W3C home > Mailing lists > Public > public-credentials@w3.org > December 2018

Ideas about DID explanation

From: Andrew Hughes <andrewhughes3000@gmail.com>
Date: Tue, 4 Dec 2018 13:18:55 -0800
Message-ID: <CAGJp9UanZR+WEHe3Nb_P7HddFFbrJ4YJ6GgQoVhVSV=EWXPeXQ@mail.gmail.com>
To: "W3C Credentials CG (Public List)" <public-credentials@w3.org>
Looking back on my prior notes about how to explain decentralized
identifiers, and why they are significantly different than existing
identifier schemes, I've come up with a list. This is what I noted while
you were all discussing the topic on the credentials community group calls
- I just collected it all up.

Please let me know if these points are correct and add value - if yes, then
I suggest that we should include similar bullets in the DID Explainer.

A Decentralized Identifier:
1) is a Uniform Resource Identifier (an identifier that identifies an
abstract or physical resource)
2) is a Uniform Resource Name (a URI that is intended to persistently
identify a resource, in this case the Subject)
3) may be a self-issued identifier
4) cannot be 'cancelled' by an authority
5) includes the associated DID Document, which may contain material used to
authenticate the DID, the DID Document, and the DID 'owner/controller'

a) DID authentication may use cryptographic proofs to demonstrate which
entity is the 'owner/controller'.
b) When cryptographic proofs for DID authentication are used, this enables
special properties associated with zero knowledge proofs such as selective
disclosure, <<what is this list?>>
c) Authentication mechanisms, keying material, service endpoints, etc.
specified in the DID Document can be managed without requiring the DID
value to change.
d) The ability to manage keying material without disturbing the DID value
enables key rotation and key recovery mechanisms
e) The registry of DID Methods accepts all valid DID Method Schemes,
therefore the DID namespace may be extended to cover existing and
previously-unknown identifier schemes or technologies.

A DID also
i) may be a Uniform Resource Locator if it is resolved to locate a resource
on the Web.
ii) can be directly used, referenced and resolved in any DLT by writing a
new DID method

Each of the lists kinda speaks to a slightly different audience to address
their concerns and questions. The implications of each bullet could also be
expanded if needed (e.g WHY is it significant that a DID cannot be
cancelled by an authority?, etc)

What do you think? Is this close?
It assumes that the reader is familiar with namespace characteristics,
namespace management, key management, resolvers. And generally,
issues/strengths with them. Which probably describes our current target
audience. If the 'cryptographic' bullets are enhanced then it can also
speak to 'crypto-people'.

Thanks to Markus for helping refine this but, of course, any
misunderstandings or errors are all mine.

*Andrew Hughes *CISM CISSP
*In Turn Information Management Consulting*

o  +1 650.209.7542
m +1 250.888.9474
1249 Palmer Road, Victoria, BC V8P 2H8
*Digital Identity | International Standards | Information Security *
Received on Tuesday, 4 December 2018 21:19:30 UTC

This archive was generated by hypermail 2.3.1 : Tuesday, 4 December 2018 21:19:30 UTC