DID Communications (DIDComm) - DIF
Explainer
- 2D/ Why the Internet Needs DIDComm - IIW From: IDCommons By: Sam Curren Type: Session notes Date: 2021-05-06 Event: IIW
- Enables Verifiable Communication
- Intelligence at the edge (like email)
- Protocol Based (like email)
- Supports HTTP(s) (like APIs) and others as a transport
- Bluetooth enables Edge to Edge transport
- Mobile / Offline Friendly (like email)
- Supports rotating from one DID to another
- Security independent of transport
- Protocol development becomes easier and more robust (unlike email) - 2E/ Decentralized Semantics 101 - IIW From: IDCommons By: Paul Knowles Type: Session notes Date: 2021-05-06 Event: IIW
- 21A/ DIDComm and the Self-Sovereign Internet - IIW From: IDCommons By: Phil Windley Type: Session notes Date: 2021-05-06 Event: IIW
- DIDComm and the Self-Sovereign Internet By: Phillip J. Windley Type: Post Date: 2020-11-11
- Why we need DIDComm - Identity Woman From: DIF By: Kaliya Young Type: Post Date: 2022-01-12
- DIDComm Mythconceptions By: Daniel Hardman Type: Video Date: 2021-11-10
- DIDCOMM - Sam Curren, Importance of DIDs From: twit.tv By: Sam Curren Type: Episode Date: 2022-06-15
A digital network must contain authenticable data entry and immutable data
capture elements in order to maintain balance and integrity.
Within the context of a decentralized network, these fundamentals enable a self-regulating system where …
(1) data inputs can be trusted as having come from an assured source under the control of a governing entity; and
(2) semantic items ensure that the meaning and use of inputted data remains unaltered for all interacting actors.
DID-based relationships are the foundation of self-sovereign identity (SSI). The exchange of DIDs to form a connection with another party gives both parties a relationship that is self-certifying and mutually authenticated. Further, the connection forms a secure messaging channel called DID Communication or DIDComm. DIDComm messaging is more important than most understand, providing a secure, interoperable, and flexible general messaging overlay for the entire internet.
DIDComm is a protocol layer capable of supporting specialized application protocols for specific workflows. Because of its general nature and inherent support for self-sovereign relationships, DIDComm provides a basis for a self-sovereign internet much more private, enabling, and flexible than the one we’ve built using Web 2.0 technologies. This talk introduces DIDComm, discusses its protocological nature, and presents use cases in the Internet of Things. Demonstrations of DIDComm protocol interactions will be shown on the Pico platform, which implements the Aries Cloud Agent (ACA) specification.
This is the text of an email I got today from a company that I had a contract with last year […] I was reminded quite strongly why we need DIDComm as a protocol to enable the secure transport of all sorts of things not just signed VCs but intermediate uses
DIDComm is a peer-to-peer communication technology for SSI (self-sovereign identity) with security and privacy properties rooted in DIDs (decentralized identifiers). Its core value proposition is often misunderstood or oversimplified. This webinar provides a proper mental model.
Sam Curren unpacks for Doc Searls and Dan Lynch why DIDs and DIDcomm are the best approach to identity—and to making people first-class citizens on the Internet. Curren also discusses the origin story of picos and the advantages of nomadic living and hacking.
RFCs
- Aries RFC 0453 - credential issuance protocol using DIDComm V1 data formats From: Hyperledger Type: Rfc Date: 2021-04-15
- Aries RFC 0454 - Present Proof protocol V2 using DIDCommV1 data formats From: Hyperledger Type: Rfc Date: 2021-04-15
An optional mechanism for providing credential supplements during issuance. Supplements are also used in credential presentation.
A minor update to add mechanism for a Verifier to request the Prover submit multiple presentations in the “presentation” message(s), each presentation sourced from different credentials that satisfy the presentation request. An example use of this capability is an employer (Verifier) requesting multiple “proof of employment” presentations from a job application (Prover), each satisfying the one presentation request.
Implementation
- Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform From: gold and double blue By: Siddhi Type: Video Date: 2021-08-11
- Just got my first DIDComm protocol published on the https://didcomm.org website. By: Timo Glastra Type: Tweet Date: 2022-08-22
- DIDComm: ECDH-1PU Implementation From: DIF Type: Post Date: 2021-09-21
- Community matters: Jolocom’s latest contributions to DIF From: Jolocom Type: Post Date: 2021-01-19
Blockchain and Self-Sovereign Identity Empowered Cyber Threat Information Sharing Platform
- Presented in 7th IEEE International Conference on Smart Computing(IEEE SmartComp 2021)
A protocol to request a shortened URL for a given URL. For example, an agent requesting a shortened out of band invitation url from a mediator.
In short, ECDH-1PU is a key derivation process that allows for sender authenticity and enables a “Perfect Forward Secrecy” mechanism, in addition to significant performance gains over JWS message nested in a JWE envelope, as used by existign ECDH-ES aproaches.
We at Jolocom strongly believe that DIDComm is a crucial infrastructure element for the broader and future-proof SSI stack, and current work on DIDComm v2 includes Jolocom’s implementation of the specification with authcrypt (authenticated encrypted) and most of the low level of the protocol.