ethr-did-registry smart contract by the DID owner. As a result, changes made in the
ethr-didregistry smart contract are directly reflected in the corresponding DID document during resolution.
After retrieving the necessary information from the ethr-did-registry, the DID document is constructed
of-chain.
          </p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Related Work</title>
      <p>This section provides an overview of the existing scientific contributions relevant to user
deanonymization focusing on SSI systems.</p>
      <p>
        De-anonymization in SSI systems presents significant risk of threats to the privacy and security of
personal information. Such vulnerabilities, if breached by malicious parties, can lead to track, profile,
or impersonate a user. Authors of [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ] analyze the security design aspects of DID and SSI systems and
claim that such a system must be designed so that data breaches are impossible, while also hindering
data correlation.
      </p>
      <p>
        The initial security and privacy considerations for DID were provided in the DID W3C specification
[
        <xref ref-type="bibr" rid="ref2">2</xref>
        ]. It emphasizes the importance of applying the principles of Privacy by Design [
        <xref ref-type="bibr" rid="ref9">9</xref>
        ] to all aspects
of the decentralized identifier architecture and highlights the risk of correlation attacks on DID, DID
document, and DID subject.
      </p>
      <p>
        The analisys proposed in [
        <xref ref-type="bibr" rid="ref10">10</xref>
        ] focused on the vulnerabilities that could occur when a third party who
is not the owner of a DID has the authority to modify a DID document and proposes the research
direction.
      </p>
      <p>
        Naik, Grace et al. [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] proposed a systematic model to generate attack trees that can be used to
perform risk analysis of a SSI system. The risk analysis evaluates possible identity theft attacks by using
the attack tree. The goal of a malicious actor in this context is to obtain personal data by profiling and
tracking of the user activities. In addition, the attacker can exploit the weaknesses of authentication
mechanism to access information of the user wallet or theft of personal information from a background
check service.
      </p>
      <p>
        Krul, Paik et al. [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] made an analysis concerning the threats relating to SSI credential integrity and
external actors. It shown that the selective disclosure of a credential supports unlinkability of DID, by
allowing identity owners to control what information they reveal while maintaining anonymity.
As analyzed in [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ], SSI systems that use a unique and fixed DID for each entity cannot resist to
correlation analysis between diferent services by looking at the same public key usage. Some existing
researches, such as CanDID [
        <xref ref-type="bibr" rid="ref14">14</xref>
        ], have mitigated this issue by generating distinct identifiers across
diferent services. However, they remain vulnerable against the link analysis within a single application.
Authors of [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ] provides full anonymity protection by introducing a DID committee of multiple
authorities which manage together with the identity owner the user’s real identity by using secret sharing
approach.
      </p>
      <p>
        The SPDID system proposed in [
        <xref ref-type="bibr" rid="ref15">15</xref>
        ] exploits hardware security tecnology based on PUF to allow a user
the generation of unclonable and unique information that can be used to derive cryptographic keys.
      </p>
      <sec id="sec-3-1">
        <title>1Ethereum DID Registry: https://github.com/uport-project/ethr-did-registry</title>
        <p>
          The authors of [
          <xref ref-type="bibr" rid="ref16">16</xref>
          ] propose to protect anonymity of a DID pseudonym by introducing a
Certification Authority (CA) that exploits blind signatures to issue a privacy-preserving certificate for each
pseudonym.
        </p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>4. Identifying threats to SSI anonymity</title>
      <p>Despite the privacy-preserving promises of SSI, certain elements within Decentralized Identifiers (DIDs)
can expose users to re-identification and de-anonymisation risks if not properly managed. The metadata
and the information of a DID document could potentially be exploited by malicious actors to compromise
their anonymity, inferring also sensitive information from Verifiable Credentials (VCs) and Verifiable
Presentations (VP).</p>
      <p>For this reason, it becomes crucial to analyze these elements in SSI systems to identify and mitigate
potential vulnerabilities. By understanding the ways in which anonymity could be compromised, it is
possible to develop strategies to reinforce privacy protections within SSI ecosystems.</p>
      <sec id="sec-4-1">
        <title>4.1. Anonimity in SSI</title>
        <p>SSI achieves anonymity by providing the users with control and management of digital identities without
relying on central authorities. This is accomplished through the use of DIDs and VCs to enable secure
and private interactions. A DID is a pseudonym created and owned by the users and does not reveal any
sensitive information of the entity. The DIDs are cryptographically generated by the user and stored
in decentralized fashion, without being controlled by any central authority. This decentralized nature
helps to protect the user’s privacy and ensures that control over the identifier remains entirely with the
user. In SSI systems, DIDs are used in combination with VCs, allowing users to create context-specific
credentials. With the help of the selective disclosure, the user can select which data to disclose; thus,
this ensures that only the minimum necessary data are exposed for a given transaction. Also, through
the use of zero-knowledge proofs protocol, it allows users to verify the validity of credentials or claims
without necessarily showing the actual data. The interplay of user control, selective disclosure, and
cryptography techniques ensures that users can interact with other parties maintaining their privacy
and anonymity, while still meeting the necessary requirements for identity verification and trust within
the SSI ecosystem.</p>
        <p>The degree of anonymity provided by DIDs can be compromised if they are not properly implemented
and used. For instance, repeated use of the same DID across multiple contexts can lead to linkability,
where diferent interactions can be correlated, compromising user anonymity. Similarly, although VCs
enable selective disclosure, improper implementation or the inclusion of excessive personal information
within a credential can expose users to privacy risks. In the following sections, an attacker model is
developed and a deep analysis of DID, VC and VP vulnerable fields is made.</p>
        <p>Let  denote a user in an SSI system and PID represent a pseudonymous identifier used by  (e.g.,
a DID). An adversary denoted by  aims to deanonymize  by successfully establishing a mapping
 from PID to  , that is,  : PID →  . This mapping is achieved by exploiting vulnerabilities in SSI
mechanisms, and public information about interactions, transactions, or metadata, such that  can,
with non-negligible probability, correctly associate PID with the real-world identity  .</p>
      </sec>
      <sec id="sec-4-2">
        <title>4.2. Identify vulnerabilities of SSI components</title>
        <p>
          In this section, the properties of DIDs are analyzed to identify potential vulnerabilities that could be
exploited for de-anonymization attacks. By understanding the structure and data contained within these
entities, it is possible to assess the risks associated with their use and develop strategies to mitigate them.
The level of anonymity of a DIDs impacts also VC and VP, where issuers and subjects of credentials are
typically represented by DIDs. In order to discover the vulnerabilities, we analyzed the fields contained
within DID to understand which of them are vulnerable to de-anonymization attacks. This allowed to
Source of attack Description Countermeasures
ServiceEndpoint If DID1 and DID2 have the same serviceEndpoint property, it Encryption - Hashing
is likely that DID1 = DID2. Also, if a serviceEndpoint shows a
website link, it can be attackable
publicKeyPem/ publicK- If DID2 and DID2 use the same key, it implies that both identi- Use DIDs associated with
eyHex fiers are controlled by the same entity diferent keys for each
interaction
AlsoKnowAs If DID1 and DID2 have the same alsoKnowAs property, it is Encryption - Hashing
likely that DID1 = DID2
equivalentID/ canoni- If DID1 and DID2 have the same equivalentID property, it is Encryption - Hashing
calID likely that DID1 = DID2
capabilityDelegation If DID1 and DID2 have the same capabilityDelegation property, Pay attention to the entities
it is likely that DID1 = DID2 to which delegate
verificationMethod If DID1 and DID2 have the same verificationMethod property, Unique methods for each
it is possible that DID1 = DID2 DID - Encryption - Hashing
History of a DID Having access to the history of DID document referring to the Try to provide as little
usesame DID can be a form of user trafic analysis (derived from ful information as possible
the public and standardised nature of DID) in DID documents
identify the fields to be considered as sources of attack, the type of attacks, and the countermeasures
used to mitigate the vulnerability examined.
4.2.1. Decentralized Identifiers Vulnerabilities
This section provides a detailed description of the vulnerable fields in DID documents that could be
exploited by attackers to perform de-anonymization of an entity. Table 1 summarizes the vulnerability
and the countermeasure identified for each field.
serviceEndpoint The field is used in DID documents to express ways of communicating with the
DID subject or associated entities. In particular, the serviceEndpoint property within a DID document
specifies a URL or other resource location that the DID holder wants to associate with their identifier.
This could be an API endpoint, a contact method, or any other type of service. If two diferent DIDs
share the same serviceEndpoint, it could indicate that the same entity controls both identifiers. This
weakens the anonymity of the DID holder because an attacker can compare and correlate diferent
identities based on this shared service endpoint. To mitigate this vulnerability, it is possible to encrypt
or hash with nonce the value of the serviceEndpoint, so that the information becomes unintelligible to
unauthorized parties. When the DID owner receives an interaction request, it can decide whether or
not to reveal this data to the other party.
publicKeyPem/publicKeyHex This field of a DID document contains the public key in PEM (Privacy
Enhanced Mail) or Hex format. This key is used in various cryptographic operations like verifying
signatures and ensuring the integrity of messages or transactions associated with the DID. Since the
public key itself is not secret, the usage of the same public key on diferent DIDs can lead to serious
security issues. An attacker can compare the public key used by diferent DIDs and collects the DIDs
controlled by the same public key in order to link identities. To mitigate this vulnerability, the DID
specification [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] suggests to use pairwise DIDs that are unique to each relationship.
alsoKnownAs This is an optional property for multiple identifiers for a DID subject, so this property
is used to specify other identifiers (such as usernames, URLs, or alternative DIDs) that are associated
with the same entity. If multiple DIDs have the same alsoKnownAs field, it suggests that they can be
linked or potentially controlled by the same entity and can be exploited by an attacker to link identities.
In order to mitigate this vulnerability it is possible to encrypt or hash with a nonce the alsoKnownAs
value, so that the information becomes unintelligible to unauthorized parties.
equivalentID/canonicalID These properties define equivalence relationships between diferent
variants or representations of the same DID produced by the same DID method. These properties
are intrinsic to the DID infrastructure and are trusted to the extent that the DID method, producer,
and resolver conform to the DID specification. The field equivalentID denotes other representations
of the same DID that may exist in diferent formats or naming conventions. The canonicalID field
specifies the authoritative, preferred, or "primary" representation of the DID. However, their presence
can inadvertently expose relationships between identities if the same equivalentID or canonicalID is
shared across multiple DIDs. This information can be exploited by an attacker to cross-reference and
de-anonymize the DID holder. To mitigate this vulnerability it is possible to encrypt or hash with nonce
the value of the property, to make it not accessible for unathorized users.
capabilityDelegation This property is used to specify a mechanism that might be used by the DID
subject to delegate a cryptographic capability to another party, such as delegating the authority to
access a specific HTTP API to a subordinate. An example of when this property is useful is when a
DID holder chooses to delegate their capability to access a protected HTTP API to a party other than
themselves. If multiple DIDs delegate capabilities to the same entity or if the capabilityDelegation field
is identical across diferent DIDs, it may suggest that these identities are related or controlled by a
common entity. Ensuring access to capabilityDelegation only to trusted entities reduces the risk of
de-anonymisation attacks.
verificationMethod A DID document can express verification methods, such as cryptographic public
keys, which can be used to authenticate or authorize interactions with the DID subject or associated
parties. Inside the verificationMethod field, Verification Material is present: it is any information that is
used by a process that applies a verification method. The type of verification method is expected to be
used to determine its compatibility with such processes. For example, a cryptographic public verification
method with respect to a digital signature verifies that the signer could use the associated cryptographic
private key. In addition, sharing the same verificationMethod across diferent DIDs can lead to identity
correlation, depending on how many DIDs use the same verificationMethod . Furthermore, if the same
cryptographic key or method is used by multiple DIDs, an attacker can deduce that these identities are
linked, thereby compromising the anonymity of the user. Implementing the required verificationMethod
properties or using a verificationMethod which is widely used helps prevent correlation attacks. By
doing so, the linkability of identities is minimized, preserving the anonymity and privacy of the DID
holder.
        </p>
        <p>History of a DID When a blockchain-based DID used, its history is typically recorded as a series of
transactions or updates on the blockchain. Access to the complete history of a DID can be a significant
privacy risk: an attacker performing trafic analysis might deduce patterns or behaviors based on
transactions. Limiting the use of a DID to a specific activity can efectively reduce the risk of user trafic
analysis and de-anonymisation attacks by using public blockchain data.</p>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>5. A framework for analyzing the anonymity of Ethereum-based DIDs</title>
      <p>De-anonymization attacks in Ethereum DID ecosystem are possible through a systematic approach
starting from analyzing DID documents, transactions and interactions, to create a DID profile. Figure
1 shows the workflow used to analyze the anonymity of DID by the proposed framework. The main
phases of the framework are the data acquisition, in which all the necessary data are taken, the DID
analysis, in which the DID documents and their fields are analysed based on the vunerabilities identified
in Section 4, and the graph analysis, in which the data enriched with graph formalism to perform
diferent tasks, such as the community analysis.</p>
      <sec id="sec-5-1">
        <title>5.1. Data acquisition</title>
        <p>Firstly, the address of smart contracts responsible for managing DIDs within the Ethereum blockchain
are identified. As for example, the ethr-did-registry smart contract provided by the did:ethr DID method
operates at the address 0xdCa7EF03e98e0DC2B855bE647C39ABe984fcF21B. The access to the Ethereum
blockchain is performed in order to read all transactions which invoked the ethr-did-registry smart
contract. These transactions are directly linked to DIDs because Etherum addresses are used as DID
identifiers and only the DID owner can perform transactions on the ethr-did-registry smart contract.
For this reason, we retrieved values of the sender address specified by the from field of each transaction.
Based on the specification of the did:ethr method, the Ethereum address of the sender serves as unique
DID identifier, allowing the framework resolve each DID into the corresponding DID document.
Another source of information that is important to understand the behavior and interactions of
blockchain-based DIDs are transactions initiated by DIDs using the same blockchain address specified in
the DID document. For this reason, for every DID identified in the ethr-did-registry, all the transactions
in which DIDs are involved are retrieved from the Ethereum blockchain.</p>
        <p>
          In addition to internal blockchain data, the data acquisition component extracts information related to
a DID identifier from external sources (such as block explorer and analytics platform [
          <xref ref-type="bibr" rid="ref17">17</xref>
          ]). In particular,
we collected from Etherscan2 the DID funder and the DID nametag. The DID nametag is an alternative
human-readable identifier provided by Etherscan which can be used to specify the name or alias of
the entity. The DID funder is an information obtained by Etherscan by examining the first transaction
perfomed by a DID and it indicates whether a DID is funded by major cryptocurrency platforms such
as Coinbase, Kraken, or Decentralized Exchange (DEX). This information can be used in the data
analysis to establish connections between DIDs and well-known financial entities, potentially revealing
afiliations or funding sources.
        </p>
      </sec>
      <sec id="sec-5-2">
        <title>5.2. Graph-based modeling</title>
        <p>The collected data are transformed by the framework into a graph model to enable de-anonymization
analysis. Each unique Ethereum address collected during data acquisition is represented as a node
in the graph, and an edge is created between two nodes whenever a transaction occurs between the
corresponding addresses. The edges are directed, reflecting the direction of the transaction from the
source DID to the target DID, and the weight of each edge is determined by the number of times a
particular operation occurred between the source and target DIDs. If multiple transactions of the same
operation occur between the same pair of addresses, the counts are aggregated to reflect the total
frequency, indicating how often interactions happened between two specific users.
Each node in the graph is enriched with a set of attributes derived from both blockchain data and</p>
        <sec id="sec-5-2-1">
          <title>2Etherscan: https://etherscan.io/</title>
          <p>external services. These attributes include the DID document, DID nametag, DID funder, and other
relevant information related to a DID.</p>
        </sec>
      </sec>
      <sec id="sec-5-3">
        <title>5.3. Data analysis</title>
        <p>The data analysis component conducts vulnerability detection and graph analysis on the model to
identify potential risks and patterns of de-anonymization. It examines how these DIDs interact within
diferent communities and the types of operations performed by each.</p>
        <p>DID Vulnerabilities Detection This component indicates vulnerable fields from a DID document
based on the analysis presented in Section 4, such as serviceEndpoint, alsoKnownAs or other metadata
informations that might link a DID to a real-world identity or a recognizable entity. In addition to
identify vulnerabilities in the DID document, the component is able to evaluate the distribution of the
operations made by DIDs on the DID document by analyzing the transactions on the ethr-did-registry
smart contract.</p>
        <p>Graph Analysis Graph analysis is chosen because it serves as a powerful tool for understanding
the unique attributes and behaviors associated with each DID. By constructing and analyzing a graph
representing the interactions and relationships of DIDs, it becomes possible to uncover specific patterns
and characteristics that are distinctive to each DID. These insights enable the creation of detailed profiles,
facilitating the process of de-anonymization by associating behaviors, operations, and connections to
potential real-world entities or contexts.</p>
        <p>For this reason, the framework is able to compute general graph metrics: such as measures the number
of nodes and edges, how closely the nodes in a graph are connected (density), assesses the degree
to which nodes in a graph tend to cluster together (Clustering coeficient), quantifies the strength of
division of a graph into communities (Modularity), measures the uniformity of a graph’s connections
within communities (Homogeneity), examines the tendency of nodes to connect with similar nodes
(Assortativity).</p>
        <p>Another important technique provided by the framework for the analysis of the DIDs is based on
centrality. Centrality measures allow to identify key entities or operations, and their role within the
system. For this reason, the framework includes various measures, such as degree, betweenness, and
closeness centrality that indicate the importance or influence of a node within the graph.</p>
        <p>The proposed framework also integrates a community detection algorithm based Louvain method
which is able to group the DIDs into distinct communities. The community analysis of DIDs can
provide important information about the intractions and behavior of DIDs and can be used to extract
informations the entities with which a DID has frequently interacted and belongs to the same community.
In addition, community detection allows to identify the type of activities a DID is involved in and the
platforms or entities it interacts with. For example, if a DID is involved in particular tokens, it is possible
to infer some behavioural information. Similarly, investments in niche tokens or markets could reveal
personal interests or financial positions.</p>
        <p>By combining the blockchain data (transactions, token), external data (such as nametage and funders),
and potential vulnerabilities in the DID document, it is possible to build a detailed profile of a DID. Such
profile can be enriched by using information related to the behavior, associations, and metadata.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>6. Experimental Results</title>
      <p>This section presents the results of the analysis conducted on Ethereum DIDs ecosystem by exploiting
an implementation of the proposed framework3.
3Available at https://github.com/Breian/DLT2025---Assessing-the-Anonymity-of-DIDs-in-Self-Sovereing-Identity.git.
(a) DID’s operations</p>
      <p>(b) Targets of DID’s operations
(c) DIDs verification methods</p>
      <sec id="sec-6-1">
        <title>6.1. Results of DID Vulnerabilities analysis</title>
        <p>We present the results of the DID Vulnerabilities analysis by analyzing the distribution of the vulnerable
ifelds in DID document and operation obtained by a total of 31714 transactions performed on the
ethr-did-registry smart contract by DID owners.
6.1.1. DID documents
The transactions list allow the resolution of 3613 distinct DID documents. The results reveal that
attributes versionId and updated of a DID document occur very frequently (3259 DID documents specify
these attributes), suggesting that most of the DID owners have versioned their DID document and
have updated them at least once since their creation. The DID vulnerabilities analysis also reveals the
presence of the attributes serviceEndpoint, publicKeyBase58 and publicKeyHex, that could potentially
expose sensitive information of 10 diferent DID documents over 3613. The distribution of these fields
within the collected dataset is shown in Figure 2c.</p>
        <p>
          The public key fields publicKeyBase58 or publicKeyHex are used by few DID documents in order to
specify a diferent authentication key based on either EdDSA algorithm [
          <xref ref-type="bibr" rid="ref18">18</xref>
          ] or compressed ECDSA
secp256 [
          <xref ref-type="bibr" rid="ref19">19</xref>
          ]. In addition, the specified keys are unique and it is not possible to correlate the DID
with other DID documents using the same keys. The serviceEndpoint attribute describes the service
endpoint and it reveals diferent types of information about the DID owner. All the DID documents have
specified as a value for serviceEndpoint an unencrypted value, while some DID documents (2) specify
an authenticated value (using JWT [
          <xref ref-type="bibr" rid="ref20">20</xref>
          ]). The majority of DID documents (6) use a publicly accessible
web url or an email as serviceEndpoint. However, the website url and email are vulnerable because an
adversary can use it to perform a phishing attack or to access relevant information for identifying the
DID owner. Indeed, such website urls reveal relationships between the DID owner and other entities,
such as projects (uPort), a web resource on IPFS [
          <xref ref-type="bibr" rid="ref21">21</xref>
          ], an application (HerokuApp), a cloud provider
(https://talao.co), or a web service (https://travel-rule-protocols.notabene.dev/). Some DID documents
(2) specify as serviceEndpoint a JWT that can protect the authenticity and integrity of data. However,
data confidentiality is not guaranteed because the DID vulnerabilities analysis reveal that such JWT
represents a verifiable presentation of a Texas-NotaryCredential, issued by a recognized entity named
        </p>
        <sec id="sec-6-1-1">
          <title>BillyCaseworker.</title>
          <p>The vulnerabilities of the verification method across the DID documents are identified by
examining the verificationMethod ifeld of each DID and checking if one method is similar or
identical to other DID documents. The verification methods used in DID documents are
EcdsaSecp256k1RecoveryMethod2020, X25519KeyAgreementKey2019, and EcdsaSecp256k1VerificationKey2019 .
The EcdsaSecp256k1RecoveryMethod2020 verification method is used by 99% of the analysed DIDs and it
is an ECDSA algorithm based on the Secp256k1 curve. The method X25519KeyAgreementKey2019
is used by only one DID to specify a elliptic curve key agreement algorithm while
EcdsaSecp256k1VerificationKey2019 is used by 2 DIDs to specify another ECDSA method using based
on secp256k1 curve. The analysis of the verificationMethod reveals that the majority of DID documents
do not introduce any vulnerabilities and do not share other relevant information.
6.1.2. DID operations
Another information provided by the DID vulnerability analysis is the type of transactions executed by
DID owner on the Ethereum Blockchain and the entity to which this transaction is intended. Figure
2a shows the top 10 most executed operations by DID owners. The approve operation is the most
frequently performed across all DIDs, allowing the DID to manage tokens by granting permission for
another entity (contract or individual) to transfer a specified amount of tokens on their behalf. The
transfer operation represents asset movement and refers to the direct transfer of tokens or assets from
a DID. The Swap Exact Tokens For Tokens and Swap Exact Tokens For ETH are used to manage liquidity
by exchanging one type of token for another or for Ether. The Set Approval For All is used by a DID to
authorize an operator to manage all of their assets while the Set Obo Approval For All operation is used
to set approval for all actions on behalf of another party. Operations like Withdraw, Execute and Claim
are less frequent for DIDs and they are used for the execution of transactions or functions in smart
contracts, for claiming rewards, tokens, or assets that may have been locked or earned through a DeFi
protocol. The mint operation involves creating new tokens or assets and it suggests that some DIDs
have responsibility in token creation.</p>
          <p>Figure 2b shows the 10 most frequent targets of the operations made by DIDs. In general, trading
platforms and Exchangers (such as Uniswap) are the targets of the most part of the transaction performed
by DIDs. The most frequent target of transactions is Router 2 smart contract, which is used to facilitate
liquidity management within the Uniswap V2 protocol. Another traiding platform that is frequently
used by DIDs is the EtherDelta platform. The MKT Token smart contract indicates a considerable
amount of activity related to token or operations associated with the MakersPlace platform. Similarly,
the BAE Token and the Wyvern Exchange are exchangers related to the blockchain crypto-art ecosystem
and they refer to BlockchainArtExchange and OpenSea (two of the most important NFT marketplace
platforms). Stablecoins (sush as USDT, USDC, and DAI) represent another main target for several DID
owners, which use them as a liquidity, trading, and exchange medium. The Ethereum Name Service
(ENS) is a distributed naming system which allows to map human-readable names to machine-readable
identifiers to Ethereum entities (e.g., addresses or cryptocurrency). Finally, another important target
for DID activities is the TRB Token smart contract provided by Tellor, which is focused on providing
oracle-related token. The presence of OpenSea and TRB Token suggests that NFT marketplaces and
oracle services are an important part of the observed transactions.</p>
        </sec>
      </sec>
      <sec id="sec-6-2">
        <title>6.2. Graph-based Analysis</title>
        <p>The graph-based analysis considers the graph of transactions performed by each DID towards other
DIDs or Ethereum addresses and consists of 31714 nodes and 74654 edges. Table 2 shows the number of
nodes, the number of edges, the density, the assortativity, and the clustering coeficient (Clust. Coef.) of
each community. The metrics suggest that the graph is disassortative and sparse with moderate strong
community structures, where most interactions occur within distinct groups, and a few highly connected
nodes serve as hubs interacting with many smaller, less connected entities. In particular, the low density
value means that the network is sparsely connected,and the low value of the clustering coeficient
indicates that most DIDs interact individually with other entities without forming interconnected
groups, while homogeneity indicates that most connections are internal to communities.</p>
        <p>The most central DIDs in terms of degree, betweenness, and closeness centrality are also evaluated in the
graph, showing the diferent roles in the Ethereum blockchain ecosystem. The most central DIDs belong
to key participants or infrastructure entities enabling important functions, such as liquidity management,
governance operations, token transfer, and asset control. Several of the top DIDs, particularly those with
high closeness and betweenness centrality, are essential to the DeFi ecosystem, like Uniswap V2: Router
2, Circle: USDC Token, Maker: Dai Stablecoin and CH DAO: Deployer, which helps to manage governance
tokens, liquidity, and the decision-making processes of DAOs. Instead, DIDs with high degree centrality
demonstrate high engagement in NFT minting and token management, like MakersPlace: MKT Token,
which is a significant actor in the NFT marketplace, and coopahtroopa.eth, that is another active
participant in the DeFi and NFT space.
6.2.1. Communities Analysis
The results of the community detection performed with the Louvain algorithm identified a total
number of 30 communities (1, . . . , 30) in the graph. For each community, we computed the density,
assortativity, and clustering coeficient to better understand the structural characteristics of each
community. Table 3 summarizes the structure of the communities based on the evaluated metrics.
The majority of communities (12, 15, 17, 19, 20, 23, 24, 25, 27, 28, 30) consist of few participants
and interactions (at most 100 nodes and 100 edges), have sparse connections and hierarchical structure
resulting from both a very low densitity value between 0 and 0.0073, a high nevative assortativity
value between -1 and -0.7, and a zero cluestering coeficient. Some of these very small communities
are centered around specific assets, such as the community 19 which is centered around the Falcon
Project: Voucher and community 25, which is centered on the minting of NFTs and other digital assets.
Communities 21, 26, 29, and 18 have a small number of participants and interactions (i.e., the
number of nodes and edges of each community is included between 100 and 500) and expose a low
value of density. In particular, the high negative value of assortativity and the zero clustering coeficient
suggest that the communities 21, 26, and 29 are hierarchically structured. In contrast, community
18 exposes a negative value (between -0.7 and -0.3) of assortativity and a low cluestering coeficient
(between 0.001 and 0.01).</p>
        <p>Another large group of communities with significant participants and interactions are
2, 5, 6, 7, 8, 9, 14, and 16. The number of nodes in such communities ranges from 500
to 2000 while the number of edges ranges from 1000 to 5000. All these communities expose a very low
value of density and a hierarchical structure, while only half of them (2, 8, 9, 14) expose a very low
value of clustering (below 0.001) suggesting sparse local interconnectedness and rare formation of
triangles. Most of these communities demonstrate centralized patterns, in which one or a few dominant
DIDs are the central hub of most operations. In general, these DIDs execute central operations, such as
transfer, approval, and governance actions, often against DeFi platforms, NFT markets, or other DApps.
The communities 1, 4, 11, 13, and 22 consist of a large number of participants and interactions
(the number of nodes is greater than 2000 and the number of nodes is greater than 5000). The low
density value and the positive value of the clustering coeficient indicate the presence of some cohesive
subgroups in each community. In particular, the cluestering coeficient of the community 22 ranges
between 0.001 and 0.1, where a central DID exposes the role in governance management by performing
the majority of transfers and confirm/exec transactions.</p>
        <p>The analysis of structural metrics (such as centrality) combined with the underlying community
structure, provides valuable insights into the behavioral patterns and functional roles of entities within
the network. These metrics help uncover how entities interact, whether they act as central coordinators,
peripheral participants, or bridges between subgroups, and it is particularly useful in contexts of
de-anonymization.</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>7. Conclusions and future work</title>
      <p>In this paper, a framework for analyzing the anonymity of DIDs has been proposed. The approach
focused on blockchain-based DIDs and leverages transaction data, DID document analysis, and
graphbased analysis to reveal hidden correlations between user activities and personal attributes. The
proposed framework was used to assess the anonymity properties of a DID implementation based on
Ethereum, allowing to successfully derive information related to a real identities of 30 DIDs.</p>
      <p>In several cases, DIDs are immediately de-anonymised through explicit information obtained from
the blockchain or from external sources of information (e.g., block explorer platform). Collectively, these
results illustrate that while SSI in Ethereum is designed to provide users with complete control over
their identities, the transparency of blockchain transaction data, when combined with graph analytics
and community detection methods, can reveal information of the entity behind a DID.
As a direction for future research, it is essential to refine the proposed methodology by enhancing
its analytical capabilities through the integration of AI approach for inferring information from DIDs
and explore the application of a framework to cross-chain schenario where DIDs belong to diferent
blockchains.</p>
    </sec>
    <sec id="sec-8">
      <title>Acknowledgments</title>
      <p>This work was partially supported by project SERICS (PE00000014) under the MUR National Recovery
and Resilience Plan funded by the European Union - NextGenerationEU.</p>
    </sec>
    <sec id="sec-9">
      <title>Declaration on Generative AI</title>
      <sec id="sec-9-1">
        <title>The author(s) have not employed any Generative AI tools.</title>
      </sec>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Tobin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <article-title>The inevitable rise of self-sovereign identity</article-title>
          ,
          <year>2016</year>
          . URL: https://sovrin.org/ wp-content/uploads/2018/03/The-Inevitable-
          <article-title>Rise-of-</article-title>
          <string-name>
            <surname>Self-</surname>
          </string-name>
          Sovereign-Identity.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sporny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Longley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Sabadello</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Reed</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Steele</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Allen</surname>
          </string-name>
          ,
          <article-title>Decentralized identifiers (dids) v1.0 - core architecture, data model, and representations</article-title>
          ,
          <year>2022</year>
          . URL: https://www.w3.org/TR/did-1.0/.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Q.</given-names>
            <surname>Stokkink</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Pouwelse</surname>
          </string-name>
          ,
          <article-title>Deployment of a blockchain-based self-sovereign identity, in: 2018 IEEE international conference on Internet of Things (iThings) and IEEE green computing and communications (GreenCom) and IEEE cyber, physical and social computing (CPSCom) and IEEE smart data (SmartData)</article-title>
          , IEEE,
          <year>2018</year>
          , pp.
          <fpage>1336</fpage>
          -
          <lpage>1342</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>C.</given-names>
            <surname>Allen</surname>
          </string-name>
          ,
          <article-title>The path to self-sovereign identity</article-title>
          ,
          <year>2016</year>
          . URL: https://www.lifewithalacrity.com/article/ the-path
          <article-title>-to-self-soverereign-identity/.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Uport</surname>
          </string-name>
          , Ethr-did library,
          <year>2025</year>
          . URL: https://github.com/uport-project/ethr-did.
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>M.</given-names>
            <surname>Sporny</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Longley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Chadwick</surname>
          </string-name>
          ,
          <article-title>Verifiable credentials data model 1.0 - expressing verifiable information on the web</article-title>
          ,
          <year>2019</year>
          . URL: https://www.w3.org/TR/vc-data
          <source>-model-1</source>
          .0/.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>G.</given-names>
            <surname>Wood</surname>
          </string-name>
          , et al.,
          <article-title>Ethereum: A secure decentralised generalised transaction ledger</article-title>
          ,
          <source>Ethereum project yellow paper 151</source>
          (
          <year>2014</year>
          )
          <fpage>1</fpage>
          -
          <lpage>32</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>C. N.</given-names>
            <surname>Butincu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Alexandrescu</surname>
          </string-name>
          ,
          <article-title>Design aspects of decentralized identifiers and self-sovereign identity systems</article-title>
          ,
          <source>IEEE Access 12</source>
          (
          <year>2024</year>
          )
          <fpage>60928</fpage>
          -
          <lpage>60942</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>A.</given-names>
            <surname>Cavoukian</surname>
          </string-name>
          , et al.,
          <article-title>Privacy by design: The 7 foundational principles</article-title>
          ,
          <source>Information and privacy commissioner of Ontario, Canada</source>
          <volume>5</volume>
          (
          <year>2009</year>
          )
          <fpage>12</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>M.-H. Rhie</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-H. Kim</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          <string-name>
            <surname>Hwang</surname>
          </string-name>
          ,
          <string-name>
            <surname>K.-H. Kim</surname>
          </string-name>
          ,
          <article-title>Vulnerability Analysis of DID Document's Updating Process in the Decentralized Identifier Systems</article-title>
          , in: 2021
          <source>International Conference on Information Networking (ICOIN)</source>
          ,
          <source>IEEE Computer Society</source>
          , Los Alamitos, CA, USA,
          <year>2021</year>
          , pp.
          <fpage>517</fpage>
          -
          <lpage>520</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>N.</given-names>
            <surname>Naik</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Grace</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Jenkins</surname>
          </string-name>
          ,
          <article-title>An attack tree based risk analysis method for investigating attacks and facilitating their mitigations in self-sovereign identity</article-title>
          ,
          <source>in: 2021 IEEE Symposium Series on Computational Intelligence (SSCI)</source>
          ,
          <year>2021</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>E.</given-names>
            <surname>Krul</surname>
          </string-name>
          , H.-y. Paik,
          <string-name>
            <given-names>S.</given-names>
            <surname>Ruj</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S. S.</given-names>
            <surname>Kanhere</surname>
          </string-name>
          , Sok:
          <article-title>Trusting self-sovereign identity</article-title>
          ,
          <source>Proceedings on Privacy Enhancing Technologies</source>
          <year>2024</year>
          (
          <year>2024</year>
          )
          <fpage>297</fpage>
          -
          <lpage>313</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Liu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Zhao</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ran</surname>
          </string-name>
          ,
          <string-name>
            <given-names>X.</given-names>
            <surname>Lin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.</given-names>
            <surname>Guan</surname>
          </string-name>
          , et al.,
          <article-title>Fully anonymous decentralized identity supporting threshold traceability with practical blockchain</article-title>
          ,
          <source>in: THE WEB CONFERENCE</source>
          <year>2025</year>
          ,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>D.</given-names>
            <surname>Maram</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Malvai</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Zhang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Jean-Louis</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Frolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Kell</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Lobban</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Moy</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Juels</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Miller</surname>
          </string-name>
          ,
          <article-title>Candid: Can-do decentralized identity with legacy compatibility, sybil-resistance, and accountability</article-title>
          ,
          <source>in: 2021 IEEE Symposium on Security and Privacy (SP)</source>
          , IEEE,
          <year>2021</year>
          , pp.
          <fpage>1348</fpage>
          -
          <lpage>1366</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>Y.</given-names>
            <surname>He</surname>
          </string-name>
          ,
          <string-name>
            <given-names>W.</given-names>
            <surname>Fan</surname>
          </string-name>
          ,
          <string-name>
            <given-names>K.</given-names>
            <surname>Inoue</surname>
          </string-name>
          ,
          <article-title>Spdid: A secure and privacy-preserving decentralized identity utilizing blockchain and puf</article-title>
          ,
          <source>in: 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)</source>
          , IEEE,
          <year>2024</year>
          , pp.
          <fpage>1622</fpage>
          -
          <lpage>1631</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>J. S.</given-names>
            <surname>Shin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Choi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Jo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.-H.</given-names>
            <surname>Lee</surname>
          </string-name>
          ,
          <article-title>A new distributed, decentralized privacy-preserving id registration system</article-title>
          ,
          <source>IEEE Communications Magazine</source>
          <volume>59</volume>
          (
          <year>2021</year>
          )
          <fpage>138</fpage>
          -
          <lpage>144</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>A. De Salve</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          <string-name>
            <surname>Brighente</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <string-name>
            <surname>Conti</surname>
          </string-name>
          ,
          <article-title>Edit: A data inspection tool for smart contracts temporal behavior modeling and prediction</article-title>
          ,
          <source>Future Generation Computer Systems</source>
          <volume>154</volume>
          (
          <year>2024</year>
          )
          <fpage>413</fpage>
          -
          <lpage>425</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>S.</given-names>
            <surname>Josefsson</surname>
          </string-name>
          ,
          <string-name>
            <surname>I. Liusvaara</surname>
          </string-name>
          ,
          <article-title>Edwards-curve digital signature algorithm (EdDSA)</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>D.</given-names>
            <surname>Johnson</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Menezes</surname>
          </string-name>
          ,
          <string-name>
            <surname>S. Vanstone,</surname>
          </string-name>
          <article-title>The elliptic curve digital signature algorithm (ecdsa</article-title>
          ),
          <source>International journal of information security 1</source>
          (
          <year>2001</year>
          )
          <fpage>36</fpage>
          -
          <lpage>63</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>M.</given-names>
            <surname>Jones</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bradley</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sakimura</surname>
          </string-name>
          ,
          <article-title>Json web token (jwt)</article-title>
          ,
          <source>Technical Report</source>
          ,
          <year>2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>J.</given-names>
            <surname>Benet</surname>
          </string-name>
          ,
          <article-title>Ipfs-content addressed, versioned, p2p file system</article-title>
          ,
          <source>arXiv preprint arXiv:1407.3561</source>
          (
          <year>2014</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>