Decentralized identity, the ultimate guide

AbstractThis is a guide that explains what decentralised identity is, how it works and its benefits. It is written by the team of Dock, a company that has been building Verifiable Credentials and Decentralised Identity since 2017.
Year2022
Link to the paperhttps://blog.dock.io/decentralized-identity/
Relevance scoreVery relevant
Quality score4
LabelsDecentralized identityGood reference sourceSelf-sovereign identity

We rate this blog post as very relevant, because it gives a thorough overview of the definitions related to Decentralized Identity.

Definitions related to Decentralized Identity

(discussed in the Decentralized Identity: The Ultimate Guide 2022 https://blog.dock.io/decentralized-identity/ .)

Self-Sovereign Identity (SSI)

Self-Sovereign Identity (SSI) is used interchangeably with the term Decentralized Identity.

SSI consists of the following four parts :

Centralized Identity Management

Every user creates a username and a password for each service.

Disadvantage: Single point of failure for data breaches. Some examples of such incidents are described in this paper: “Digital Identities and Verifiable Credentials''.

Federated Identity Management

Users can access multiple applications by using a single set of credentials. An example is when the user signs in to multiple applications using its Google or Facebook account.

Disadvantage: There is no unlinkability : if multiple applications collude could possibly detect if the same user has registered to all of them using the same account.

Decentralized Identity

Users store the data in their digital wallets and they have the option to choose when and which part of this data they want to reveal.

Standards For Decentralised Identity

Decentralized Identity on the Blockchain

There is an issuer, a holder, and a verifier.

What can be stored on the blockchain:

DIDs in Dock

Example : did:dock:GhkJkjhertFlkiid

Layers in the decentralized Identity Ecosystem

Layer 1 Standards: They ensure interoperability, standardization, portability

Layer 2 Infrastructure: Interaction between applications and with the verifiable data registries (e.g blockchain).

Layer 3 Identifiers and VC: authentication of DIDs and the presentation of the credentials.

Layer 4 apps, wallets, products: Use cases

References