1 of 10

Presenter :

2022 Hackathon | ETH Seoul

@Soul Tag

Team Unchain

2 of 10

  • Untransmittable NFT (Soul Bound Token) with encrypted personal information

  • A protocol that can identify objects and protect confidentiality and personal information by containing encrypted personal information contained therein and even a recovery method for it were presented.

  • Through this protocol, we can achieve self-subscription identity (SSI).

What is @Soul Tag?

3 of 10

Two protocols for SSI realization using @Soul Tag

  1. Minimum responsibility protocol with confidentiality and anonymity without the use of stealth addresses

  1. minimal anonymity means anonymity that is difficult to specify on the off-chain. It is not intended to ensure anonymity by using stealth addresses for unique identifiers on the on-chain.
  2. The anonymity achieved using stealth addresses can achieve complete confidentiality, but I think this is highly likely to be socially abused.
  3. we think that at least the information of the origin and destination addresses where encrypted personal information has been moved should be disclosed.

4 of 10

Two protocols for SSI realization using @Soul Tag

  1. We also used asymmetric keys to encrypt content for authentication. The authorizing party used its private key to sign and re-save documents on the blockchain that disclose the public key, which is the signature verification method. Here, claims are encrypted with the holder's private key, so only the party to the personal information can open it, so personal information control is completely possible.

  • The control of personal information sovereignty can be achieved once again by selectively disclosing such issued sbt in the future.

5 of 10

Recovery Model

6 of 10

Two protocols for SSI realization using @Soul Tag

2. Unresponsible protocol with confidentiality and anonymity using stealth addresses

  • This protocol achieves full anonymity and confidentiality through stealth addresses that do not disclose addresses.

  • Since the address cannot be specified, the personal information contained in the delivered sbt can be completely protected. However, the problem is that people who use the protocol for malicious purposes cannot also be tracked. Therefore, the use of protocol 1 is recommended rather than this method of using stealth addresses in order to proceed in the right direction.

7 of 10

Strategies and Benefits of Using @Soul Tag

  • Benefits

1. Token (NFT) containing personal information

  • a protocol that can identify objects, protect confidentiality and personal information through selective disclosure.

2. Ensuring control of personal information and identification

  • if we only show this Soul Tag, we can selectively show our identity information, guaranteeing my privacy control and identity authentication.

3. An easy ticket and souvenir

  • The Soul Tag may serve as one electronic ticket and badge.

8 of 10

Strategies and Benefits of Using @Soul Tag

  • Strategies

1. A disposable ticket that guarantees anonymity and authentication

  • Personal information protection authentication can be achieved by issuing sbt for disposable tickets and disclosing minimal information necessary for authentication.

2. A disposable identification card that can guarantee anonymity and authenticate yourself

  • Disposable ID cards for refugees (refugees can reach identification and anonymity only with SBT issued)

3. Anonymous electronic voting

  • Since transmission is impossible, one's rights cannot be transferred, and they can be identified only by SBT ownership.

9 of 10

Demo Video

10 of 10

Brought to you by

OHEL / OHEL / OHEL

2022 Hackathon | ETH Seoul

Thank you

End of presentation