What is Cypherium
Cypherium an instant ledger to process real-time transactions for billions of users and a trusted database to connect CBDCs, digital assets, and dApps around the world.
By providing a truly decentralized and scalable framework, combined with an accessible and intuitive user interface, Cypherium lays a comprehensive foundation for developers to create groundbreaking apps capable of transforming the future of business, law, and enterprise solutions.
Digital Identity
Digital identity is now often used in ways that require data about persons stored in computer systems to be linked to their civil, or national, identities. Furthermore, the use of digital identities are now so widespread that many discussions refer to “digital identity” as the entire collection of information generated by a person’s online activity. This includes usernames and passwords, online search activities, birth date, social security, and purchasing history. Especially where that information is publicly available and not anonymized, and can be used by others to discover that person’s civil identity. In this wider sense, a digital identity is a version, or facet, of a person’s social identity. This may also be referred to as an online identity. With self-sovereign identity (SSI) the user has a means of generating and controlling unique identifiers as well as some facility to store identity data.
The protection of private data remains a big challenge in modern cybersecurity. Traditional centralized data servers have become easy targets of cyber criminals and In the past few years, massive data leaks of big enterprises including Facebook, Yahoo, Marriott and so on, have resulted in billions of user data records being stolen and insurmountable financial losses. As software and devices become more and more complex, it is practically impossible to eliminate all security vulnerabilities in a system.
A new form of identity must be implemented to prevent further data breaches.
Distributed Ledger Technology (DLT) is a protocol that enables the secure functioning of a decentralized digital database.
Distributed networks eliminate the need for a central authority to keep a check against manipulation.
DLT allows for storage of all information in a secure and accurate manner using cryptography.
The Decentralized Identifiers (DIDs) is a standard facilitated by the Internet body World Wide Web Consortium (WC3) that allows users to own and manage their personal data.
Cypherium can fully incorporate with open identity protocols including, but not limited to, the DID standard.
Cypherium’s technology separates these two processes into two distinct blockchains of electing a leader who is responsible for generating the newest block and verifying the transaction data that exists within the block body.
An election chain chooses Proof-of-Work leaders to write new blocks, while a transaction chain uses HotStuff consensus to verify the transaction data within those blocks. Building off Bitcoin-NG and ByzCoin protocols, the Cypherium blockchain is optimized for both on-chain scalability & permission-less mine-ability through this hybrid approach to consensus.
The Interface layer of the Cypherium blockchain provides the basic blockchain application interface in the upper layer such as merchants, users, identity service providers, regulatory bodies so that the interface layer can provide basic identity authentication service.
The interface layer and service layer together create a trusted model and provide basic blockchain services for external applications. This model will disrupt existing centralized identity management systems and at the same time take into account the needs of user privacy protection and supervision requirements by regulatory bodies.
User authentication process flowchart is as follows:
The merchant sends a randomized challenge to the user and requests the user to authenticate data requested base on there policy requirement/agreements, According to the authentication request, the user selects the data attributes authenticated by the identity service provider from his end to fulfill policy requirements and the user provides signatory, uses his public key to cryptographically hash attribute data requested by the merchant and provides a public key provided by the identity service provider and other related information to the merchant and according to the information given by the identity service provider, merchant requests for the public key of the user, blockchain ‘authentication’ information and other related information.
Identity service provider responds to information requested by the merchant and merchant’s end application automatically scouts the blockchain for ‘authentication’ information.
Merchant hashes the supporting data provided by the user and compares it to the blockchain ‘authentication’ proof publicly signed by the identity service provider in order to verify the validity of the ‘authentication’ information and after verification success, user data are not stored locally but stored through an encryption through hashing of valid data and adding of signatory properties, thereby creating new ‘authentication proof’ (with timestamps and other metadata) and sent to the blockchain for record keeping.
Note that on user authentication success will be sent.
Through identity registration and authentication protocol, Cypherium uses asymmetrical cryptography to ensure the security of the value transfer when users, merchants, identity service providers are exchanging information. The sender must use his private key to decrypt the data, then encrypt the data using the recipient’s public key and send it over to the recipient. The recipient must authenticate the data using the sender’s public key and finally uses his private key to decrypt the data.
Step 2 in the authentication process exhibits the user’s control and permission to his own data. Trust being realized through the decentralized exchange of data through the blockchain is exhibited in step 8 in the process where the ‘authentication proofs’ signed and stored in the blockchain in the authentication by the current merchant can be used by other merchants when they want to authenticate the same user.
A protocol that considers all participant’s registration and authentication needs is made possible due to the base infrastructure Cypherium provides.
Leveraging on the Cypherium blockchain service module which enhances the reliability and anti-attack capabilities of the system to realize a decentralized user data management.
Using Cypherium smart contract module.
Smart contracts have become viable only through the advent of blockchain technology, and its characteristic advantages of decentralization, tamper-resistance, and high reliability. On-chain smart contracts go through a three-tiered workflow, which enables permissionless transactions between any network participants: construction, storage, and execution and at Cypherium where we are able to customize scenarios to create ‘contracts’ that fulfill the requirements of both parties therefore, using code to enforce conduct and law is not too distant from us anymore and it can better assure fairness. Administrator management module maintains the order of all participants and increases the scalability of the system.
Under the Cypherium framework, the exchange of information between systems will not be interrupted by compatibility and mutually exclusivity issues which would result in high cost and difficulty in connection. As all systems use the same technology protocol, rules of authentication between participants will strictly follow the protocol consensus written into the blockchain and cannot be tampered with.
Programmability of Cypherium smart contract can allow complete automation of the authentication process customized based on different scenarios set by the management organization. Through embedded preset authentication rules programmed into the smart contract, the authentication can be automatically completed if all the preset requirements are fulfilled. This increases user experience and work efficiency.