Following the recent introduction of our PikcioBrowser, we would like to outline how we integrate the notion of trust into the PikcioChain network. Pikcio has designed PikcioChain through the implementation of trust protocols to prevent data misuse, confidentiality breaches and hacking as well as foster mutual confidence among users.
Since the PikcioBrowser represents a node from the network, it enables anonymous searches and secures your online activity.
Trusted Identification System (TIS)
What is TIS?
The TIS is a trusted third-party that generates and grants each user x a pair of identifiers. First, a node ID (), an unambiguous identifier as a unique node in the P2P layer. Second, a Matryoshka ID () that identifies the user in the Matryoshka layer. Both identifiers are calculated from a set of properties such as x ‘s username and e-mail address. A pair of certificates links each identifier to a respective public key provided by x. The corresponding private keys are known to x and no one else. Because the P2P system can retrieve a node IP address from its nodeid, the separation of node () and Matryoshka () identifiers is necessary to prevent malicious users from deriving IP addresses.
In Pikcio’s network, only a node’s trusted contacts are able to link these two identifiers because they can act as mirrors and therefore know both. But TIS is an exception: it too can bind users’ Matryoshka matr_id and node_id node identifiers, since it generated both. In the event of corruption, the TIS may disclose user participation in addition to their location. However, the TIS does not possess private user keys, so it cannot impersonate, recover its set of trusted contacts or access the content of shared data.
Simultaneously, the implementation of bootstraps will allow the TIS to transmit a set of nodes (i.e. bootstraps) to the user node that will act as trusted contacts, while the user builds his own social graph. These bootstraps will also allow the user to access the DHT (see section P2P Kademlia Pikcio).
Trust Capital Index (TCI)
In decentralized systems, there is no mediation around trust and identity management despite trust being the engine of any Blockchain. This is why Pikcio has introduced TCI to monitor trust activity and entities, i.e. network nodes.
What is a TCI
To counter identity theft that is very common in digital spheres, our network includes an identification protocol by consensus validation called the Trust Capital Index. This TCI is a user identification score on the network, determined through his personal data and user-to-user recommendations.
Increasing a user’s TCI
TCI is primarily an identity that relies on data from Pikcio’s digital identity as a service. Thus a user’s TCI will grow as he feeds more and more data on his profile and peer-to-peer network.
A user can validate his identity and increase his TCI by linking his digital identities and related data that are scattered across different platforms and service providers. These include social networks, administrations, banks, insurance, and so on.
Trust by consensus
Through an algorithm, consensus ensures the consistency of these identities and increments the users’ score according to the result. The TCI is also dependent on peer validation, i.e. validation of a user’s identity by one of his contacts. This process is also validated and certified by consensus.
How it works
At first, a user’s TCI will be managed by the fully private, decentralized and optimized by machine learning PikcioBrowser. The TCI will build and develop according to the data on users’ profiles.
With the integration of Pikcio’s digital identity as a service in the PikcioBrowser, users will be able to authenticate themselves and log in to other portals (banks, social networks..).
For the latest up-to-date information about Pikciochain:
Visit our website,
And join our community.
The PikcioChain Team