Ndikpongke
3 min readMar 21, 2022

THE THINKIUM IDENTITY AND AUTHENTICATION.

Thinkium is a blockchain network, which achieves unlimited scalability at a linear cost by running through a multi-layer multi-chain structure.

Thinkium uses multi-chain layered architecture structure to solve the impossible triangle problem in blockchain technology

Thinkium Identity and Authentication

Thinkium is a comprehensive public chain network initiated and promoted by the Thinkium Foundation and a layered multi-chain structure. It integrates various technologies of lay1+layer2 (layered and parallel sub-chains, homogeneous and heterogeneous Asset Bridge), with unlimited capacity expansion at linear cost, massive infrastructure construction, and the joint participation of all community developers.
Thinkium holds the distinction of being the only global public blockchain infrastructure which aims at facilitating Internet level large-scale applications and bridge the physical world and the digital world to launch the era of Web 3.0.

Identity and Authentication

The Thinkium core engine provides users with a universal, controllable, and secure identity authentication system. The address account of the Thinkium blockchain system is not directly associated with the identity of the user, and supports users toauthenticate the account. Authentication methods include:

CA with credibility issues a certificate to the account, issues authentication information on the authentication. subject’s information subject, and other account the user account is authorized, etc.

The identity authentication information of the account can be stored on the chain and can be quickly queried and accessed; the account owner can add and maintain authentication by himself or grant maintenance rights to other accounts.

The Thinkium core engine allows flexible authentication methods. Each account can be authenticated by multiple trust chains. Each method has different levels of trust anchors and security. Users and applications can judge reliability according to their own needs.
Users can use a verifiable claim to verify the identity and other attributes of an account. A verifiable claim is created by the issuer’s account signature. The verifiable declaration will be invalidated after the applicant has voluntarily revoked the statement or the validity period of the statement has expired. Except for the issuance and revocation processes, no other issuer is required to participate.

Verifiable claims may contain sensitive information, and users can protect privacy by encrypting verifiable claims. The Thinkium core engine supports three types of Chain .

declaration methods, allowing users to balance security, cost, and efficiency and choose the protocol that best suits their needs. In the process of implementing verifiable declarations, the blockchain has an immutable nature. Suitable as a trusted and traceable bulletin board. Clear text statement: The statement is published or saved in clear text without any encryption.

Encryption statement: The content of the statement is encrypted, and the verifier needs the cryptographic information provided by the holder to read it. By using a different key to encrypt each part of the statement, you can only let the verifier everytime the statement is presented See the relevant part. It should be noted that if the malicious verifier publicly decrypts the key, the content of the declaration will be made public. Using interactive random proofs can prevent the verifier from repeating the same to others (proofs are random algorithms that require the holder’s participation)

For more informations contact :

Website : https://Thinkium.net
Twitter: https://twitter.com/Thinkium_chain
Telegram: https://t.co/p97J2Rk9x4
Discord: https://t.co/Qs7L8swcNd
Medium: https://t.co/oYsgIQ0nQM
Reddit : https://t.co/mogvLIlS02

Ndikpongke
Ndikpongke

Written by Ndikpongke

crypto_explorer// graphics designer// defi_explorer// contents creator// event planner// nft_explorer// crypto trader//marketing expertise//

Responses (7)