decentralized-id.github.io/_posts/topics/2018-12-21-self-sovereign-identity.md
2023-06-23 04:27:20 +05:30

32 KiB
Raw Blame History

title excerpt description image permalink canonical_url redirect_from categories tags last_modified_at
Self Sovereign Identity (SSI) In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet. Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make peoples lives better. /images/sovereign-identity.webp /topic/self-sovereign-identity/ https://decentralized-id.com/topic/self-sovereign-identity/
/literature/self-sovereign-identity/
/self-sovereign-identity
/self-sovereign-identity/
Topics
Self Sovereign Identity
Laws of Identity
Literature
RWoT
IIW
Learning Machine
Sovrin Foundation
Evernym
2023-06-22

About Self Sovereign Identity

  • [Video] Exploring the Decentralized Web, Episode 4: Digital Identity 2022-01-05 Filecoin Foundation

    Episode 4 explores the relationship between authentication and authorization, the rise of single sign-on platforms, and the advantages of and use cases for self-sovereign identity. Guests include Brian Behlendorf, Rainey Reitman, Danny O'Brien, Sarah Friend, Wendy Hanamura, Andrew Hill, and Brad Kam.

  • #SSI gives its owner control over some aspects of identity, but not all 2021-12-14 Jolocom

    Connections, relationships, and third-party issued credentials are not entirely self-sovereign, nor should they be. #JolocomAdvent #AdventCalendar

  • A Future Built on Decentralized Identity 2021-12-22 Bloom

    Decentralized identity is an emerging concept becoming more popular for online consumers by eliminating the need to pass personal identifiable information (PII) to an ever-increasing number of companies. However, in practice, decentralized identity has only existed for a handful of years, and its potential is still being discovered. So how did we get here?

  • SSI Essentials: Everything you need to know about Decentralized Identity 2021-11-29 Gataca

    Solving the identity paradox: the tradeoff between privacy, security, & user experience

  • Self-Sovereign Identity Crisis 2021-11-23 Lionsgate

    Through deceptive marketing practices the first-movers in the Digital ID market have done-away with the sovereignty. As a result a burgeoning new industry is experiencing a Self-Sovereign Identity Crisis.

  • Evolution of Self-Sovereign Identity (SSI) 2021-11-16 LionsGate

    The public keys of the user and the third-party organization for verifying the digital signature are recorded in a distributed ledger, and the user of the identity information verifies the provided information using them. In this way, users can control their own identity information without relying on a specific central administrator.

  • [Video] Understanding the SSI Identity Model with Verifiable Credentials 2021-11-13 Manning

    Drummond Reed, an expert in Internet identity, security, privacy, and trust frameworks, explains the basic building blocks of SSI and how this new identity model fundamentally works.

  • What is Self Sovereign Identity 2021-10-13 Florian Strauf

    the digital representation of the identification process we know from the physical world. Things like showing our drivers license to prove we are allowed to drive, or sending a bank statement to a real estate agent to prove our income and account balance.

  • [Video] Is Self Sovereign Identity Going Exponential - With Andrew Baker and A Suprise Guest 2021-10-27 Colin Iles

    despite the technological revolution we are living through, identity management is still as objectionable as ever, which is allowing criminals and companies (particularly the social media giants) to know more about you than can ever be justifiable.

    In this discussion I ask Andrew Baker, AWS's Head of EC2 Engineering and a surprise guest, to share their views on whether Self Sovereign Identity management could be the solution and how likely it is

  • Decentralizing Identity - Taking Back Control 2021-10-13 Madigan Solutions

    In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet.

  • What is Self Sovereign Identity 2021-10-13 Florian Strauf

    The important thing in SSI is that instead of a stamp on the plastic card, the credential is signed cryptographically by the issuer, enabling anyone to verify who issued the credentials. This makes verification much easier than in the physical world.

  • [Video] Self-Sovereign Identity (SSI) Explained 2021-09-13 Animo

    In this video, we explain how third parties get to see a lot of personal information about you that they don't really need. Whether it is your local supermarket or your new job, you're often sharing a lot of data when all they really need is a very simple yes or no answer

  • Self-Sovereign Identity: a Primer 2021-08-03 Hartmut Obendorf

    Digital trust is often centralised, with select, well-known entities providing an anchor of trust that is propagated to everyone else; you are using this mechanism as you read this paragraph, having accessed a https: URL to find this article on your trusted platform, Medium.

  • Self-Sovereign Identity: Whats the Big Deal? 2021-07-06 Affinidi, Hackernoon

    Do you know where your digital credentials like your full name, date of birth, phone number, government ID, and other Personally Identifiable Information (PII) are stored online, and how they are used?

  • A beginners guide to self-sovereign identity (SSI) 2021-06-02 Domilabs

    An issuer makes claims or assertions about a user. These claims are bundled together into verifiable credentials and given to the user, who stores them in their digital wallet. From there, they can decide which verifiers they want to present these credentials to.

  • Distributed, Decentralized, Self-Sovereign Identity 2021-04-22 Condatis

    With DID already being implemented, this new and exciting technology is due to shake up the digital identity space. We expect decentralized identity to continue making headway, with more and more sectors and businesses adopting the technology.

  • [Video] Karyl Fowler (Transmute) and Juan Caballero (DIF) present Intro to SSI at #IIW31 2020-10 Keryl Fowler, Juan Caballero Slides

    Karyl and Juan revisited their slide deck from #IIW30 to give an overview of decentralized identity first as a "philosophy" at the confluence of ideological currents (Juan), and then as a set of specific emerging technologies which unlocks new mental models and business models that are still coming into focus sector by sector (Karyl). There follows a brief overview of educational resources, including some products of DIF's recent educational "content sprint," and a wide-ranging Q&A including podcast recommendations and how to navigate open standards for the first time. The slides are here, in downloadable and hyperlinked PDF form:

  • What Is Self-Sovereign Identity? 2020-04-28 Trinsic

    Self-sovereign identity is the marriage of real identity with the digital world that will ultimately make peoples lives better.² Its still in its infancy, and there is a long road ahead to truly make digital identity as legitimate and nuanced as a real-world identity.

  • Explaining SSI to C-suite executives, and anyone else for that matter John Phillips 2020-02-18 SSIMeetup

    John Phillips from 460degrees in Australia has been exploring with his team for more than two years for a way to describe Self-Sovereign Identity (SSI) that was easy to understand. We think he has found a good method to make SSI easy to understand for any C-suite executive and business people that goes beyond the technology.

  • How Verifiable Creds, Decentralized Identifiers and Blockchain Work Together for a Safer Internet 2021-08-22 Fluree, Hackernoon

    Verifiable credentials, DIDs, and blockchain are evidence of what's to come: Web3, a more secure, widespread, machine-to-machine internet.

  • Introduction to Decentralized Identity IOTA Wiki

    Decentralized Identity or Self-Sovereign Identity (SSI) defines a new method for identity management and authentication. It removes the centralized aspects and puts the Identity subject in full control over its own identity. Decentralized Identity provides a solution for the increasing amount of database breaches, the lack of trust in any digital setting, and the increasingly difficult to comply with privacy legislation, such as GDPR.

  • The Three Pillars of Self-Sovereign Identity 2019-12-10 Evernym

    When implemented for the purpose of identity, everyone everywhere can issue, hold, and verify any credentials about anything. This means no more proprietary silos “owning” your identity. The combination of human and cryptographic trust in this environment means that you can finally get increased security and reduced friction at the same time.

  • Self-Sovereign Identity — wiki.p2pfoundation 2019-11-13 P2P Foundation

    The beauty of sovereignty isn't complete and total control, but rather balance of power that leads to negotiations about the nature of the relationships between various entities in the system."

  • Self-Sovereign Identity 2019-06-17 Living Library

    Identification document (ID) is a crucial part of every individuals life, in that it is often a prerequisite for accessing a variety of services — ranging from creating a bank account to enrolling children in school to buying alcoholic beverages to signing up for an email account to voting in an election — and also a proof of simply being.

  • [video] What is self-sovereign identity? 2019-05-31 Evernym
    • A brief history and overview of self-sovereign identity / decentralized identity
    • The top consumer-focused and business-focused benefits of SSI
    • Real-world examples of SSI in action
    • How organizations can the journey to a decentralized future
  • Self-sovereign identity: 3 key questions 2019-03-19 CSO Online

    SSI is on the extreme end of the digital identity spectrum. Its focus is putting control back in the hands of you, the user. But SSI is not the only way to skin a cat.

  • Self-Sovereign Identity: Shifting the Locus of Control 2019-03-02 Tim Bouma

    Simply put, the old (centralized and federated models) the locus of control was between the other parties that could make decisions about me, whether I was in the picture or not. In the new model (self-sovereign identity), the user is put into the centre of his/her own locus of control. See above.

  • The Three Models of Digital Identity Relationships — How self-sovereign identity (SSI) is different, and why its better 2018-08-24 Timothy Ruff, Evernym

    SSI is powerful yet elegant, bold yet familiar, and through it we can finally break free from the paradox of having to sacrifice security for user experience (or vice versa): we can have both, and at levels vastly improved over the status quo. Wonderfully, SSI also has life-altering potential for at-risk populations around the globe.

  • Inevitable Rise of Self-Sovereign Identity 2018-03-28

    The evolution of internet identity is the result of trying to satisfy three basic requirements:

    1. Security - the identity information must be protected from unintentional disclosure;
    2. Control - the identity owner must be in control of who can see and access their data and for what purposes;
    3. Portability - the user must be able to use their identity data wherever they want and not be tied into a single provide
  • Self Sovereign Identity 2018-01-23 Kaliya 'Identity Woman' Young

    The Social Human Fabric: This is critical to why we actually are having these breakthroughs woven together to create the open standards for self-sovereign identity to become real. A dedicated group of individuals that have been actively meeting face to face twice a year for over 12 years at the Internet Identity Workshop, and other industry events like the RSA Conference, Cloud Identity Summit and the new kid on the collaboration block Rebooting the Web of Trust.

Aspects of SSI

Security

  • What is decentralized identity? 2022-07-06 CSO Online

    The DID model allows you to establish a relationship between your private key (your blockchain wallet) and your citizenship.  The issuing authority signs off on the truth of your claim and, thereafter, third parties can check your public key to see that the holder of the private key is in fact a British citizen.

  • Getting Data Security Right 2022-05-23 Alan Michel

    data security is about system-wide design, where many different elements need to fit together to create a working whole.

  • Impact of Self-Sovereign Identity on Cybersecurity 2022-04 Security Boulevard

    How does this change the world of cybersecurity protection? Typically, bad actors approach cybersecurity attacks by developing solutions that exploit the attack vectors of their target victims.

    There are 4 attack vector categories to self-sovereign identity that map directly to each element: Issuer, Holder, Trust Registry and Verifier.

  • ID Verification Threats On the Horizon 2022-03-31 Liminal Podcasts

    Cognito's CEO Alain Meier joins the State of Identity host Cameron DAmbrosi to dive into why industries beyond financial services are now in the market for identity verification. They also unpack the impact of synthetic identity fraud across verticals, and how platforms find the balance when building their onboarding processes.

  • Security, Silos, and Sovereignty 2021-03-12 Daniel Hardman

    Why portable security is the sleeper — but killer — feature for SSI

    whats cool about DIDs (besides their self-service creation) is that their metadata is cryptographically verifiable. That means that anyone in the world can tell whether the metadata is legit, in the blink of an eye, just by asking software to check some math. And it also means that you can build a transport-independent, tamper-proof, encrypted communication channel with whoever controls a DID.

  • How Decentralized Identifiers Will Shape the Future of Identity 2020-11-09 HackerNoon

    Hackers value personal information the most. 96% of hacking groups primary motive is intelligence gathering. Researchers at privacy website PrivacyAffairs.com found that you can obtain a person's full identity for the low price of $1,275.

Literature

  • [WhitePaper] Self Sovereign Identity 2022-05-10 Phil Windley, Blockchain Research Institute

    In this research, one of the leading experts and thought leaders in the digital identity space brings his latest thinking to enterprise innovators. He explains the value of the relationship view of identity, the nature of authentic digital relationships, the trust bases of identity systems, and the architecture of the identity metasystem, including decentralized identifier communication and the self-sovereign Internet. He then explores how to operationalize digital relationships and the potential of generative identities (e.g., verifiable credentials) and credential exchange. He concludes with a deep dive into self-sovereign identities in production: the UK National Health Service staff passport, Bonifiis MemberPass for credit unions, the International Air Transport Association Travel Pass, and others. The project is a must-read for enterprise leaders looking to understand their opportunities in identity platforms and applications.

  • [Whitepaper] Self-Sovereign Identity Foundations, Applications, and Potentials of Portable Digital Identities 2021-09 Fraunhofer Institute for Applied Information Technology FIT

    This paper analyses the SSI paradigm's conceptual characteristics and technical aspects and presents three use cases as examples. It becomes clear that SSI offers advantages in individual control, data security, and full portability of identities between different services. For example, forgeryand tamper-proof digital versions of important personal documents such as ID cards, passports, birth certificates or medical confirmations can be created. However, the use cases are not limited to personal SSI but can also be, for example, digital identities of organizations and physical objects in the context of IoT solutions. This is particularly important in connection with the comprehensive digitization of companies.

  • Digital identities steps on the path to an ID ecosystem 2021-03-18 Bankenverband This article is very very good in articulating the big picture of how SSI systems relative to older system and emerging fragmetned systems.

    An answer to these challenges is an ecosystem in which digital identity data can be exchanged in a way that is secure, reliable, scalable and convenient. This will have a positive impact on the economic future of Germany and Europe while at the same time enhancing the private sphere of the individual.

  • The Basic Building Blocks of SSI 2020-07-29 Drummond Reed, Alex Preukschat Manning

    In many cases these core concepts have been established for decades. Whats new is how theyre put together to create a new model for digital identity management. The purpose of this article is to quickly familiarize you with these seven basic building blocks from a conceptual and technical point-of-view.

    • Verifiable credentials (aka digital credentials)
    • Issuers, holders, and verifiers
    • Digital wallets
    • Digital agents and hubs
    • Decentralized identifiers (DIDs)
    • Blockchains
    • Governance frameworks (aka trust frameworks)

Background

**Greatly influential on later thinking around digital identity and the **development of Self Sovereign Identity

  • Kim Cameron Identity Laws 2005-05-13 IdentityBlog Whitepaper

    Summary: Understand the dynamics causing digital identity systems to succeed or fail in various contexts, expressed as the Laws of Identity. Together these laws define a unifying identity metasystem that can offer the Internet the identity layer it needs. (14 printed pages)

**Shows an early use of 'sovereign' in relation to our internet **identities

  • What is Sovereign Source Authority? 2012-02

    What is required for structural integrity of a Sovereign domain originated of, by, for people?
    A recursive signatory is starting point for an accurate self-sourced method that repeats, generation after generation, person after person, such that no second-class process supersedes the inherent requirement for functional Rights.

**The term "Self Sovereign Identity" started becoming widely used in **2014

  • The Windhover Principles for Digital Identity, Trust, and Data 2014-09-21 Institute for Data Driven Design
    1. Self-Sovereignty of Digital Identity and Personal Data: Individuals and groups should have control of their digital personal identities and personal data.
  • HubID First to Deploy Windhover Principles and Framework for Digital Identity, Trust and Open Data 2014-10-20

    HubID, the self-sovereign digital identity system at the core of Hub Culture and the Ven currency, is the first consumer application to deploy the Windhover Principles and new frameworks for digital identity, trust and open data. The core technology has been in development with the Open Mustard Seed framework and quietly began use in July 2014 following a development announcement with ID3 in January 2014 at the World Economic Forum in Davos.

This article popularized the idea and term Self Sovereign Identity

  • The Path to Self-Sovereign Identity 2016-04-25 Christopher Allen Popularized the concept of Self-Sovereign Identity

    Since then, the idea of self-sovereign identity has proliferated. Loffreto has blogged how the term has evolved13. As a developer, he shows one way to address self-sovereign identity: as a mathematical policy, where cryptography is used to protect a users autonomy and control. However, thats not the only model. Respect Network instead addresses self-sovereign identity as a legal policy; they define contractual rules and principles that members of their network agree to follow14. The Windhover Principles For Digital Identity, Trust and Data15 and Everynyms Identity System Essentials16 offer some additional perspectives on the rapid advent of self-sovereign identity since 2012.

Early influential thinking on SSI

  • A Technlogy-Free Definition of Self-Sovereign Identity 2016-10 Joe Andrieu

    This paper explores what selfsovereign identity means independent of technology: what people need from independent identity capabilities. I want to understand how such a system enables both individuals whose identities are in play (subjects), as well as those who use those “identities” to correlate interactions across contexts (observers). I start with grounding individual sovereignty in the Enlightenment and identity in its core function of correlation, then propose core characteristics of a selfsovereign identity system.

  • 10 Principles of Self-Sovereign Identity 2016-10-23 Rebooting Web of Trust
    1. Existence. Users must have an independent existence. Any self-sovereign identity is ultimately based on the ineffable “I” thats at the heart of identity. It can never exist wholly in digital form. This must be the kernel of self that is upheld and supported. A self-sovereign identity simply makes public and accessible some limited aspects of the “I” that already exists.
  • Schutte's Take 2016-10-26 Rebooting Web of Trust (criticism of the 10 principles)

    A perceived sense of “a self” is the product that emerges from the interactions of these various agents.

    Their coherent operation takes form in the world in ways that enable other actors to treat them as if they were a single actor rather than the complex set of collaborations amongst different processes that they actually are.

    Of course, this is a heuristic, and like all heuristics, it may be a useful shortcut, but that doesnt mean it accurately reflects reality.

    In truth, our “self” is constantly interacting with agents both externally and internally, and these transform the functioning (and even the perceived boundaries) of the self.

  • The Domains of Identity & Self-Sovereign Identity -- Presentation from Kaliya Young 2018-11-06 New America

    Kaliya Young (“The Identity Woman”) explains 16 domains of identity -variously related to government, civil society, commerce, employment, and the data broker industry- as presented in her recent report. Kaliya then explains how SSI can fundamentally alter the relationships within these domains.

Resources