14 KiB
date | title | excerpt | layout | permalink | canonical_url | redirect_from | categories | tags | last_modified_at | header | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
2019-03-03 | Web Standards and the Emerging Decentralized ID Stack | If you’re willing to put up with a lot of work for incremental improvements then step up and join a standard. Whether that is a (relatively) fast moving standard group like OASIS (www.oasis-open.org) or a slower but more international group like ISO you will learn. You’ll also benefit from working with experts. These experts donate their time and are more than happy to provide ideas, guidance, and leadership. | single | web-standards/ | https://decentralized-id.com/web-standards/ |
|
|
|
2022-12-16 |
|
Check out this twitter list I made for identity related standards development bodies.
Big Picture
- Why Engage with Standards?
too many people complain about problems but don’t step to Fix It!. There are certainly a lot of flawed standards – but they make interoperability possible – not perfect – but possible. If you haven’t used them then you have no right to complain that they are too complex, too simple (even in the same standard) or too domain specific – or any of the other rants and raves that go on.
If you’re willing to put up with a lot of work for incremental improvements then step up and join a standard. Whether that is a (relatively) fast moving standard group like OASIS (www.oasis-open.org) or a slower but more international group like ISO you will learn. You’ll also benefit from working with experts. These experts donate their time and are more than happy to provide ideas, guidance, and leadership.
- Who Are the Identerati? - ForgeRock
You’re familiar with digital identity standards like OpenID Connect, OAuth, and User-Managed Access, fundamental elements of privacy and security on the internet. But have you ever wondered how they came to be? A lot of work on these protocols went on (and goes on) behind the scenes at the Internet Identity Workshop (IIW), a bi-annual gathering of identity experts where we work on improving the identity systems that make the web run. It’s a great event that’s flown under the radar, so I’m excited to share a new documentary on IIW, “Not Just Who They Say We Are: Claiming our identity on the Internet”. This short film shines a light on the stealth community of “Identerati” at IIW that are defining and refining digital identity.
- Manifesto: Rules for standards-makers by Dave Winer
I've used all kinds of formats and protocols in a long career as a software developer, even created a few. My new manifesto summarizes what I've learned about what works and what doesn't.
{% include figure image_path="/images/Who-Runs-the-Internet-graphic.webp" alt="https://es.wikipedia.org/wiki/Archivo:Who-Runs-the-Internet-graphic.png" caption="Internet Governance" %}
Decentralized Identity Stack
- Hyperledger Identity Working Group - Identity Standards
- A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems NIST CYBERSECURITY WHITE PAPER (DRAFT) BLOCKCHAIN IDENTITY MANAGEMENT APPROACHES JULY 9, 2019
Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.
- Building Blocks for a New Architecture by Tim Bouma
First, you will see the Issuer, Holder and Verifier. This is the archetypal pattern of the decentralized architecture. An issuer issues something to a holder, who then presents it to a verifier, who make a decision. A simple example: government(issuer) issues you a passport (holder), which you present to a border control officer (verifier) who lets you through the gate. When you look at all the use cases (described above), they all fall into this pattern.
- The Self-Sovereign Identity Stack by Oliver Terbu OSI
Layer Examples Application Selective Disclosure, music app, rideshare service, extensions, etc. Implementation DIF Hubs, Indy Agents, uPort app, etc. Payload JSON-LD, JWT, CWT Encoding ProtoBuf, Cap'n Proto, MessagePack, JSON, CBOR, etc. Encryption Ciphersuite, JWE, etc. DID AuthN Key ownership, verification, challenge/response, etc. Transport QR Code, HTTP, BLE, NFC, FTP, SMTP, etc. DID Resolution DID -> DID Doc / service and key resolution DID Operations CRUD support for a DID Doc Storage Optional, separate storage of DID metadata Anchor Bitcoin, Ethereum, Veres One, Sovrin, etc. - Overview of Decentralized Identity Standards, Nader Helmy
we can think of each specification as addressing one or more of the SSI “building blocks” that we described above. In some cases a standard may be a bridge between layers, enabling a closer link between connections, data, and keys, making the ecosystem more secure as a whole. What you will find below is a list of all relevant standards, links to every specification, the organizations they belong to, their relationship to the ecosystem, and their relative maturity as internet technologies. {% gist c8a20c534d3cf8f65a9b34ce2ad81725 Decentralized%20Identity%20Standards.md %}
- Distributed ID learning path – Christina Yasuda (from work navigating the VC-Spec Map)
Describes pre-requisite knowledge, including JSON, JSON-LD, JWT, JWS, JWK, JWA, and sometimes CBOR. She then goes on to break down knowledge areas beginning with the basics: DID-Core, DID-Resolution, DID-Spec, DID Use-Cases. Next, she covers Verifiable Credentials with VC-Data Model, VC Use-Cases, and VC-Implementors Guide, and also Transport, Credential Presentation, and Other Data Formats.
- The Flavors of Verifiable Credentials – Linux Foundation Public Health Blog.
The differences between the different flavors of VCs for technically inclined readers. It elaborated on the differences between JSON and JSON-LD and articulated differences between the two different implementations of ZKP style credentials. The ‘Journey of a VC’ section articulated all steps where VCs are active and highlighted the differences in how different VC flavors ’behave’.
The Story of Open SSI Standards - Drummond Reed/Evernym SSIMeetup.org[ϟ]
Learn
- Anonymous Credential Part 1: Brief Overview and History – Finema
An anonymous credential (Anoncred), which is also known as an attribute-based credential (ABC), is a concept for a digital credential that provides a credential holder maximal privacy and an ability to selectively disclose their personal information.
- Anonymous Credential Part 2: Selective Disclosure and CL Signature – Finema
selective disclosure and an anonymous credential (Anoncred) relies on an efficient signature scheme that supports multiple messages with a single signature. One such signature scheme is known as CL signature that is named after Jan Camenisch and Anna Lysyanskaya […] CL signature popularized Anoncreds, and it also served as a cryptographic building block in Identity Mixer (Idemix) and Hyperledger Indy projects.
- Anonymous Credential Part 3: BBS+ Signature – Finema
Compared to the CL signature, the BBS+ signature has much shorter keys and signatures for a comparable level of security. As a result, the BBS+ signature enables fast implementation for anonymous credentials. It can be used in combination with signature proof of knowledge to hide some of credential attributes/messages in a zero-knowledge fashion.
- Web of Trust 101 – Mattr
The emerging “Web of Trust” is an idea that has been around since the dawn of the internet. To explain what motivated its creation, let’s take a look at how trust on the internet functions today.
- Verifiable Data – Mattr (and Verifiable Relationships, Verifiable Processes, Verifiable Credentials, Semantics and Schemas)
refers to the authenticity and integrity of the actual data elements being shared.
- Semantic Web – Mattr
The semantic web is a set of technologies whose goal is to make all data on the web machine-readable. Its usage allows for a shared understanding around data that enables a variety of real-world applications and use cases.
- Selective Disclosure – Mattr
An important principle that we want to achieve when designing any system that involves handling Personally Identifiable Information (PII) is to minimize the data disclosed in a given interaction. When users share information, they should be able to choose what and how much they share on a case-by-case basis
- Trust Frameworks – Mattr
Trust frameworks are a foundational component of the web of trust. A trust framework is a common set of best practice standards-based rules that ensure minimum requirements are met for security, privacy, identification management and interoperability through accreditation and governance.
- Beginners Guide to JWTs – Okta
A JWT is a structured security token format used to encode JSON data. The main reason to use JWT is to exchange JSON data in a way that can be cryptographically verified. There are two types of JWTs:JSON Web Signature (JWS)JSON Web Encryption (JWE)The data in a JWS is public—meaning anyone with the token can read the data—whereas a JWE is encrypted and private. To read data contained within a JWE, you need both the token and a secret key.
- Verifiable Credentials Issuance – Blockster
When an issuer creates a verifiable credential, it contains following information:
- Who has issued – DID of the Issuer
- To whom it is issued – User Identifier
- Attributes of the credential – Details of the credential being Issued
- When it is Issued – Date of issuance
Assorted
NIST
- FIPS PUB 201-3 (DRAFT) Federal Information Processing Standards Publication (Supersedes FIPS 201-2)
Personal Identity Verification (PIV) of Federal Employees and Contractors
Decentralized Key Management
- Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle - Drummond Reed
- Recommendations for Decentralized Key Management Systems
DKMS - An Essential Missing Piece of the SSI Puzzle. Drummond Reed. SSIMeetup.org
- Agent to Agent Communication: Daniel Hardman explains the goals of agent to agent communication