From b5d41a38f39dd50fca1b0eec92413d0f502ebca4 Mon Sep 17 00:00:00 2001 From: infominer33 Date: Mon, 19 Nov 2018 21:11:55 -0500 Subject: [PATCH] z --- README.md | 13 ++++--------- 1 file changed, 4 insertions(+), 9 deletions(-) diff --git a/README.md b/README.md index c35210b5..544bfb0d 100644 --- a/README.md +++ b/README.md @@ -109,19 +109,16 @@ During the RWoT\ID2020 Workshop[[*](https://github.com/WebOfTrustInfo/ID2020Desi * [Smarter Signatures](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/smarter-signatures.pdf) * [Requirements for DIDs](https://github.com/WebOfTrustInfo/ID2020DesignWorkshop/blob/master/final-documents/requirements-for-dids.pdf) >"Respect Network is conducting a research project for the U.S. Department of Homeland Security, HSHQDC-16-C-00061, to analyze the applicability of blockchain technologies to a decentralized identifier system. Our thesis is that blockchains, or more generically distributed ledgers, are a potentially powerful new tool for “identity roots” — the starting points for an Internet identity. However “blockchain identity” may not fully address the core security and privacy principles needed in a complete identity system. In this case DIDs — Decentralized Identifiers rooted on a distributed ledger — may end up being a foundational building block for higher level identity management solutions. -* At this point in time DLT innovation, the United Nations Sustainable Development Goals, and the EU GDPR all came together supporting a core identirati tenant: Eliminating id data silos and empowering users regarding their digital identity. +* At this point in time DLT innovation, the United Nations Sustainable Development Goals, and the EU GDPR all came together supporting a core identirati tenant: Eliminating id data silos and empowering users regarding personal digital identity. ## Resources -Now that we understand some of the history behind decentralized identity, the rest of this will simply be organized by category. - - ### w3c ![](http://imgur.com/Lz6RTysl.png) * [World Wide Web Consortium(W3C)](https://www.w3.org/)[[t](https://twitter.com/w3c)][[g](https://github.com/w3c)] -* [Credentials Community Group](https://www.w3.org/community/credentials/)[[*](https://w3c-ccg.github.io/)] forms, hosted by +* [Credentials Community Group](https://www.w3.org/community/credentials/)[[*](https://w3c-ccg.github.io/)] * [Verifiable Claims Working Group](https://www.w3.org/2017/vc/WG/) * [Verifiable Claims Working Group Charter](https://www.w3.org/2017/vc/charter.html) * [The W3C CREDENTIALS COMMUNITY GROUP](https://www.w3.org/community/credentials/) | [W3C CCG](https://w3c-ccg.github.io/) @@ -227,18 +224,16 @@ Now that we understand some of the history behind decentralized identity, the re >Our zero-knowledge proofs are part of the [Idemix protocol](http://domino.research.ibm.com/library/cyberdig.nsf/papers/EEB54FF3B91C1D648525759B004FBBB1/%24File/rz3730_revised.pdf), where they are used to prove the possession of [Camenisch-Lysyanskaya credentials](https://eprint.iacr.org/2001/019.pdf). We also use zero-knowledge proofs in the revocation protocol, which is based on [cryptographic accumulators](https://eprint.iacr.org/2008/539.pdf). —*[What Zero Knowledge Poof Algorithm is used in Sovrin?](https://forum.sovrin.org/t/what-zero-knowledge-proof-algorithm-is-used-in-sovrin/71/2)* ->Identity Mixer is not directly (re)implemented by Sovrin, but its cryptographic foundations are very similar, and Sovrin’s implementation includes most of its extended features (predicates, multi-credential, revocation, advanced issuance…). One of the researchers who helped to create Identity Mixer is on Sovrin’s Technical Governance Board and has offered insight to keep the implementations aligned on goals and methods. There is a separate effort to provide Identity Mixer features within Hyperledger Fabric, I believe–though I don’t know the details. +>Identity Mixer is not directly (re)implemented by Sovrin, but its cryptographic foundations are very similar, and Sovrin’s implementation includes most of its extended features (predicates, multi-credential, revocation, advanced issuance…). One of the researchers who helped to create Identity Mixer is on Sovrin’s Technical Governance Board and has offered insight to keep the implementations aligned on goals and methods. >—*[How is IDEMix Implemented?](https://forum.sovrin.org/t/how-idemex-is-implemented-in-sovrin-indy/)* * [IBM Identity Mixer](https://www.zurich.ibm.com/identity_mixer/) | [blog](https://idemix.wordpress.com/) + * [idemix in Hyperledger Fabric]](https://hyperledger-fabric.readthedocs.io/en/release-1.3/idemix.html) * [Concepts and Features of Privacy-Preserving Attribute-Based Credentials](https://github.com/p2abcengine/p2abcengine/wiki/Concepts-and-features) * [AnonCreds: Anonymous credentials protocol implementation in python](https://github.com/hyperledger/indy-anoncreds) * [Anoncred — Usecase](https://github.com/hyperledger/indy-anoncreds/blob/master/docs/anoncred-usecase1.pdf) - - - ### IBM * [https://github.com/IBM-Blockchain-Identity](github.com/IBM-Blockchain-Identity)