Agentic AI–Based Federated-Identity Orchestration for Universal Digital Wallets
Keywords:
federated identity, autonomous agents, OAuth, digital wallets, zero-knowledge proofs, decentralized identifiersAbstract
The aim of this paper is to presents an agentic AI-driven global digital wallet based on federated-identity orchestration system. Autonomous agents dynamically negotiate OAuth scopes, rotate cryptographic keys, and develop real-time trust across identity issuers, networks, and wallet providers in real-time. The proposed solution speeds up handshakes while providing cryptographic zero-knowledge authentication for privacy.
Downloads
References
D. Hardt, “The OAuth 2.0 Authorization Framework,” RFC 6749, Oct. 2012.
P. Hallam-Baker and E. Maler, “Verifiable Credentials Data Model 1.0,” W3C Candidate Recommendation, Jan. 2021.
J. Bradley et al., “OpenID Connect Core 1.0,” OpenID Foundation, Nov. 2014.
T. Lodderstedt, D. Preuss, and M. Hildebrand, “OAuth 2.0 Security Best Current Practice,” IETF Internet-Draft, 2020.
M. Sporny et al., “Decentralized Identifiers (DIDs) v1.0,” W3C Recommendation, Nov. 2020.
R. Sandhu et al., “Role-Based Access Control Models,” IEEE Computer, vol. 29, no. 2, pp. 38–47, Feb. 1996.
Y. Lindell and B. Pinkas, “Secure Multiparty Computation for Privacy-Preserving Data Mining,” J. Privacy and Confidentiality, vol. 1, no. 1, 2009.
C. Cachin and R. Vukolić, “Blockchain Consensus Protocols in the Wild,” arXiv:1707.01873, 2017.
A. Shamir, “How to Share a Secret,” Communications of the ACM, vol. 22, no. 11, pp. 612–613, Nov. 1979.
FIDO Alliance, “FIDO2: Web Authentication: An API for accessing Public Key Credentials Level 1,” 2018.
S. Nakamoto, “Bitcoin: A Peer-to-Peer Electronic Cash System,” 2008.
N. Zyskind, O. Nathan, and A. Pentland, “Decentralizing Privacy: Using Blockchain to Protect Personal Data,” IEEE Security & Privacy, vol. 16, no. 4, pp. 24–31, 2018.
P. Koshy, D. Koshy, and P. McDaniel, “An Analysis of Anonymity in Bitcoin Using P2P Network Traffic,” in Proc. IEEE INFOCOM, 2014.
C. J. Mitchell, “Security and Privacy Considerations in Federated Identity Management,” IEEE Security & Privacy, vol. 12, no. 5, pp. 18–25, Sept.-Oct. 2014.
L. Kagal, T. Finin, and A. Joshi, “Trust-Based Security in Collaborative Agent Systems,” in Proc. IEEE Int. Conf. on Information Reuse and Integration, 2001.
M. Blaze, J. Feigenbaum, and J. Lacy, “Decentralized Trust Management,” in Proc. IEEE Symposium on Security and Privacy, 1996.
B. Schneier, “Applied Cryptography: Protocols, Algorithms, and Source Code in C,” 2nd ed., Wiley, 1996.
D. Chaum, “Blind Signatures for Untraceable Payments,” Advances in Cryptology, CRYPTO 1983.
R. C. Merkle, “Protocols for Public Key Cryptosystems,” in Proc. IEEE Symposium on Security and Privacy, 1980.
E. Bertino and N. Shang, “Privacy-Preserving Access Control in Federated Identity Management,” IEEE Computer, vol. 45, no. 9, pp. 24–31, Sept. 2012.