Decentralized Identity Standards

Image taken from https://www.w3.org/TR/did-core/ WHAT IS A DID
Image taken from https://www.w3.org/TR/did-core/ THE DID APPLICATION
Image taken from https://www.w3.org/TR/vc-data-model/ VERIFIABLE CREDENTIAL ROLE FLOW
OrganizationSpecificationDescription
W3CDecentralized Identifiers (DIDs)Core architecture, data model, and representations

W3CDecentralized Identifier (DID) ResolutionDID resolution specification
W3CDID Spec RegistriesOverview of DID methods
W3CDID Use CasesNice DID use case exploration with respective assessment and flow diagrams
W3CDID RubricAssessment of different methods
W3CDID KeyNon ledger based approach for legacy public-private key approaches
W3CDID Web
W3CWebCryptoApply SSI cryptographically functions in web browser via Javascript
W3CWebAuthnuse SSI for authentication in web browser
W3CWebKMSBuild key-management-system used on SSI
W3CVerifiable Credentials (VCs)Specify the general flow and procedure for verifiable credential (VC)
W3CVC Use CasesUse cases for VC
W3CVC JSON Schemasvery basic 🙁
W3CCredential Revocation List
W3CCredential Handler API (CHAPI)
W3CVerifiable Presentation Request
W3CJSON Linked Data (JSON-LD)Give semantic to VC keys
W3CCBOR Linked Data (CBOR-LD)
W3CUniversal Wallet
W3CEncrypted Data Vaults (EDVs)
W3CConfidential Storage
DIF + Hyperledger AriesDID Peer
DIF + Hyperledger AriesDIDComm Messaging
DIFVerifiable Presentation Exchange
DIFCredential Manifest
DIFSidetree
IETFJWA/JWKJSON representation of crypto keys
IETFJWT/JWS/JWE
IETFJSON Web Message (JWM)
HyperledgerAries RFCs
HyperledgerThe Trust Over IP (ToIP) Stack
HyperledgerChained Credentials
HyperledgerData OverlaysThe schemas
OASIS + HyperledgerDecentralized Key Management System (DKMS)

This entry was posted in Uncategorized. Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *