- From: Tom Jones <thomasclinganjones@gmail.com>
- Date: Sat, 8 Dec 2018 13:07:31 -0800
- To: agropper@healthurl.com
- Cc: Andrew Hughes <andrewhughes3000@gmail.com>, kim@learningmachine.com, public-credentials@w3.org
- Message-ID: <CAK2Cwb5E_ODLatw6GzyYHc4OtEQvPr_vcAs2awr4YBxqEVh5aQ@mail.gmail.com>
I believe so. Peace ..tom On Sat, Dec 8, 2018 at 1:01 PM Adrian Gropper <agropper@healthurl.com> wrote: > The ability to sign a prescription credential without having to update a > DLT depends on the signature remaining verifiable even after key rotation, > doesn't it? > > Adrian > > On Sat, Dec 8, 2018 at 4:00 PM Tom Jones <thomasclinganjones@gmail.com> > wrote: > >> a scenario that is close to our hearts today is a DID authorizing access >> to a claim (attribute) with a signed stipulation (Mary/Kantara would call >> it a user submitted term). If the user makes a claim under GDPR the data >> controller will need to prove that the user authorized release of the >> attribute. If the DID cannot be resolved at that later date, how is the >> case to be resolved? >> Peace ..tom >> >> >> On Sat, Dec 8, 2018 at 12:21 PM Andrew Hughes <andrewhughes3000@gmail.com> >> wrote: >> >>> Perhaps think about the use case of a professional civil engineer >>> certifying that a bridge was designed correctly. Those signatures need to >>> survive at least 50+ years in case of bridge failure. >>> >>> So the use case is very real and probably less rare than we might think. >>> >>> Notarius.com offers a old-school (non-DID) service that deals with >>> long-lived signing keys - that's where I learned of this use case >>> >>> *Andrew Hughes *CISM CISSP >>> *In Turn Information Management Consulting* >>> >>> o +1 650.209.7542 >>> m +1 250.888.9474 >>> 1249 Palmer Road, Victoria, BC V8P 2H8 >>> AndrewHughes3000@gmail.com >>> *https://www.linkedin.com/in/andrew-hughes-682058a >>> <https://www.linkedin.com/in/andrew-hughes-682058a>* >>> *Digital Identity | International Standards | Information Security * >>> >>> >>> On Sat, Dec 8, 2018 at 12:18 PM Kim Hamilton Duffy < >>> kim@learningmachine.com> wrote: >>> >>>> I’m not sure if I understand the question, but for some longer-lived >>>> claims it’s useful to be able to determine the keys associated with a DID >>>> at a given point in time. I think I’m the only one that keeps harping on >>>> this, so the need for this capability may be quite rare. >>>> On Sat, Dec 8, 2018 at 12:00 PM Tom Jones <thomasclinganjones@gmail.com> >>>> wrote: >>>> >>>>> Statement 2 seems to imply that (in general) the DID cannot be used in >>>>> any way in the signature of any sort of document as verification of that >>>>> signature always requires a historical reference? >>>>> >>>>> Peace ..tom >>>>> >>>>> >>>>> On Sat, Dec 8, 2018 at 11:49 AM Kim Hamilton Duffy < >>>>> kim@learningmachine.com> wrote: >>>>> >>>>>> I recall in the context of universal resolver discussions the >>>>>> following: >>>>>> >>>>>> 1. DID methods must allow discovery of the latest version of the DID >>>>>> doc (fairly sure there was no pushback on that) >>>>>> 2. TBD whether all methods must (or even are able to) support >>>>>> point-in-time historical lookups >>>>>> >>>>>> And I’m not sure if we’ve written these down anywhere (in github >>>>>> issues, etc) or if this is tribal knowledge. I will set a reminder to >>>>>> investigate if no one has the answer handy >>>>>> >>>>>> On Sat, Dec 8, 2018 at 10:20 AM Andrew Hughes < >>>>>> andrewhughes3000@gmail.com> wrote: >>>>>> >>>>>>> Interesting. Does the DID method specify how to trace the history of >>>>>>> the DID forward as it changes (not just in the BTCR method)? >>>>>>> >>>>>>> Say I interact with an EntityA in Year 0 and they register the DID >>>>>>> I'm using at that time. If in Year 2 I rotate the key material, thus >>>>>>> resulting in a new DID. If I return to EntityA in Year 3, which DID do I >>>>>>> use to authenticate myself? Do I keep the list of all my EntityA >>>>>>> interactions so that I can present the DID they should know me by (even >>>>>>> though that DID had its keys changed)? Or do I present the current >>>>>>> instantiation of the DID that they used to know me by, notifying them to >>>>>>> remember to trace it back through time? And then they can trace back >>>>>>> through the on-chain transactions to demonstrate that the new DID I present >>>>>>> is in fact the current version of the original DID they used to know me by? >>>>>>> >>>>>>> Yes, I'm curious how each of the DID methods actually implement key >>>>>>> material changes etc. >>>>>>> >>>>>>> andrew. >>>>>>> >>>>>>> *Andrew Hughes *CISM CISSP >>>>>>> *In Turn Information Management Consulting* >>>>>>> >>>>>>> o +1 650.209.7542 >>>>>>> m +1 250.888.9474 >>>>>>> 1249 Palmer Road, Victoria, BC V8P 2H8 >>>>>>> <https://maps.google.com/?q=1249+Palmer+Road,%C2%A0Victoria,+BC+V8P+2H8&entry=gmail&source=g> >>>>>>> AndrewHughes3000@gmail.com >>>>>>> *https://www.linkedin.com/in/andrew-hughes-682058a >>>>>>> <https://www.linkedin.com/in/andrew-hughes-682058a>* >>>>>>> *Digital Identity | International Standards | Information Security * >>>>>>> >>>>>>> >>>>>>> On Sat, Dec 8, 2018 at 10:12 AM Kim Hamilton Duffy < >>>>>>> kim@learningmachine.com> wrote: >>>>>>> >>>>>>>> This list is useful and I’d like to keep iterating on it. c and d >>>>>>>> are the ones I'm stuck on. >>>>>>>> >>>>>>>> > c) Authentication mechanisms, keying material, service endpoints, >>>>>>>> etc. specified in the DID Document can be managed without requiring the DID >>>>>>>> value to change. >>>>>>>> > d) The ability to manage keying material without disturbing the >>>>>>>> DID value enables key rotation and key recovery mechanisms >>>>>>>> >>>>>>>> “Can be managed without requiring the DID value to change” may >>>>>>>> technically be correct (i.e apply for some DID methods). For BTCR v0.1, >>>>>>>> we're requiring an on-chain transaction for updates to the key material, >>>>>>>> resulting in a new DID (again, this is specific to BTCR). These are linked >>>>>>>> through the transaction chain, so you can get from one to the other but the >>>>>>>> DID "value" (which I'm assuming to mean the DID itself) does change. >>>>>>>> >>>>>>>> For Blockcerts use cases, it's critical to be able to see the state >>>>>>>> of the DID Document (and related key material) at a given point in time. >>>>>>>> And for BTCR v0.1, the tx is the source of the timestamp. >>>>>>>> >>>>>>>> But this is all through a BTCR lens, and these >>>>>>>> specific design/implementation choices may be uncommon. I'm curious to hear >>>>>>>> how c and d relate to other DID methods. >>>>>>>> >>>>>>>> On Wed, Dec 5, 2018 at 8:13 AM Andrew Hughes < >>>>>>>> andrewhughes3000@gmail.com> wrote: >>>>>>>> >>>>>>>>> Well, the spec text says: >>>>>>>>> >>>>>>>>>> (section 3.1) The term DID refers only to the identifier >>>>>>>>>> conforming to the did rule in the ABNF below... >>>>>>>>>> >>>>>>>>> >>>>>>>>> (section 4) If a DID is the index key in a key-value pair, then >>>>>>>>>> the DID Document is the value to which the index key points. The >>>>>>>>>> combination of a DID and its associated DID Document forms the root record >>>>>>>>>> for a decentralized identifier. >>>>>>>>>> >>>>>>>>> >>>>>>>>> And the key paragraph might be: >>>>>>>>> >>>>>>>>>> (section 3) A DID is similar to a UUID except: (a) like a URL, it >>>>>>>>>> can be resolved or dereferenced to a standard resource describing the >>>>>>>>>> entity (a DID Document—see Section 4. DID Documents ), and (b) unlike a >>>>>>>>>> URL, the DID Document typically contains cryptographic material that >>>>>>>>>> enables authentication of an entity associated with the DID. >>>>>>>>>> >>>>>>>>> >>>>>>>>> Paraphrasing: "A DID is an identifier for an entity. A DID >>>>>>>>> Document describes that specific entity. The entity is known as the DID >>>>>>>>> Subject" >>>>>>>>> >>>>>>>>> Having typed all that, i'm unsure it if should go into the >>>>>>>>> explainer text - because it is stated clearly in the spec text and is quite >>>>>>>>> detailed and intricate. >>>>>>>>> >>>>>>>>> However: 'includes' is incorrect according to the spec text. >>>>>>>>> 'Associated' is much more correct. >>>>>>>>> andrew. >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> >>>>>>>>> *Andrew Hughes *CISM CISSP >>>>>>>>> *In Turn Information Management Consulting* >>>>>>>>> >>>>>>>>> o +1 650.209.7542 <(650)%20209-7542> >>>>>>>>> m +1 250.888.9474 <(250)%20888-9474> >>>>>>>>> 1249 Palmer Road, Victoria, BC V8P 2H8 >>>>>>>>> <https://maps.google.com/?q=1249+Palmer+Road,%C2%A0Victoria,+BC+V8P+2H8&entry=gmail&source=g> >>>>>>>>> AndrewHughes3000@gmail.com >>>>>>>>> *https://www.linkedin.com/in/andrew-hughes-682058a >>>>>>>>> <https://www.linkedin.com/in/andrew-hughes-682058a>* >>>>>>>>> *Digital Identity | International Standards | Information >>>>>>>>> Security * >>>>>>>>> >>>>>>>>> >>>>>>>>> On Tue, Dec 4, 2018 at 9:59 PM Daniel Hardman < >>>>>>>>> daniel.hardman@evernym.com> wrote: >>>>>>>>> >>>>>>>>>> 5) includes the associated DID Document, which may contain >>>>>>>>>>>>> material used to authenticate the DID, the DID Document, and the DID >>>>>>>>>>>>> 'owner/controller' >>>>>>>>>>>>> >>>>>>>>>>>> >>>>>>>>>>>> I have run into this sort of verbiage before, that a DID >>>>>>>>>>>> "includes" a DID Document. I think the phrase "is associated with" or "may >>>>>>>>>>>> be associated with" is more accurate. A DID that has been created but not >>>>>>>>>>>> yet written to anywhere that associates it with a DID Document is still a >>>>>>>>>>>> DID, is it not? >>>>>>>>>>>> >>>>>>>>>>> >>>>>>>>>>> <<<ACH: A DID without a DID Document cannot be authenticated, so >>>>>>>>>>> might not be too useful :) 'associated' is from the spec text. >>>>>>>>>>> >>>>>>>>>> >>>>>>>>>> Yes, I get that a DID without a DID Doc is not very useful. But >>>>>>>>>> we still can't say that a DID "*includes* the associated DID >>>>>>>>>> Document." This is conflating an identifier with the thing it identifies. >>>>>>>>>> Does a domain name "include the associated web server host name" by >>>>>>>>>> definition, or can it be bound to a hostname (registered in DNS) after the >>>>>>>>>> domain name exists in unregistered form? Likewise, can I create a DID and >>>>>>>>>> begin using it as an identifier in my own records, then decide later which >>>>>>>>>> endpoint and keys I want to use for that DID when I'm ready to share it? If >>>>>>>>>> so, what is the identifier called before it's associated? Surely it's >>>>>>>>>> called a DID, right? Or does it only become a DID when the association is >>>>>>>>>> completed, and before that it's a "potential DID"? What happens for a DID >>>>>>>>>> that's not stored on an immutable ledger, but in a mutable database, such >>>>>>>>>> that its registration can be deleted--does it cease to become a DID at that >>>>>>>>>> point? >>>>>>>>>> >>>>>>>>>> I know this is splitting hairs, but I have heard this same >>>>>>>>>> semantic shorthand several times, and it is making me uneasy. I think it >>>>>>>>>> leads to assumptions about temporal coupling and about the binding between >>>>>>>>>> a DID and crypto (a single entity must both create the identifier and bind >>>>>>>>>> it to keys+register it in the same event) that are not strictly required by >>>>>>>>>> the spec, and that may be undesirable in some cases. >>>>>>>>>> >>>>>>>>> -- >>>>>>>> Kim Hamilton Duffy >>>>>>>> CTO & Principal Architect Learning Machine >>>>>>>> Co-chair W3C Credentials Community Group >>>>>>>> >>>>>>>> kim@learningmachine.com >>>>>>>> >>>>>>> -- >>>>>> Kim Hamilton Duffy >>>>>> CTO & Principal Architect Learning Machine >>>>>> Co-chair W3C Credentials Community Group >>>>>> >>>>>> kim@learningmachine.com >>>>>> >>>>> -- >>>> Kim Hamilton Duffy >>>> CTO & Principal Architect Learning Machine >>>> Co-chair W3C Credentials Community Group >>>> >>>> kim@learningmachine.com >>>> >>> > > -- > > Adrian Gropper MD > > PROTECT YOUR FUTURE - RESTORE Health Privacy! > HELP us fight for the right to control personal health data. > DONATE: https://patientprivacyrights.org/donate-3/ >
Received on Saturday, 8 December 2018 21:08:07 UTC