Self Sovereign ID (SSI)
Decentralized digital identity (DDID) is not just a technology buzzword: it promises a complete restructuring of the currently centralized physical and digital identity ecosystem into a decentralized and democratized architecture. (10)
RedCat Multiverse will grant certificates/NFTs to those players that complete their learning processes. We understand that our platform needs to have a clear understanding of the identity of the player. We have been studying the SSI and are a contributor to the Decentralized Identify Foundation(DIF).
Self-Sovereign Identity (SSI) is a phrase for a new model for digital identity on the Internet. SSI is used to describe the digital movement that recognizes an individual should own and control their identity without the intervention of administrative third party authorities: i.e., how we prove who we are to the websites, services, and apps with which we may need to establish trusted relationships to access or protect private information. This technology grants “things” to interact in a digital environment in a peer-to-peer relationship, neither of you has an “account” with the other.
We would particularly like to point out that SSI is not a self-asserted identity. You are only the issuer of all the credentials in your physical wallet today. However, most of the information about your identity comes from other trusted central sources. That’s the reason other parties are willing to rely on it.
SSI is not just for people. While the SSI model is very much informed by individuals’ needs for security, privacy and personal data control, the SSI model applies equally to organizations and things. In fact, it applies to anything that needs identity on the Internet.
In 2016, Christopher Allen set 10 principles for SSI that have become a reference in the field. These are:
- Access: Users must have access to their own data whenever they need so, without any gatekeeper involvement.
- Consent: Users must agree to the use of their identities. Sharing of user data in interoperable systems must only occur with the consent of the user.
- Control: Users must control their identities. Users should always be able to refer to it, update it, or even hide it. However, it does not mean that a user controls all of the claims on their identity: other users or issuers may make claims about a user, but they should not be central to the identity itself, they should be only counterparts.
- Existence: Users must have an independent existence. A self-sovereign identity simply makes public and accessible some limited aspects of the “I” that already exist.
- Interoperability: Identities should be as widely available as possible. The goal of a 21st-century digital identity system is to make identity information widely available, crossing international boundaries to create global identities, without losing user control.
- Minimization: Disclosure of claims must be minimized. For example, if only a minimum age is called for, then the exact age should not be disclosed, and if only an age is requested, then the more precise date of birth should not be disclosed. This principle can be supported with selective disclosure, range proofs, and other zero-knowledge techniques, but non-correlatibility is still a very hard (perhaps impossible) task; the best we can do is to use minimization to support privacy as best as possible.
- Persistence: Identities must be long-lived. In the fast-moving world of the Internet, this goal may not be entirely reasonable, so at the least identities should last until they’ve been outdated by newer identity systems.
- Protection: The rights of users must be protected. When there is a conflict between the needs of the identity network and the rights of individual users, then the network should err on the side of preserving the freedoms and rights of the individuals over the needs of the network. To ensure this, identity authentication must occur through independent algorithms that are censorship-resistant and force-resilient and that are run in a decentralized manner.
- Portability: Information and services about identity must be transportable. Transportable identities ensure that the user remains in control of his identity no matter what, and can also improve an identity’s persistence over time even between platforms.
- Transparency: Systems and algorithms must be transparent. The algorithms should be free, open-source, well-known, and as independent as possible of any particular architecture; anyone should be able to examine how they work.
Microsoft is actively collaborating with members of the Decentralized Identity Foundation (DIF), the W3C Credentials Community Group, and the wider identity community. They are working with these groups to identify and develop critical standards. They are developing an open-source DID implementation that runs atop existing public chains as a public Layer 2 network designed for world-scale use. The purpose of this implementation is to establish a unified, interoperable ecosystem that developers and businesses can rely on to build a new wave of products, applications and services that put users in control.
DIF is an engineering-driven organization focused on developing the foundational elements necessary to establish an open ecosystem for decentralized identity and ensure interoperability between all participants. They have different working groups that are scoped by functional areas and are designed to drive emerging standard specifications backed up by open-source code.
Crucible Network is ensuring that humans remain at the center of technology and establishing infrastructure and standards to ensure user sovereignty in the new digital worlds and economies ahead will make the difference between a dystopian future and a utopian future – one where everything’s connected, intelligent and accessible for all people to benefit, without the surveillance capitalism.