Protocol, Governance, Education, Ecosystem
This page contains a growing collection of educational resources related to Hyperledger Indy, the Sovrin Foundation, and Evernym.
Its an index for all to more easily navigate the information surrounding Hyperledger Indy.
Legend: [T]witter • [G]ithub • [B]log • [wp] whitepaper • [D]ocumentation • [F]orums • [C]hat • [tele]gram • [web]site • [ϟ] related resource • [>] related section • [»] related section on awesome-decentralized-id • [^] back to the contents.
- Hyperledger Indy - Distributed Ledger and Utility Library [T] [C]
- Indy Documentation Index - wiki.hyperledger.org
- Introduction to Hyperledger Indy (awesome resource from hyperledger github)
- Hyperledger Indy — the Future of Decentralized Identity
- Hyperledger Welcomes Project Indy - ANN
- The Rise of Self-Sovereign Identity - Hyperledger Indy
- Ernesto.net - What goes on the Ledger
- Ernesto.net - Hyperledger Indy Architecture
- github.com/IBM-Blockchain-Identity (Docker based tutorial sandbox env)
- The Linux Foundation’s Blockchain for Business course may be freely audited and has a section about Indy.
- Blockchain development made easy: Getting started with Hyperledger Indy - Interview with Daniel Hardman[G][L][T], Hyperledger Indy maintainer
- Linux Foundation -Blockchain for Business -INDY
- Hyperledger Identity Working Group-paper
- HyperledgerIndyWGCall_2018-12-06 Discussion of VON and Plenum Docs (w info-graphics)
- A Framework for Designing Cryptographic Key Management Systems
- An Accumulator Based on Bilinear Maps and Efficient Revocation for Anonymous Credentials
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- sovrin-foundation/connector-app - Reference mobile edge agent for use with the Sovrin Network built from Hyperledger Indy.
- Building binaries of LibIndy for Android
- HIPE 0014-ssi-notation
- Set up Indy Pool in Local Linux Environment Using Docker
- Learn how to set up a DEV Environment with Vagrant on Hyperledger Indy!
- Semantics Working Group Shared Docs
- Indy August Update - Most recent report from the Hyperledger Indy team.
- forum.sovrin.org - Researching Sovrin Ledger 2.0
- How to build a Self Sovereign Identity Wallet
Zero Knowledge Proofs in Indy
- The Sovrin Network and Zero Knowledge Proof - high level walk through
- AnonCreds: Anonymous credentials protocol implementation in python [ϟ]
- Zero-Knowledge Proofs: Privacy-Preserving Digital Identity with Clare Nelson
- Anonymous Credentials: Claims and Proofs in a Developer-friendly Format - Mike Lodder
Our zero-knowledge proofs are part of the Idemix protocol, where they are used to prove the possession of Camenisch-Lysyanskaya credentials. We also use zero-knowledge proofs in the revocation protocol, which is based on cryptographic accumulators. —What Zero Knowledge Poof Algorithm is used in Sovrin?
Identity Mixer is not directly (re)implemented by Sovrin, but its cryptographic foundations are very similar, and Sovrin’s implementation includes most of its extended features (predicates, multi-credential, revocation, advanced issuance…). One of the researchers who helped to create Identity Mixer is on Sovrin’s Technical Governance Board and has offered insight to keep the implementations aligned on goals and methods. —How is IDEMix Implemented?
- IBM Identity Mixer [B]
- ABC4Trust—Attribute-based Credentials for Trust
- Concepts and Features of Privacy-Preserving Attribute-Based Credentials
- Concepts and Languages for Privacy-Preserving Attribute-Based Authentication
- forum.sovrin.org - Stewards as a VM on Major Cloud Providers
Sovrin Stewards: REMINDER Feedback due on Sovrin Governance Framework V2 — Stakeholder Review Draft 02 documents
Note that the main risk may not be that a Cloud Provider or some of its key staff goes rogue, but that a rogue nation gives a secret order to subtly sabotage the system to a Cloud Provider that has its headquarters in that nation. Sufficient jurisdictional diversity is hence needed for both Stewards and its supporting Cloud Providers, to assure that such a sabotage attempt does not go undetected.
- raw attrib data allows arbitrary data to be anchored to a nym.
- Vanity did’s are not discouraged in software.
- Meet the Sovrin Foundation
- Hyperledger Indy Explainer Video
- Phil Windley on the Sovrin Network
- Self-Sovereign Identity with Hyperledger Indy\Sovrin- Calvin Cheng - FOSSASIA 2018
- Hyperledger Indy introduction with Indy Agents Demo
- Hyperledger Indy Demo Screencast
- Architectural Overview of Indy Wallets
- Indy Demo by IBM
- Behind the Cloud Episode 6: Blockchain and Self-Sovereign Identity in the Enterprise
- Evernym’s contributions to Hyperledger Indy
- Introduction to Indy Plenum Architecture
- Hyperledger Indy Working Group Calls
- Sovrin: Public, Permissioned and Still Decentralized - Nathan George
- Hyperledger Global Forum - Video
Social ShareTwitter Facebook LinkedIn Reddit