Digital Identity – A Gateway to All Other Use Cases

By Benno Ferrarini, Julie Maupin, and Marthe Hinojales via Asian Development Bank

By Benno Ferrarini, Julie Maupin, and Marthe Hinojales
via Asian Development Bank

Digital Identity – A Gateway to All Other Use Cases

Image Attribute: IndraStra Creatives

Every aspect of human development rests upon the bedrock of trusted identity. Without a verifiable identity of some kind, it is impossible to open a bank account, start a business, conclude a legally binding contract, access essential government services, obtain educational credentials, or conduct just about any other imaginable type of economic or social activity on a broader scale.[1] State authorities attempt to fill this gap by issuing official identities to natural and legal persons falling within their jurisdiction. They do so by issuing written documents such as birth certificates and citizen identification (ID) numbers, which can in turn be used to obtain both locally recognized identity-related documents (identity cards, driver’s licenses, marriage certificates, tax ID numbers, business licenses, etc.) and globally recognized ones (e.g., passports). This process works better in some states than others. Today, around 1.1 billion people worldwide—particularly in rural Africa and Asia—still lack legal identities (World Bank 2017). It was for this reason that the United Nations (UN) in 2015 made the provision of legal identities for all, including birth registrations, an explicit focus of its revised Sustainable Development Goals (UN SDGS 2017).[2]

But even once legal identities have been issued, the question of how to keep official records continuously up-to-date remains problematic. A never-ending string of ordinary events can necessitate the alteration, suspension, or revocation of legal identities and the various entitlements associated with them. Births, deaths, marriages, name changes, declarations of court-determined legal incapacity, bankruptcy or insolvency, and many other events can alter the legal rights and duties attached to a particular identity. Even economically advanced ‘good governance’ states have long struggled to find ways of making their many disparate recordkeeping systems talk to one another such that all records are kept current.

This lack of inter-registry communication impedes global development efforts by making it extremely expensive and time-consuming for transacting parties to verify one another’s legally recognized identities and entitlements. This is as true of local transactions as it is of global ones. For instance, a simple contract for the sale of a parcel of land by one neighbor to another requires the verification of both parties’ identities and their legal capacity to contract, as well as a verification of the seller’s current ownership entitlement to the land. To take a cross-border example, a large international financial transfer requires the verification of the sending and receiving parties’ identities, a confirmation of the mutual recognition of those identities by the different countries in question, and a confirmation that neither of them is prohibited under any national or international regulation from transferring money internationally (e.g., by reason of being on a terrorism or money laundering watch list). Similarly, in relation to DLT-based trade finance further described below, the global diffusion of a company identifier system will facilitate the risk assessment and ownership tracking necessary for smaller companies in developing countries to be granted access to finance and the global economy.


Distributed ledger technologies offer a technical solution to this complex problem for the first time in history, and on a global scale. Numerous globally focused startups, including Sovrin, Netki, uPort , Civic and others, are building DLT solutions for real-time self-sovereign digital identity management. The concept of self-sovereign identity could herald radical changes in global economic organization by turning the data collection practices and revenue models of many existing internet-era businesses on their heads.[3] More importantly, within the international development context, it promises to enable billions of currently excluded persons to integrate into the global finance and commerce systems. As described in the 2016 Caribou Digital/Omidyar paper:

Open, decentralized systems enable individuals to fully own and manage their own identities, leading to the idea of “self-sovereign” identity systems. These systems use combinations of distributed ledger and encryption technology to create immutable identity records. The individual creates an identity “container” that allows them to accept attributes or credentials from any number of organizations, including the state, in a networked ecosystem that is open to any organization to participate (e.g., to issue credentials). Each organization can decide whether to trust credentials in the container based on which organization verified or attested to them; in other words, a mortgage company may accept a credential issued by a leading global bank, but not one issued by a local bank. Importantly, this model does not require a state-based credential to be initiated (the state credential can be added at a later time, or not at all), which removes a barrier to adoption.

The flexibility and modularity of the self-sovereign identity approach make it ideal for adoption in developing country contexts where there are significant gaps in official state recordkeeping. In fact, those gaps might make it easier for developing countries to adopt such solutions than more developed ones, where large sunk investments in traditional recordkeeping systems often create institutional path-dependencies and high transition costs.

An example of a development-focused start-up using self-sovereign identity as an anchor for its work is Taqanu, which describes itself as “a bank for refugees and for people without a fixed address.” Taqanu takes advantage of the fact that, while many refugees don’t have identity documents, many do have phones. It allows refugees to sign up to have their social media data compiled and analyzed in a way that makes it possible for regulated banks to verify the refugees’ identities to a sufficient degree of probability to offer them basic banking services—even if they can’t provide a government-issued birth certificate, passport, or other recognized national identity document.

Providing financial system access to excluded populations is one of the most important developmental use cases of DLTs, and further examples are presented in the following sections. For present purposes, the Taqanu example illustrates that the creation of verifiable digital identities is a gateway issue for pretty much every possible DLT use case. Without them, users of DLT solutions could never trust that their counterparties to a transaction: (i) are who they claim to be, and (ii) are entitled to carry out the intended transaction. Digital identity is, therefore, the key to the success of all other DLT use cases. This renders investment in self-sovereign identity infrastructure a necessary prerequisite for every other type of development assistance for which DLT solutions might be explored.

Risks and Implementation Challenges

In order for its benefits to be realized, advocates of self-sovereign identity posit that three core requirements must be met:

(i) Security—the identity information must be kept secure,

(ii) Controllability—the user must be in control of who can see and access their data, and

(iii) Portability—the user must be able to use their identity data wherever they want and not be tied to a single provider (Tobin and Reed 2017)

Many of the leading actors in this space are cooperating under the auspices of the Decentralized Identity Foundation to make this vision a reality.[4] While the broader vision is shared, however, key implementation details have yet to be agreed upon. For example, the security pillar requires the use of cryptographically secure methods of protecting users’ data. Most digital identity service providers today use cryptographic functions based on elliptic curves whose security robustness has been thoroughly vetted within the context of contemporary processing environments. But cryptographers warn these functions will most likely prove vulnerable to hacking with the advent of quantum computing, which may no longer be very far away (The Japan Times 2017).

To guard against this risk, all information stored in a user’s digital identity wallet should ideally be stored in a quantum-proof way. This is theoretically feasible using known cryptographic techniques [5]. However, building these into a self-sovereign identity wallet in a user-friendly manner—such that the user does not need any technical knowledge to keep his/her data secure—poses nontrivial design challenges. Addressing these will require systematic adherence to user-centered design principles together with comprehensive beta testing of design features in developing country environments in advance of any live deployment of the technology.

The portability pillar also constitutes a risk at present due to the fact that many of the leading firms in the self-sovereign identity race are building their solutions for a specific DLT, e.g. the Bitcoin or Ethereum blockchains. But data portability requires platform neutrality if it is to mean anything in practice. Digital identity solutions that are open source and platform agnostic (capable of being used across multiple distributed ledgers) may be more likely to deliver high performance at lower cost to users in the long run. There is a risk that hype factors associated with the current popularity of particular blockchains may lead development funders to commission digital identity ‘proof of concepts’ tied to those specific blockchains, even if the structural design features of the blockchain in question are not well suited to the long-term success of the project at hand. To mitigate this risk, development funders should adopt a policy of publishing public tenders for all DLT-based proof of concepts—including those whose financial implications would ordinarily place them below the usual budget threshold for a mandatory public tender call. This can help prevent situations that may lead to lock-in effects.

In addition to these technical risks, the mounting evidence makes clear that digital identity efforts can only assist with the achievement of concrete development objectives if properly situated within a broader reform agenda. Past policy interventions were often premised on the assumption that broader access to birth certificates, for example, would lead to human rights protection and a fairer distribution of resources and opportunities. A 2007 Asian Development Bank (ADB) study tested this assumption directly by investigating whether improved access to some form of legal identity improved the livelihoods of the poor by helping them obtain services, benefits, and other rights (Vandenabeele and Lao 2007). Based on fieldwork in Bangladesh, Cambodia, and Nepal, it found that the actual benefits from owning a legal identity are limited by the obstacles encountered in individual country circumstances, and more generally by weak institutions and widespread corruption. In other words, the provision of legal identity must be linked to the delivery of essential services relevant to people’s livelihoods in order to have a real-world impact.

Selecting which essential services should be linked to a potential self-sovereign digital identity initiative is also an important policy decision. For example, primary education funding in Nepal premised on the introduction of registration laws and legal identity requirements was found to exclude women and minorities most in need of assistance, because these groups faced the highest barriers to obtaining birth certificates in the first place. Program design should, therefore, take into account the risk that introducing a legal identity regime may limit the range of project beneficiaries. For some essential services, superior development outcomes may be reached by providing them to everyone, with or without identity.[6]

Last but not least, poor governance, weak institutions, corruption, and resource constraints fundamentally weaken the state’s capacity to enforce laws intended to protect citizens’ rights. The provision of legal identity makes little difference in such contexts without complementary reforms in these areas. Although self-sovereign identity systems can fill the void left by a weak state in a circumscribed area of application, its benefits cannot expand without an appropriate enabling environment. Put differently, legal identity and the technologies underlying it are important facilitating tools, but they cannot substitute for development policy as such.

Download the ADB economics working paper series No: 533 (in pdf): 

"Distributed Ledger Technologies for Developing Asia | Publication | December 2017"

About the Authors:

Dr. Benno Ferrarini is a senior economist at the Economic Research and Regional Cooperation Department (ERCD), Asian Development Bank (ADB).

Dr. Julie Maupin is a senior researcher at the Max-Planck Institute for Comparative Public Law and International Law in Heidelberg, Germany. She is also a senior fellow at the UCL Centre for Blockchain Technologies (London) and the Centre for International Governance Innovation (Waterloo), and is an advisor to the IOTA Foundation (Berlin).

Marthe Hinojales is an economics officer at the ERCD, ADB. 


This article is an excerpt taken from a working paper authored by Dr. Benno Ferrarini, Dr. Julie Maupin, and Marthe Hinojales and published by Asian Development Bank under the title - "Distributed Ledger Technologies for Developing Asia | Publication | December 2017" and it is licensed under a Creative Commons Attribution 3.0 IGO License provided by the original publisher.


[1] In traditional systems, identity was a straightforward matter of community recognition. People transacted with those whom they knew and trusted. While such models worked well on a local level, they proved incapable of establishing trust among parties wishing to transact beyond their immediate communities. 

[2] In particular, UN Sustainable Development Goal target 16.9 states: “By 2030, provide legal identity for all, including birth registration.” 

[3] Companies like Google, Amazon, Facebook, and Apple—whose revenue models depend upon monetizing the large volumes of data collected from their users—will need to find new ways of generating revenue if users become empowered to decide on a granular level which data they share, with whom, and for what specific purposes.

[4] A good source of information on potential partners for building such a solution is the Decentralized Identity Foundation ( Solutions that are open source and platform agnostic (capable of being used across multiple distributed ledgers, as opposed to tied specifically to one particular blockchain) are probably more likely to deliver high performance at low cost to the users in the long run. 

[5] For a lay description, see Wikipedia. “Post-quantum Cryptography.”

[6] Prenatal healthcare and childhood vaccination


World Bank. 2017. “Identification for Development.”
(accessed 25 October 2017).  programs may be examples. 

United Nations (UN) SDGS. 2017. “Targets and Indicators.” https://sustainabledevelopment. (accessed 25 October 2017). 

Tobin, Andrew, and Drummond Reed. 2017. “The Inevitable Rise of Self-Sovereign Identity.” Sovrin
Foundation White Paper. p. 10.

The Japan Times. 2017. “University of Tokyo Pair Invent Loop-Based Quantum Computing Technique.” Sep 24. 

Vandenabeele, Caroline, and Christine V. Lao, eds. 2007. Legal Identify for Inclusive Development. Manila: Asian Development Bank.


Recommended Reading (Suggested by IndraStra Global Editorial Team)
A Blueprint for Digital Identity - The Role of Financial Institutions in Building Digital Identity (Pdf)

(Click on the above image to download the pdf)

-51,1,3D Technology,2,5G,10,Abkhazia,2,Abortion Laws,1,Academics,11,Accidents,22,Activism,1,Adani Group,6,ADB,13,ADIZ,1,Adults,1,Advertising,31,Advisory,2,Aerial Reconnaissance,13,Aerial Warfare,35,Aerospace,5,Afghanistan,88,Africa,113,Agile Methodology,2,Agriculture,20,AI Policy,1,Air Crash,10,Air Defence Identification Zone,1,Air Defense,7,Air Force,29,Air Pollution,1,Airbus,5,Aircraft Carriers,5,Aircraft Systems,5,Al Nusra,1,Al Qaida,4,Al Shabab,1,Alaska,1,ALBA,1,Albania,2,Algeria,3,Alibaba,1,American History,4,AmritaJash,10,Antarctic,1,Antarctica,1,Anthropology,7,Anti Narcotics,12,Anti Tank,1,Anti-Corruption,4,Anti-dumping,1,Anti-Piracy,2,Anti-Submarine,1,Anti-Terrorism Legislation,1,Antitrust,2,APEC,1,Apple,3,Applied Sciences,2,AQAP,2,Arab League,3,Architecture,3,Arctic,6,Argentina,7,Armenia,30,Army,3,Art,3,Artificial Intelligence,83,Artillery,2,Arunachal Pradesh,2,ASEAN,12,Asia,71,Asia Pacific,23,Assassination,2,Asset Management,1,Astrophysics,2,ATGM,1,Atmospheric Science,1,Atomic.Atom,1,Augmented Reality,8,Australia,57,Austria,1,Automation,13,Automotive,131,Autonomous Flight,2,Autonomous Vehicle,3,Aviation,63,AWACS,2,Awards,17,Azerbaijan,16,Azeri,1,B2B,1,Bahrain,9,Balance of Payments,2,Balance of Trade,3,Balkan,10,Balochistan,2,Baltic,3,Baluchistan,8,Bangladesh,28,Banking,53,Bankruptcy,2,Basel,1,Bashar Al Asad,1,Battery Technology,3,Bay of Bengal,5,BBC,2,Beijing,1,Belarus,3,Belgium,1,Belt Road Initiative,3,Beto O'Rourke,1,BFSI,1,Bhutan,13,Big Data,30,Big Tech,1,Bilateral Cooperation,19,BIMSTEC,1,Biography,1,Biotechnology,4,Birth,1,BISA,1,Bitcoin,9,Black Lives Matter,1,Black Money,3,Black Sea,2,Blockchain,32,Blood Diamonds,1,Bloomberg,1,Boeing,21,Boko Haram,7,Bolivia,6,Bomb,3,Bond Market,2,Book,11,Book Review,24,Border Conflicts,11,Border Control and Surveillance,7,Bosnia,1,Brand Management,14,Brazil,105,Brexit,22,BRI,5,BRICS,20,British,3,Broadcasting,16,Brunei,3,Brussels,1,Buddhism,1,Budget,4,Build Back Better,1,Bulgaria,1,Burma,2,Business & Economy,1222,C-UAS,1,California,5,Call for Proposals,1,Cambodia,7,Cameroon,1,Canada,56,Canadian Security Intelligence Service (CSIS),1,Carbon Economy,9,CAREC,1,Caribbean,10,CARICOM,1,Caspian Sea,2,Catalan,3,Catholic Church,1,Caucasus,9,CBRN,1,Cement,1,Central African Republic,1,Central Asia,82,Central Asian,3,Central Eastern Europe,48,Certification,1,Chad,2,Chanakya,1,Charity,2,Chatbots,2,Chemicals,7,Chemistry,1,Child Labor,1,Child Marriage,1,Children,4,Chile,10,China,585,Christianity,1,CIA,1,CIS,5,Citizenship,2,Civil Engineering,2,Civil Liberties,5,Civil Rights,2,Civil Society,5,Civil Unrest,1,Civilization,1,Clean Energy,5,Climate,67,Climate Change,26,Climate Finance,2,Clinical Research,3,Clinton,1,Cloud Computing,45,Coal,6,Coast Guard,3,Cocoa,1,Cognitive Computing,13,Cold War,5,Colombia,15,Commodities,4,Communication,11,Communism,3,Compliance,1,Computers,40,Computing,1,Conferences,1,Conflict,109,Conflict Diamonds,1,Conflict Resolution,48,Conflict Resources,1,Congo,2,Construction,5,Consumer Behavior,4,Consumer Price Index,5,COP26,4,COP28,1,COP29,1,Copper,2,Coronavirus,107,Corporate Communication,1,Corporate Governance,4,Corporate Social Responsibility,4,Corruption,4,Costa Rica,2,Counter Intelligence,15,Counter Terrorism,81,COVID,9,COVID Vaccine,6,CPEC,8,CPG,4,Credit,2,Credit Rating,1,Credit Score,1,Crimea,4,CRM,1,Croatia,2,Crypto Currency,17,Cryptography,1,CSTO,1,Cuba,7,Culture,5,Currency,8,Customer Exeperience,1,Customer Relationship Management,1,Cyber Attack,7,Cyber Crime,2,Cyber Security & Warfare,116,Cybernetics,5,Cyberwarfare,16,Cyclone,1,Cyprus,5,Czech Republic,3,DACA,1,DARPA,3,Data,9,Data Analytics,36,Data Center,3,Data Science,2,Database,3,Daughter.Leslee,1,Davos,1,DEA,1,DeBeers,1,Debt,13,Decision Support System,5,Defense,12,Defense Deals,8,Deforestation,2,Deloitte,1,Democracy,22,Democrats,2,Demographic Studies,2,Demonetization,6,Denmark. F-35,1,Denuclearization,1,Diamonds,1,Digital,39,Digital Currency,2,Digital Economy,11,Digital Marketing,7,Digital Transformation,11,Diplomacy,14,Diplomatic Row,4,Disaster Management,4,Disinformation,2,Diversity & Inclusion,1,Djibouti,2,Documentary,3,Doklam,2,Dokolam,1,Dominica,2,Donald Trump,48,Donetsk,2,Dossier,2,Drones,14,E-Government,2,E-International Relations,1,Earning Reports,4,Earth Science,1,Earthquake,8,East Africa,2,East China Sea,9,eBook,1,Ebrahim Raisi,1,ECB,1,eCommerce,11,Econometrics,2,Economic Justice,1,Economics,43,Economy,111,ECOWAS,2,Ecuador,4,Edge Computing,2,Editor's Opinion,55,Education,67,EFTA,1,Egypt,27,Election Disinformation,1,Elections,46,Electric Vehicle,15,Electricity,7,Electronics,9,Emerging Markets,1,Employment,19,Energy,316,Energy Policy,28,Energy Politics,27,Engineering,24,England,2,Enterprise Software Solutions,8,Entrepreneurship,15,Environment,47,ePayments,13,Epidemic,6,ESA,1,Ethiopia,3,Eulogy,4,Eurasia,3,Euro,6,Europe,15,European Union,234,EuroZone,5,Exchange-traded Funds,1,Exclusive,2,Exhibitions,2,Explosives,1,Export Import,6,F-35,6,Facebook,9,Fake News,3,Fallen,1,FARC,2,Farnborough. United Kingdom,2,FATF,1,FDI,5,Featured,1387,Federal Reserve,2,Fidel Castro,1,FIFA World Cup,1,Fiji,1,Finance,18,Financial Markets,60,Financial Planning,1,Financial Statement,2,Finland,5,Fintech,14,Fiscal Policy,14,Fishery,3,Five Eyes,1,Floods,2,Food Security,27,Forces,1,Forecasting,3,Foreign Policy,13,Forex,4,France,34,Free Market,1,Free Syrian Army,4,Free Trade Agreement,1,Freedom,3,Freedom of Press,1,Freedom of Speech,2,Frigate,1,FTC,1,Fujairah,97,Fund Management,1,Funding,23,Future,1,G20,10,G24,1,G7,4,Gaddafi,1,Gambia,2,Gaming,1,Garissa Attack,1,Gas Price,23,GATT,1,Gaza,13,GCC,11,GDP,14,GDPR,1,Gender Studies,3,Geneal Management,1,General Management,1,Generative AI,8,Genetics,1,Geo Politics,105,Geography,2,Geoint,14,Geopolitics,10,Georgia,12,Georgian,1,geospatial,9,Geothermal,2,Germany,71,Ghana,3,Gibratar,1,Gig economy,1,Glaciology,1,Global Perception,1,Global Trade,97,Global Warming,1,Global Water Crisis,11,Globalization,3,Gold,2,Google,20,Gorkhaland,1,Government,128,Government Analytics,1,Government Bond,1,GPS,1,Greater Asia,178,Greece,14,Green Bonds,1,Green Energy,3,Greenland,1,Gross Domestic Product,2,GST,1,Gujarat,6,Gulf of Tonkin,1,Gun Control,4,Hacking,4,Haiti,2,Hamas,10,Hasan,1,Health,8,Healthcare,72,Heatwave,2,Helicopter,12,Heliport,1,Hezbollah,3,High Altitude Warfare,1,High Speed Railway System,1,Hillary 2016,1,Hillary Clinton,1,Himalaya,1,Hinduism,2,Hindutva,4,History,10,Home Security,1,Honduras,2,Hong Kong,7,Horn of Africa,5,Housing,16,Houthi,12,Howitzer,1,Human Development,32,Human Resource Management,5,Human Rights,7,Humanitarian,3,Hungary,3,Hunger,3,Hydrocarbon,3,Hydrogen,5,IAEA,2,ICBM,1,Iceland,2,ICO,1,Identification,2,IDF,1,Imaging,2,IMEEC,2,IMF,76,Immigration,19,Impeachment,1,Imran Khan,1,Independent Media,72,India,670,India's,1,Indian Air Force,19,Indian Army,7,Indian Nationalism,1,Indian Navy,28,Indian Ocean,24,Indices,1,Indigenous rights,1,Indo-Pacific,7,Indonesia,20,IndraStra,1,Industrial Accidents,4,Industrial Automation,2,Industrial Safety,4,Inflation,10,Infographic,1,Information Leaks,1,Infrastructure,3,Innovations,22,Insider Trading,1,Insurance,3,Intellectual Property,3,Intelligence,5,Intelligence Analysis,8,Interest Rate,3,International Business,13,International Law,11,International Relations,9,Internet,53,Internet of Things,35,Interview,8,Intra-Government,5,Investigative Journalism,4,Investment,33,Investor Relations,1,IPEF,1,iPhone,1,IPO,4,Iran,207,Iraq,54,IRGC,1,Iron & Steel,4,ISAF,1,ISIL,9,ISIS,33,Islam,12,Islamic Banking,1,Islamic State,86,Israel,145,ISRO,1,IT ITeS,136,Italy,10,Ivory Coast,1,Jabhat al-Nusra,1,Jack Ma,1,Jamaica,3,Japan,92,JASDF,1,Jihad,1,JMSDF,1,Joe Biden,8,Joint Strike Fighter,5,Jordan,7,Journalism,6,Judicial,4,Justice System,3,Kanchin,1,Kashmir,8,Kaspersky,1,Kazakhstan,26,Kenya,5,Khalistan,2,Kiev,1,Kindle,700,Knowledge Management,4,Korean Conflict,1,Kosovo,2,Kubernetes,1,Kurdistan,8,Kurds,10,Kuwait,7,Kyrgyzstan,9,Labor Laws,10,Labor Market,4,Land Reforms,3,Land Warfare,21,Languages,1,Laos,2,Large language models,1,Laser Defense Systems,1,Latin America,83,Law,6,Leadership,3,Lebanon,10,Legal,11,LGBTQ,2,Li Keqiang,1,Liberalism,1,Library Science,1,Libya,14,Liechtenstein,1,Lifestyle,1,Light Battle Tank,1,Linkedin,1,Lithuania,1,Littoral Warfare,2,Livelihood,3,Loans,9,Lockdown,1,Lone Wolf Attacks,2,Lugansk,2,Macedonia,1,Machine Learning,8,Madagascar,1,Mahmoud,1,Main Battle Tank,3,Malaysia,12,Maldives,13,Mali,7,Malware,2,Management Consulting,6,Manpower,1,Manto,1,Manufacturing,16,Marijuana,1,Marine Biology,1,Marine Engineering,3,Maritime,50,Market Research,2,Marketing,38,Mars,2,Martech,10,Mass Media,29,Mass Shooting,1,Material Science,2,Mauritania,1,Mauritius,2,MDGs,1,Mechatronics,2,Media War,1,MediaWiki,1,Medical,1,Medicare,1,Mediterranean,12,MENA,6,Mental Health,4,Mercosur,2,Mergers and Acquisitions,18,Meta,2,Metadata,2,Metals,3,Mexico,14,Micro-finance,4,Microsoft,12,Migration,19,Mike Pence,1,Military,112,Military Exercise,11,Military Service,2,Military-Industrial Complex,3,Mining,16,Missile Launching Facilities,6,Missile Systems,57,Mobile Apps,3,Mobile Communications,12,Mobility,4,Modi,8,Moldova,1,Monaco,1,Monetary Policy,6,Money Market,2,Mongolia,11,Monkeypox,1,Monsoon,1,Montreux Convention,1,Moon,4,Morocco,2,Morsi,1,Mortgage,3,Moscow,2,Motivation,1,Mozambique,1,Mubarak,1,Multilateralism,2,Mumbai,1,Muslim Brotherhood,2,Mutual Funds,1,Myanmar,30,NAFTA,3,NAM,2,Namibia,1,Nanotechnology,4,Narendra Modi,3,NASA,13,National Identification Card,1,National Security,5,Nationalism,2,NATO,34,Natural Disasters,16,Natural Gas,33,Natural Language Processing,1,Nauru,1,Naval Aviation,1,Naval Base,5,Naval Engineering,24,Naval Intelligence,2,Naval Postgraduate School,2,Naval Warfare,50,Navigation,2,Navy,23,NBC Warfare,2,NDC,1,Nearshoring,1,Negotiations,2,Nepal,12,Netflix,1,Neurosciences,7,New Delhi,4,New Normal,1,New York,5,New Zealand,7,News,1281,News Publishers,1,Newspaper,1,NFT,1,NGO,1,Nicaragua,1,Niger,3,Nigeria,10,Nikki Haley,1,Nirbhaya,1,Noble Prize,1,Non Aligned Movement,1,Non Government Organization,4,Nonproliferation,2,North Africa,23,North America,54,North Korea,59,Norway,5,NSA,1,NSG,2,Nuclear,41,Nuclear Agreement,32,Nuclear Doctrine,2,Nuclear Energy,5,Nuclear Fussion,1,Nuclear Propulsion,2,Nuclear Security,47,Nuclear Submarine,1,NYSE,1,Obama,3,ObamaCare,2,OBOR,15,Ocean Engineering,1,Oceania,2,OECD,5,OFID,5,Oil & Gas,384,Oil Gas,7,Oil Price,74,Olympics,2,Oman,25,Omicron,1,Oncology,1,Online Education,5,Online Reputation Management,1,OPEC,130,Open Access,1,Open Journal Systems,1,Open Letter,1,Open Source,4,OpenAI,2,Operation Unified Protector,1,Operational Research,4,Opinion,697,Opinon Poll,1,Optical Communications,1,Pacific,5,Pakistan,181,Pakistan Air Force,3,Pakistan Army,1,Pakistan Navy,3,Palestine,24,Palm Oil,1,Pandemic,84,Papal,1,Paper,3,Papers,110,Papua New Guinea,2,Paracels,1,Partition,1,Partnership,1,Party Congress,1,Passport,1,Patents,2,PATRIOT Act,1,Peace Deal,6,Peacekeeping Mission,1,Pension,1,People Management,1,Persian Gulf,19,Peru,5,Petrochemicals,1,Petroleum,19,Pharmaceuticals,14,Philippines,19,Philosophy,2,Photos,3,Physics,1,Pipelines,5,PLA,2,PLAN,4,Plastic Industry,2,Poland,8,Polar,1,Policing,1,Policy,8,Policy Brief,6,Political Studies,1,Politics,53,Polynesia,3,Pope,1,Population,6,Portugal,1,Poverty,8,Power Transmission,6,Preprint,1,President APJ Abdul Kalam,2,Presidential Election,30,Press Release,158,Prison System,1,Privacy,18,Private Equity,2,Private Military Contractors,2,Privatization,1,Programming,1,Project Management,4,Propaganda,5,Protests,13,Psychology,3,Public Policy,55,Public Relations,1,Public Safety,7,Publications,1,Publishing,8,Purchasing Managers' Index,1,Putin,7,Q&A,1,Qatar,114,QC/QA,1,Qods Force,1,Quad,1,Quantum Computing,4,Quantum Physics,4,Quarter Results,2,Racial Justice,2,RADAR,2,Rahul Guhathakurta,4,Railway,9,Raj,1,Ranking,4,Rape,1,RBI,1,RCEP,2,Real Estate,7,Recall,4,Recession,2,Red Sea,5,Referendum,5,Reforms,18,Refugee,23,Regional,4,Regulations,2,Rehabilitation,1,Religion & Spirituality,9,Renewable,18,Report,4,Reports,50,Repository,1,Republicans,3,Rescue Operation,2,Research,5,Research and Development,25,Restructuring,1,Retail,36,Revenue Management,1,Rice,1,Risk Management,5,Robotics,8,Rohingya,5,Romania,2,Royal Canadian Air Force,1,Rupee,1,Russia,318,Russian Navy,5,Saab,1,Saadat,1,SAARC,6,Safety,1,SAFTA,1,SAM,2,Samoa,1,Sanctions,6,SAR,1,SAT,1,Satellite,14,Saudi Arabia,130,Scandinavia,6,Science & Technology,400,Science Fiction,1,SCO,5,Scotland,6,Scud Missile,1,Sea Lanes of Communications,4,SEBI,3,Securities,2,Security,6,Semiconductor,21,Senate,4,Senegal,1,SEO,5,Serbia,4,Services Sector,1,Seychelles,2,SEZ,1,Shadow Bank,1,Shale Gas,4,Shanghai,1,Sharjah,12,Shia,6,Shinzo Abe,1,Shipping,11,Shutdown,2,Siachen,1,Sierra Leone,1,Signal Intelligence,1,Sikkim,5,Silicon Valley,1,Silk Route,6,Simulations,2,Sinai,1,Singapore,17,Situational Awareness,20,Small Modular Nuclear Reactors,1,Smart Cities,7,Smartphones,1,Social Media,1,Social Media Intelligence,40,Social Policy,40,Social Science,1,Social Security,1,Socialism,1,Soft Power,1,Software,7,Solar Energy,16,Somalia,5,South Africa,20,South America,48,South Asia,478,South China Sea,36,South East Asia,77,South Korea,63,South Sudan,4,Sovereign Wealth Funds,1,Soviet,2,Soviet Union,9,Space,46,Space Station,2,Spain,9,Special Education,1,Special Forces,1,Sports,3,Sports Diplomacy,1,Spratlys,1,Sri Lanka,24,Stablecoin,1,Stamps,1,Startups,43,State of the Union,1,Statistics,1,STEM,1,Stephen Harper,1,Stock Markets,23,Storm,2,Strategy Games,5,Strike,1,Sub-Sahara,4,Submarine,16,Sudan,5,Sunni,6,Super computing,1,Supply Chain Management,48,Surveillance,13,Survey,5,Sustainable Development,18,Swami Vivekananda,1,Sweden,4,Switzerland,6,Syria,112,Taiwan,34,Tajikistan,12,Taliban,17,Tamar Gas Fields,1,Tamil,1,Tanzania,4,Tariff,4,Tata,3,Taxation,25,Tech Fest,1,Technology,13,Tel-Aviv,1,Telecom,24,Telematics,1,Territorial Disputes,1,Terrorism,77,Testing,2,Texas,3,Thailand,11,The Middle East,656,Think Tank,317,Tibet,3,TikTok,2,Tobacco,1,Tonga,1,Total Quality Management,2,Town Planning,3,TPP,2,Trade Agreements,14,Trade War,10,Trademarks,1,Trainging and Development,1,Transcaucasus,20,Transcript,4,Transpacific,2,Transportation,47,Travel and Tourism,15,Tsar,1,Tunisia,7,Turkey,74,Turkmenistan,10,U.S. Air Force,3,U.S. Dollar,2,UAE,140,UAV,23,UCAV,1,Udwains,1,Uganda,1,Ukraine,113,Ukraine War,26,Ummah,1,UNCLOS,7,Unemployment,2,UNESCO,1,UNHCR,1,UNIDO,2,United Kingdom,84,United Nations,28,United States,767,University and Colleges,4,Uranium,2,Urban Planning,10,US Army,12,US Army Aviation,1,US Congress,1,US FDA,1,US Navy,18,US Postal Service,1,US Senate,1,US Space Force,2,USA,16,USAF,22,USV,1,UUV,1,Uyghur,3,Uzbekistan,13,Valuation,1,Vatican,3,Vedant,1,Venezuela,19,Venture Capital,4,Vibrant Gujarat,1,Victim,1,Videogames,1,Vietnam,25,Virtual Reality,7,Vision 2030,1,VPN,1,Wahhabism,3,War,1,War Games,1,Warfare,1,Water,17,Water Politics,7,Weapons,11,Wearable,2,Weather,2,Webinar,1,WeChat,1,WEF,3,Welfare,1,West,2,West Africa,19,West Bengal,2,Western Sahara,2,Whales,1,White House,1,Whitepaper,2,WHO,3,Wholesale Price Index,1,Wikileaks,1,Wikipedia,3,Wildfire,1,Wildlife,3,Wind Energy,1,Windows,1,Wireless Security,1,Wisconsin,1,Women,10,Women's Right,14,Workers Union,1,Workshop,1,World Bank,38,World Economy,33,World Peace,10,World War I,1,World War II,3,WTO,6,Wyoming,1,Xi Jinping,9,Xinjiang,2,Yemen,28,Yevgeny Prigozhin,1,Zbigniew Brzezinski,1,Zimbabwe,2,
IndraStra Global: Digital Identity – A Gateway to All Other Use Cases
Digital Identity – A Gateway to All Other Use Cases
By Benno Ferrarini, Julie Maupin, and Marthe Hinojales via Asian Development Bank
IndraStra Global
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share to a social network STEP 2: Click the link on your social network Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy Table of Content