Solid Secret Credential for Blockchain

Hitoshi Kokumai
3 min readNov 15, 2021

Today’s topic is this report — “How blockchain technology can create secure digital identities” https://ibsintelligence.com/blogs/how-blockchain-technology-can-create-secure-digital-identities/

The title of this report reads “How blockchain technology can create secure digital identities”. I would have made it read “How blockchain technology, when it comes with solid secret credentials, can create secure digital identities”.

“How come?”

The lock authenticates the key and the key authenticates the lock. But neither the key nor the lock authenticates the person who holds the lock or key. It is imperative to check the secret credential of the person who claims to be the owner of the lock or key. It’s so plain and simple.

“Conventional text passwords are too hard to manage and yet too vulnerable to abuse?”

Then, why not look at non-text secret credentials?

For more, please refer to “Why the password isn’t an enemy of people”

Key References

Bring a healthy second life to legacy password systems

For Achieving Solid Digital Identity on Information Security Buzz (Mar/2021)

What We Know for Certain about Authentication Factors

Digital Identity for Global Citizens

Image-to-Code Conversion by Expanded Password System

Summary and Brief History — Expanded Password System

Proposition on How to Build Sustainable Digital Identity Platform

Account Recovery with Expanded Password System

Additional References

Removal of Passwords and Its Security Effect

Step-by-Step Analysis of Why and How Biometrics Brings Down Security

Negative Security Effect of Biometrics Deployed in Cyberspace

External Body Features Viewed as ‘What We Are’

History, Current Status and Future Scenarios of Expanded Password System

Availability-First Approach

Update: Questions and Answers — Expanded Password System and Related Issues

< Videos on YouTube>

Slide: Outline of Expanded Password System (3minutes 2seconds)

Digital Identity for Global Citizens (10minutes — narrated)

Demo: Simplified Operation on Smartphone for consumers (1m41s)

Demo: High-Security Operation on PC for managers (4m28s)

Demo: Simple capture and registration of pictures by users (1m26s)

Slide: Biometrics in Cyber Space — “below-one” factor authentication

--

--

Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.