![]() You can compare it to the URL we use when browsing on the internet, e.g. ![]() Decentralized identifiersĪ Decentralized Identifier (DID) is basically a new type of a globally unique identifier. The permissionless, feeless and secure nature of the IOTA protocol is a perfect fit for a VDR to store decentralized identifiers (DID) in a secure and tamper-proof manner on the ledger without relying on a central trusted authority. Preukschat and Reed (2021) evaluated the possibility of using DLT towards achieving SSI as follows: DLT solves “a problem that has never had a solution in the history of cryptography: how a globally distributed database can serve as a source of truth for public keys without being subject to single points of failure or attack.” In the context of SSI, this allows you to write identities on the public ledger without using tokens. IOTA is a secure permissionless network which allows users to make data transfers as well as value transfers. Its main goal is to provide a generally usable, scalable, interoperable and energy-efficient network, with its main difference compared to classical blockchain protocols is the absence of miners and thus third-party validators collecting transaction fees. It uses a different technical basis, called a directed acyclic graph (DAG), that allows parallel processing of transactions. One of the emerging DLTs, although not a classical blockchain, is the IOTA protocol. – Permissionless Innovation – How to enhance your business with IOTA, 2022 Unlike with a centralized database, there is no central administrator.” “…distributed network of participants that replicate, share, and synchronize digital data and value spread across many different locations. For instance, you can build a conventional database or you may use a distributed ledger technology (DLT) implementation such as a blockchain or the IOTA Tangle. In SSI terms, a public storage is called a verifiable data registry (VDR). Explaining VDR, DIDs and VCs The verifiable data registry and introduction to the IOTA DLTįor an SSI ecosystem involving different actors communicating with one another, it is crucial to have a common public storage location to retrieve important information about identities. ![]() While the trust triangle, wallets, and governance framework are already covered in other articles, this article focuses on the technical explanation and application of the VDR, DIDs, and VCs. These blocks include verifiable data registries (VDR), the trust triangle (issuer, holder, and verifier), digital wallets and agents, decentralised identifiers (DIDs), verifiable credentials (VCs), and the governance framework. Achieving this crucial step towards privacy requires accurate application of the basic building blocks of SSI. They (the subject) can then control how their data is shared and used. ![]() We will also discuss how to get started with the technology using the IOTA Identity Protocol (a framework built by the IOTA Foundation).Īs described in the introduction to SSI, SSI is about shifting control of data from a central organisation and verifier to the identity subject (i.e., an entity, a person, organisation, or object for whom the identity is created). In this article, we will explain the technical details of how SSI and its elements work. After reading the first few articles from the Tangle Labs Blog, you should now have a good idea of what SSI (self-sovereign identity) is, how it can help to solve the problems of the “Web2” world, and some of the use cases where SSI can provide novel solutions.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |