distributed ledgers finally brought me a usable digital
play

Distributed ledgers finally brought me a usable digital identity! - PowerPoint PPT Presentation

Distributed ledgers finally brought me a usable digital identity! Richard Esplin https://creativecommons.org/lic enses/by-sa/4.0/ February 2019 Agenda What is self-sovereign identity Verifiable credentials Hyperledger Indy


  1. Distributed ledgers finally brought me a usable digital identity! Richard Esplin https://creativecommons.org/lic enses/by-sa/4.0/ February 2019

  2. Agenda ● What is self-sovereign identity ● Verifiable credentials ● Hyperledger Indy ● Governance

  3. What is Self Sovereign Identity?

  4. Carriers of Identity

  5. Digital Identity

  6. AND INTRODUCED TREMENDOUS PROBLEMS

  7. Ten Principles of Self-Sovereign Identity 1. Users must have an independent existence. 2. Users must control their identities . 3. Users must have access to their own data. 4. Systems and algorithms must be transparent . 5. Identities must be long-lived . 6. Information and services about identity must be transportable . 7. Identities should be as widely used as possible. 8. Users must agree to the use of their identity. 9. Disclosure of claims must be minimized. 10. The rights of users must be protected. Christopher Allen, 2016 http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html

  8. Also Known As User-Centric Identity User-Controlled Identity User-Owned Identity Bring Your Own Identity

  9. Verifiable Credentials

  10. W3C Verifiable Credentials Ecosystem Issuer Holder Verifier Wallet Issues Presents Signs Countersigns Verifies Credential Credential Credential Credential Signatures Decentralized Identifiers (DIDs) Public Blockchain or other Decentralized Network

  11. Sovrin Verifiable Credentials Ecosystem Pairwise Pairwise Pseudonymous Pseudonymous Issuer Prover Verifier DIDs DIDs Wallet Issues Presents Signs Countersigns Verifies Credential Credential Credential Credential Signatures Decentralized Identifiers (DIDs) Public Blockchain

  12. Sovrin Verifiable Credentials Ecosystem Zero Zero Know-ledge Know-ledge Encoding Proof Issuer Prover Verifier Wallet Issues Presents Signs Countersigns Verifies Credential Credential Credential Credential Signatures Decentralized Identifiers (DIDs) Public Blockchain

  13. Shopping for a tiger

  14. Verify our story! Credential from: Tiger Stewardship Advocates Aaliyah’s Claim: International tigers distributed by Aaliyah’s International are captive bred and not suitable Save a tiger; for reintroduction to the wild. make a friend! Inspection Date: December 8, 2018 Inspection Number: 1576295029659

  15. Connect to Credential request: finalize Aaliyah’s International Would like: Connecting to: ● Proof of age ● Permit for owning an Aaliyah’s International exotic species ● Proof of tiger handler training ● Certification of veterinary availability

  16. Credential from: Credential from: Credential from: Utah State University Salt Lake City, Utah, United Richard Esplin States Claim: Claim: Richard Esplin Claim: ● Older than 18 completed the following classes Richard Esplin is permitted to Provided by: Utah possess an exotic species Department of Motor Computer Science (B) within our city. Vehicles Tiger Handling (C) ● Permit for owning an Ecology (C) Date: January 10, 2019 exotic species Wildlife Management (D) Provided by: Salt Lake City, Utah, Date: June 16, 2018 United States ● Proof of tiger handler Credential from: Credential from: training Utah Tiger Veterinarians Utah Division of Motor Vehicles Provided by: Utah State University, Claim: Claim: United States Richard Esplin is licensed to drive Richard Esplin is a customer of ● Certification of veterinary our business in good standing. availability Address, Birthdate, Restrictions … Provided by: Date: December 15, 2018 Utah Tiger Veterinarians Issue Date: December 15, 2018

  17. Credential from: Aaliyah’s International Claim: Your delivery will be an employee from done by: Speedy Delivery Incorporated Speedy Delivery may act on our behalf Incorporated Date range: January 16, 2019 to January 31, 2019

  18. Credential from: Richard Esplin Claim: an employee from Speedy Delivery Incorporated may access a porch delivery box in my possession. Date range: January 16, 2019 to January 31, 2019

  19. Credential from: Update: Credential from: Aaliyah’s International Aaliyah’s International delivery service has Claim: changed. Claim: an employee from an employee from Speedy Delivery Advanced Delivery Revoked Your delivery will be Incorporated may act on our behalf done by: may act on our behalf Advanced Delivery Date range: Date range: January 16, 2019 January 16, 2019 to January 28, 2019 to January 31, 2019 January 31, 2019

  20. Credential from: Credential from: Richard Esplin Richard Esplin Claim: Claim: an employee from an employee from Speedy Delivery Advanced Delivery Incorporated Revoked may access a porch delivery may access a porch delivery box in my possession. box in my possession. Date range: Date range: January 16, 2019 January 16, 2019 to to January 31, 2019 January 31, 2019

  21. Credential from: Credential from: Richard Esplin Aaliyah’s International Claim: Claim: a porch delivery box in my the following employee of possession accepted a package Advanced Delivery is acting as our representative From: Julio Valdez Name: an employee of Julio Valdez Advanced Delivery acting as a representative for Date range: Aaliyah’s International January 28, 2019 to Date: January 30, 2019 January 29, 2019

  22. Credential from: Credential from: Richard Esplin Richard Esplin Claim: Claim: Luciana Black Luciana Black has access to a porch delivery box has access to my front door in my possession Number of times: Number of times: Unlimited 1 Date range: Date range: January 16, 2019 January 16, 2019 to to January 31, 2019 January 31, 2019

  23. Note: The author does not advocate household tiger ownership. No tigers were harmed in the making of this story.

  24. Purpose-Built Public Blockchain Engineered solely for privacy-enhancing self-sovereign identity Global public utility that no single entity owns or controls Open source, open standards, open governance Fast, efficient—based on Hyperledger Indy

  25. Hyperledger Indy

  26. Hyperledger Indy Public Permissioned Blockchain Custom built for Identity RBFT Consensus

  27. Hyperledger Indy Catalyst Wrappers SDK Rust LibIndy Python LibVCX Agents NodeJS Ursa LibNullPay Java Issuer Edge Wallet ObjectiveC Mobile Edge Cloud Thin Plenum Node Static

  28. The problem is correlation Correlation = Linkability Attribute based correlation Identifier-based Correlation Signature or Hash-based Correlation Timing Inferences Including if Multiple Parties Share Information (Collusion)

  29. Ensuring privacy The prover chooses when to disclose. The prover selects what should be disclosed. Don’t share more attributes than necessary Don’t share with more precision than necessary The verifier and the issue do not communicate. The prover can present to any verifier. A proof can hold multiple credentials from multiple issuers. A credential is anonymously revocable.

  30. More Than Code

  31. All blockchains are governed—whether it is implicit or explicit .

  32. Creating Trust Moral Pressure Reputational Pressure Institutional Pressure Security Systems Bruce Schneier, 2012 Liars and Outliers: Enabling the Trust that Society Needs to Thrive

  33. The BLT Business Legal Technical

  34. A credit card network relies on a trust framework to establish trust between the parties

  35. The trust in any SSI digital credential will depend on the trust framework under which it is issued Digital Credential

  36. Every digital credential intended to serve more than one issuer/verifier needs a domain-specific governance framework. It specifies what issuers will issue what credentials under what policies to achieve a community’s trust objectives. — Drummond Reed Chief Trust Officer, Evernym

  37. Digital Governance Credential Framework 40

  38. Sovrin Governance Framework

  39. A Usable Digital Identity is Self-Sovereign ● Is built with open source and open standards ● Have a decentralized root of authority (blockchain) ● Keeps personal data off the public ledger ● Allows selective disclosure ● Resists correlation ● Exists within a trust framework

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend