Autonomi
LearnBuildWho we ArePublicationsGet ANTStart a Node
  • Learn
  • Node
  • ANT Token
  • Developers
  • Autonomi Docs
  • Introduction
    • What is Autonomi?
      • The Internet's Crowd Storage Layer
      • Everything's Encrypted
      • Lifetime Storage; One Time Fee
      • Built From Everyday Devices
      • Private by Design
      • Blockchainless Data
      • Secure & Efficient
    • Background
    • A Self-Organizing System
    • Fundamental Principles
    • Key Features
  • How It Works
    • Overview
    • Fully Autonomous Data Network
      • A Serverless Web
      • Nodes
      • Clients
    • Network Architecture
      • Building on Kademlia
      • libp2p
      • Content-Addressable Storage
    • Encryption and Authentication
      • Self-Encryption
      • Multilayered encryption
      • Self-Authentication
      • Multisig Credentials
    • Network Economics
      • Key Properties
      • Token Supply
      • Gas Fee
      • Quote Calculations
    • Consensus Not Required
      • Stigmergy
      • Conflict-free Replicated Data Types
    • Data types
      • Chunks
      • Registers
    • Defence Against Cyberattacks
      • Beating Common Threats
  • Learn More
    • Team
    • Autonomi Foundation
    • FAQs
    • Glossary
    • References
Powered by GitBook

Get Involved

  • Start a Node
  • Discord
  • Forum

Follow Us

  • X
  • Reddit
  • LinkedIn
On this page
Export as PDF
  1. How It Works
  2. Encryption and Authentication

Self-Authentication

PreviousMultilayered encryptionNextMultisig Credentials

Last updated 1 year ago

With data self-encrypted, and its many parts stored by their content address throughout the Network, any one single point of file access is removed, as by default the map to this data is not publicly accessible on the Network. means access to this data, and the means to reassemble it into information, always resides with the user, never leaving their device (i.e. not accessible to a ‘cloud’).

Another key innovation of the Network—at no point does the Network ever store a user’s credentials, there is no chance of passwords being attacked, nor can any user’s data (individual, collective or organisation) be targeted on or via the Network.

The authentication system utilises Boneh-Lynn-Shacham Distributed Key Generation (BLS), so that users can securely and anonymously access data, with no central server required to mediate the login process, nor are trusted third parties to store and manage the users’ credentials. It means users can reliably and securely access data from any machine, without ever sending or sharing their details.

Furthermore, it also allows for multi-signature credentials for permission-less recovery, without a single point of failure.

Deeper Dive…

[PDF]

Self-Authentication
Self-Authentication White Paper — MaidSafe (2010)