Trust Over IP: A Governance Standard For The Digital Identity Revolution
Trust Over IP: A Governance Standard For The Digital Identity Revolution
2
What is Identity?
Identity is defined in different ways depending on the context (psychology, sociology, legal, etc):
“all attributes of an entity that uniquely defines that entity over the course of its existence, providing
sameness and continuity despite varying aspects and conditions.”
Identity Management System must therefore be designed in such a way as to be sufficiently flexible, resilient,
and dynamic to accommodate the variable and complex nature of human identity.
3
Real-World Identity
4
The identity problem in the real life
• Proofs are usually unstructured data, taking the form of images and photocopies
• Someone has to manually read and scan the documents to extract the relevant data to type into a system for
storage and processing.
• When the data changes in real life, the customer is obliged to tell the various service providers they
have relationships with.
• Some forms of proof can be easily faked
• extra steps to prove authenticity need to be taken, such as having photocopies notarized, leading to extra
friction and expense.
5
What is a Digital Identity?
Nowadays, a digital identity defines us entirely: our
attributes, our credentials, our interests, ...
Source:
Evernym 6
The Internet was designed to connect machines, not
people
7
The Internet was designed to connect machines, not people
Consumers have unintentionally turned businesses and governments into identity management
organizations
• Unfortunately, as recent hacks have shown, not all organizations are ready to deal with this new role.
• With practically every business and billions of people now online a siloed approach to identity doesn't work
anymore
• The popularization of IoT in a hyper-connected world also bring its part of complication when it comes to
online Identity
8
Real-life identity with physical credentials has been
difficult to duplicate online
9
Difficult to replicate Real-life Caption 10/12pt
Caption body copy
11
What is Self-Sovereign Identity?
Self-Sovereign Identity
‘’A self-sovereign identity is a permanent identity that can only be accessed in full by the person or
entity to whom it belongs, yet portions of that identity can be shown to any individual, organization, or
agency whenever it becomes relevant. Since self-sovereign identities are decentralized and encrypted,
identity theft or incidents become much less of a problem’’ -- Aaron Fernando
Decentralized Identity
"is slightly different than the self-sovereign concept. A DID is completely under the authority of the
user. There is NO central registry, identity provider or certificate authority that gives the receiving entity
a “thumbs up” on the validity of the data." -- Stephen Hyduchack, CEO of Bridge Protocol
These concepts are made possible by the decentralized nature of blockchain and the trust created
by consensus algorithms
12
Self-Sovereign Identity Core Principles
Source: IBM
13
SSI/Decentralized identity redefine the way people access, control, and
share their personal information
Decentralized identity allows individuals to maintain full control over their privacy, as well as
decide how and what data is shared
• A user should be able to fully own its personal digital identity.
• A user should be able to monetize its own data.
• A user should be able to choose which data to share with other parties, and trust that their data is not sold to
other parties without consent.
• A user should have the ability to isolate itself from data breaches.
• A user should be able to revoke access to trusted third parties and have proof that it must be deleted from
their servers.
14
SELF-SOVEREIGN GOVERNANCE
15
The Self-Sovereign Identity Bill Caption 10/12pt
Caption body copy
of Rights
Individuals must be
able to establish their
existence as a unified
identity online and in
the physical world
The rights of identity
holders must Individuals must have
supersede any other the tools to access and
platform or ecosystem control their identities
entities
Identities must be
portable
16
Trust Over IP
To manage the identity revolution, a new organization named the Trust Over IP Foundation has been
created.
"define a complete architecture for Internet-scale digital trust that combines both cryptographic trust at the machine
layer and human trust at the business, legal, and social layers".
17
Trust Over IP
Trust Over IP will play for digital trust a similar role that TCP/IP has played for the Internet.
• trust is something that can be structured like TCP/IP through combining a series of protocols and tools across
different technology layers with a series of governance documents.
• if all these frameworks align and do their job, and we figure out how to implement machine readability for
some of the protocols, trust will come to be seen as instantaneous and “stack-like” as TCP/IP.
"this fusion of governance and technology, says will create a path towards a trustworthy
universal, interoperable system for decentralized identity".
18
The Trust/IP Stack
19
SELF-SOVEREIGN IDENTITY
TECHNOLOGIES
20
Decentralized Identity Technical Standards: DID
The World Wide Web Consortium (W3C) is a technical standards body for the open internet working on
a decentralized identifier (DID) standard.
DIDs are a new type of identifier for verifiable, self-sovereign digital identity that is universally
discoverable and interoperable across a range of systems.
DIDs are URLs (i.e., unique web addresses) that resolve to a DID Document, which provides
information on how to use that specific DID but also references a series of service endpoints, enabling
further interactions with the DID controller
21
Decentralized Identity Technical Standards: DID characteristics
It becomes particularly useful when used in combination with verifiable claims or credentials—another
W3C standard that can be used to make any number of attestations about a DID subject.
These attestations include credentials and certifications that grant the DID subject access rights or
privileges.
• For example, a verifiable claim can attest that an individual has been Know-Your-Customer (KYC) approved
and therefore eligible to open a bank account, that the same individual has been certified as eligible to drive,
or authorized to access certain programs as a system administrator
23
Decentralized Identity Technical Standards: Verifiable Credentials
Verifiable credentials are the standard way to represent extrinsic identity online.
As the primary contents in an SSI wallet, they are generally digital, tamper-proof, non-transferrable,
verifiable versions of the cards you’d normally keep in a physical wallet.
You can share verified information from these credentials while preserving privacy (The Zero-
Knowledge Proof).
Since the credentials are yours, you don’t need a username and password to access them.
• They are therefore good candidates to protect access to services countering “identity theft” through social
engineering.
24
Decentralized Identity Technical Standards: Verifiable Claim
A verifiable claim contains the DID of its subject (e.g., a bank customer), the attestation (e.g., KYC
approval), and must be signed by the person or entity making the claim using the private keys associated
with the claim issuer's DID (e.g., the bank)
• Verifiable claims are thus methods for trusted authorities, such as banks, to provably issue a certified
credential associated to a particular DID
• DID claims remain under the control of the DID subject and can be used to prove a particular attribute of the
DID subject, independently from a certificate authority, an identity provider or a centralized registry
• Proving to be the actual subject of that DID (through a specified authentication method) will enable an
individual or entity to benefit from access privileges associated with these credentials.
25
Decentralized Identity Technical Standards: Digital Wallets
A digital wallet is a secure digital environment where you can keep verifiable credentials or currencies.
• The verifiable credentials in the wallet were given to you by trusted entities.
• You can use those credentials however you please to prove your identity or other traits.
• The credentials are yours; nobody can take them away.
• The organization that gave you the credentials may revoke them or let them expire.
• No one can even look at the contents of your wallet without your permission, even the wallet provider.
• You can switch out your wallet at will, switch your wallet contents to the new one relatively painlessly.
26
Decentralized Identity Technical Standards: DID + Distributed Ledgers
While DIDs are independent of and do not require blockchain technology, they are designed to be
compatible with any distributed ledger or blockchain network.
• Since a DID may be associated with a particular private/public key pair used to sign identity claims,
it is possible to associate that key pair with key pairs used to sign financial transactions on a
blockchain.
• Most importantly, the DID specification also makes it possible to associate particular methods to a
DID, which specifies the procedures for key registration, replacement, rotation, recovery, and
expiration.
• Several method schemes have been implemented so far that leverage the resilience and tamper-
resistance of blockchain technology to manage DIDs (e.g., BTCR DID, Blockstack DID, Ethereum
ERC725 DID)
The W3C group is working to ensure technical interoperability between different DID methods.
27
Decentralized Identity Technical Standards: Distributed Ledgers
28
Decentralized Identity Technical Standards: Distributed Ledgers
A remote hacker might have access to pieces of personal information but being able to prove an actual
identity would require physical possession of that person’s device.
29
Decentralized Identity Technical Standards: Distributed Ledgers
30
Decentralized Identity Technical Standards: Distributed Ledgers
It is important to note, however, that given the transparency and immutability of a blockchain, personal
information should never be stored on the blockchain itself
• Yet, a blockchain can be used to track permissioning and access of personally identifying data that is
stored off-chain, thereby creating an auditable trail of information access.
• A blockchain can therefore also be used for the recording and eventual revocation of claims or
attestations, for the granting and revocation of access to personal data stores , and other functions
that may be specific to particular identity system (e.g., claims filed and resolved as part of a dispute
resolution system regarding false attestations).
31
Decentralized Identity Technical Standards: Community
Source: IBM
32
How does it work?
33
How does it work?
Source: Rajesh
34
How does it work?
Source: Rajesh 35
SELF-SOVEREIGN BUSINESS
CONSIDERATIONS
36
Decentralized Identity: Business Impact
37
What's the Business Value of SSI?
38
Decentralized Identity Business: The bootstrapping challenge
The promising potential of SSI unfolds together with the challenges related to its business
implementations.
• The bootstrapping of the SSI infrastructure requires tight collaboration between business partners and
competitors, typical of the coopetition model.
• Blockchain solutions: works best when many different subjects work together in a decentralized and
distributed network => at scale implementation not a technology, but a business challenge.
• The hard part = setting up the governance and collaboration model that will ensure that the federation is
reliable, secure, and affords appropriate data protection.
The SSI paradigm will have the greatest impact in a large network of SSI issuers, holders and verifiers:
• But what is the optimal bootstrapping strategy that will help achieve the scale?
• Who will pay for the verification of credentials?
Accurate setting up of the SSI infrastructure should by definition require no upfront equity to prevent
single entity dominance. 39
FUTURE CONSIDERATIONS
40
Future Considerations for Wide Adoption
In light of these issues, there is a consensus that the best practice at the moment is a custody or
guardianship model
41
Thank you. Rue Vallin 2
CH-1201 Geneva
Switzerland
11710 Plaza America Drive
Suite 400
Reston, VA 20190, USA
• [email protected]
internetsociety.org
@internetsociety
42