Check out this twitter list I made for identity related standards development bodies.
- Why Engage with Standards?
too many people complain about problems but don’t step to Fix It!. There are certainly a lot of flawed standards – but they make interoperability possible – not perfect – but possible. If you haven’t used them then you have no right to complain that they are too complex, too simple (even in the same standard) or too domain specific – or any of the other rants and raves that go on.
If you’re willing to put up with a lot of work for incremental improvements then step up and join a standard. Whether that is a (relatively) fast moving standard group like OASIS (www.oasis-open.org) or a slower but more international group like ISO you will learn. You’ll also benefit from working with experts. These experts donate their time and are more than happy to provide ideas, guidance, and leadership.
- Who Are the Identerati? - ForgeRock
You’re familiar with digital identity standards like OpenID Connect, OAuth, and User-Managed Access, fundamental elements of privacy and security on the internet. But have you ever wondered how they came to be? A lot of work on these protocols went on (and goes on) behind the scenes at the Internet Identity Workshop (IIW), a bi-annual gathering of identity experts where we work on improving the identity systems that make the web run. It’s a great event that’s flown under the radar, so I’m excited to share a new documentary on IIW, “Not Just Who They Say We Are: Claiming our identity on the Internet”. This short film shines a light on the stealth community of “Identerati” at IIW that are defining and refining digital identity.
- Manifesto: Rules for standards-makers by Dave Winer
I’ve used all kinds of formats and protocols in a long career as a software developer, even created a few. My new manifesto summarizes what I’ve learned about what works and what doesn’t.
Decentralized Identity Stack
- Hyperledger Identity Working Group - Identity Standards
- A Taxonomic Approach to Understanding Emerging Blockchain Identity Management Systems NIST CYBERSECURITY WHITE PAPER (DRAFT) BLOCKCHAIN IDENTITY MANAGEMENT APPROACHES JULY 9, 2019
Identity management systems (IDMSs) are widely used to provision user identities while managing authentication, authorization, and data sharing both within organizations as well as on the Internet more broadly. Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control and consent mechanisms, which may benefit both users and businesses by alleviating these concerns; as a result, blockchain-based IDMSs are beginning to proliferate. This work categorizes these systems into a taxonomy based on differences in architecture, governance models, and other salient features. We provide context for the taxonomy by describing related terms, emerging standards, and use cases, while highlighting relevant security and privacy considerations.
- Building Blocks for a New Architecture by Tim Bouma
First, you will see the Issuer, Holder and Verifier. This is the archetypal pattern of the decentralized architecture. An issuer issues something to a holder, who then presents it to a verifier, who make a decision. A simple example: government(issuer) issues you a passport (holder), which you present to a border control officer (verifier) who lets you through the gate. When you look at all the use cases (described above), they all fall into this pattern.
- The Self-Sovereign Identity Stack by Oliver Terbu OSI
Layer Examples Application Selective Disclosure, music app, rideshare service, extensions, etc. Implementation DIF Hubs, Indy Agents, uPort app, etc. Payload JSON-LD, JWT, CWT Encoding ProtoBuf, Cap’n Proto, MessagePack, JSON, CBOR, etc. Encryption Ciphersuite, JWE, etc. DID AuthN Key ownership, verification, challenge/response, etc. Transport QR Code, HTTP, BLE, NFC, FTP, SMTP, etc. DID Resolution DID -> DID Doc / service and key resolution DID Operations CRUD support for a DID Doc Storage Optional, separate storage of DID metadata Anchor Bitcoin, Ethereum, Veres One, Sovrin, etc.
- Overview of Decentralized Identity Standards, Nader Helmy
we can think of each specification as addressing one or more of the SSI “building blocks” that we described above. In some cases a standard may be a bridge between layers, enabling a closer link between connections, data, and keys, making the ecosystem more secure as a whole. What you will find below is a list of all relevant standards, links to every specification, the organizations they belong to, their relationship to the ecosystem, and their relative maturity as internet technologies.
- Distributed ID learning path – Christina Yasuda (from work navigating the VC-Spec Map)
Describes pre-requisite knowledge, including JSON, JSON-LD, JWT, JWS, JWK, JWA, and sometimes CBOR. She then goes on to break down knowledge areas beginning with the basics: DID-Core, DID-Resolution, DID-Spec, DID Use-Cases. Next, she covers Verifiable Credentials with VC-Data Model, VC Use-Cases, and VC-Implementors Guide, and also Transport, Credential Presentation, and Other Data Formats.
- The Flavors of Verifiable Credentials – Linux Foundation Public Health Blog.
The differences between the different flavors of VCs for technically inclined readers. It elaborated on the differences between JSON and JSON-LD and articulated differences between the two different implementations of ZKP style credentials. The ‘Journey of a VC’ section articulated all steps where VCs are active and highlighted the differences in how different VC flavors ’behave’.
- Anonymous Credential Part 1: Brief Overview and History – Finema
An anonymous credential (Anoncred), which is also known as an attribute-based credential (ABC), is a concept for a digital credential that provides a credential holder maximal privacy and an ability to selectively disclose their personal information.
- Anonymous Credential Part 2: Selective Disclosure and CL Signature – Finema
selective disclosure and an anonymous credential (Anoncred) relies on an efficient signature scheme that supports multiple messages with a single signature. One such signature scheme is known as CL signature that is named after Jan Camenisch and Anna Lysyanskaya […] CL signature popularized Anoncreds, and it also served as a cryptographic building block in Identity Mixer (Idemix) and Hyperledger Indy projects.
- Anonymous Credential Part 3: BBS+ Signature – Finema
Compared to the CL signature, the BBS+ signature has much shorter keys and signatures for a comparable level of security. As a result, the BBS+ signature enables fast implementation for anonymous credentials. It can be used in combination with signature proof of knowledge to hide some of credential attributes/messages in a zero-knowledge fashion.
- Web of Trust 101 – Mattr
The emerging “Web of Trust” is an idea that has been around since the dawn of the internet. To explain what motivated its creation, let’s take a look at how trust on the internet functions today.
- Verifiable Data – Mattr (and Verifiable Relationships, Verifiable Processes, Verifiable Credentials, Semantics and Schemas)
refers to the authenticity and integrity of the actual data elements being shared.
- Semantic Web – Mattr
The semantic web is a set of technologies whose goal is to make all data on the web machine-readable. Its usage allows for a shared understanding around data that enables a variety of real-world applications and use cases.
- Selective Disclosure – Mattr
An important principle that we want to achieve when designing any system that involves handling Personally Identifiable Information (PII) is to minimize the data disclosed in a given interaction. When users share information, they should be able to choose what and how much they share on a case-by-case basis
- Trust Frameworks – Mattr
Trust frameworks are a foundational component of the web of trust. A trust framework is a common set of best practice standards-based rules that ensure minimum requirements are met for security, privacy, identification management and interoperability through accreditation and governance.
- Beginners Guide to JWTs – Okta
A JWT is a structured security token format used to encode JSON data. The main reason to use JWT is to exchange JSON data in a way that can be cryptographically verified. There are two types of JWTs:JSON Web Signature (JWS)JSON Web Encryption (JWE)The data in a JWS is public—meaning anyone with the token can read the data—whereas a JWE is encrypted and private. To read data contained within a JWE, you need both the token and a secret key.
- Verifiable Credentials Issuance – Blockster
When an issuer creates a verifiable credential, it contains following information:
- Who has issued – DID of the Issuer
- To whom it is issued – User Identifier
- Attributes of the credential – Details of the credential being Issued
- When it is Issued – Date of issuance
Orgs Related to Standards Development
ISSA (Information Systems Security Association) • ISAO Standards • IETF • NIST • ISO • IEEE • DIF (GitHub) • Fido Alliance • Hyperledger (Wiki) • Kantara • OpenID • Sovrin (Forum) • Me2B Alliance • Ethereum Enterprise Alliance
Decentralised Identity: What’s at Stake? A Position Paper by the INATBA Identity Working Group
INATBA has a specific Standards Committee to liaison with relevant standardisation committees and bodies. Some relevant standardisation committee and bodies include:
- ISO/TC 307 “Blockchain and distributed ledger technologies”
- CEN/CENELEC JTC 19 “Blockchain and Distributed Ledger Technologies”
- Decentralised Identifiers (DIDs)
- DID Resolution
- Verifiable Credentials (VCs)
- “Issuer” und “Verifier” APIs and Linked Data Vocabulary
- Credential Handler API
- DID SIOP
- DID Comm
- Trust over IP Foundation
- Global Standards Mapping Initiative: An overview of blockchain technical standards
- IEEE (USA) Internet of things (IoT); cryptocurrency exchange and payment; tokens; energy; digital assets
“The purpose of the Institute of Electrical and Electronics Engineers (IEEE) is promoting the development and application of electrotechnology and allied sciences for the benefit of humanity, the advancement of the profession and the well-being of its members”
- ISO (Switzerland) Security; identity
The International Organization for Standardization (ISO) is an independent, non-governmental, international organization that develops standards to ensure the quality, safety and efficiency of products, services and systems
- W3C (USA) Identity
The Worldwide Web Consortium (W3C) is developing protocols and guidelines that ensure long-term growth for the web
- IRTF (USA) identity; digital assets
The Internet Research Task Force (IRTF) aims to promote research for the evolution of the internet
- IEC (Switzerland) Internet of things (IoT)
The International Electrotechnical Commission (IEC) promotes standardization of electrical technology, electronic and related matters
- IETF (USA) Cryptocurrency payment
The purpose of the Internet Engineering Task Force (IETF) is creating voluntary standards to maintain and improve the usability and interoperability of the internet
- ITU-T (Switzerland) Security; IoT; identity; DLT requirements
“The International Telecommunication Union Telecommunications (ITU-T) sector ensures the efficient and timely production of standards covering all fields of telecommunications and information communication technology (ICTs) on a worldwide basis, and defines tariff and accounting principles for international telecommunication services”
- BSI (UK) DLT requirements
The British Standards Institution (BSI) is the national standards body of the United Kingdom. It aims to share knowledge, innovation and methodologies to help people and organizations make excellence a habit
- CEN \ CENELEC (Belgium) Security
The European Committee for Standardization (CEN) and the European Committee for Electrotechnical Standardization (CENELEC) provide a platform for the development of European standards and other technical documents in relation to various kinds of products, materials, services and processes”
- Standards Australia (Australia) Security; DLT taxonomy
Standards Australia coordinates standardization activities and facilitates the development of Australian standards
- WIPO (Switzerland) Application of blockchain to intellectual property
The World Intellectual Property Organization (WIPO): 1) promotes the protection of intellectual property throughout the world through cooperation among states and, where appropriate, in collaboration with any other international organization; and 2) ensures administrative cooperation among unions
- ETSI (France) Permissioned distributed ledgers
The European Telecommunications Standards Institute (ETSI) provides the opportunities, resources and platforms to understand, shape, drive and collaborate on globally applicable standards
- SAC (China) DLT requirements
The Standardization Administration of China (SAC) exercises administrative responsibilities by undertaking unified management, supervision and overall coordination of standardization work in China
- BRIBA (China) DLT requirements
The Belt and Road Initiative (BRI) has established the Belt and Road Initiative Blockchain Alliance (BRIBA) to spur the development of the BRI by leveraging blockchain technologies
- CESI (China) Tokens; security
“The China Electronic Standardization Institute (CESI) works with standardization, conformity assessment and measurement activities in the field of electronic information technologies. In the past couple of years, CESI has come out with a vision to introduce three blockchain standards on smart contracts, privacy and deposits in a bid to better guide the development of the blockchain industry in the country”
- DCSA (Netherlands) Interoperability
The Digital Container Shipping Association (DCSA) seeks to pave the way for interoperability in the container shipping industry through digitalization and standardization
- International Chamber of Commerce (ICC) (France) Interoperability
The ICC established a working group called the Digital Standards Initiative (DSI). The purpose of the DSI is to encourage and maintain standards-based interoperability (between blockchain and non-blockchain consortia and networks) in global trade
- EEA (USA) Interoperability; tokens
The Enterprise Ethereum Alliance (EEA) builds, promotes and broadly supports Ethereum-based technology methodologies, standards and a reference architecture
- Hyperledger (USA) Interoperability; tokens
“Hyperledger is an open-source community focused on developing a suite of stable frameworks, tools and libraries for enterprise-grade blockchain deployments. It serves as a neutral home for various distributed ledger frameworks including Hyperledger Fabric, Sawtooth, Indy, as well as tools such as Hyperledger Caliper and libraries such as Hyperledger Ursa”
- IWA (USA) Tokens; analytics
The InterWork Alliance (IWA) is working to: develop standards-based interworking specifications; address market requirements and performance metrics; support advances across all platform technologies; and enable multi-party interchanges
- JWG (USA & UK) Tokens
“The Joint Working Group on interVASP Messaging Standards (JWG) identified the need for VASPs to adopt uniform approaches and establish common standards to enable them to meet their obligations resulting from the FATF recommendations as they apply to affected entities. To tackle this, a cross-industry, cross-sectoral joint working group of technical experts was formed in December 2019 and a new technical standard developed by the group”
- National Blockchain and Distributed Accounting Technology Standardization Technical Committee (China) DLT requirements; DLT terminology
This is a group of organizations that have joined a national committee focused on creating standards for blockchain technology
- CDC (USA) Digital assets
The Chamber of Digital Commerce (CDC)’s mission is to promote the acceptance and use of digital assets and blockchain-based technologies. Through education, advocacy and working closely with policy- makers, regulatory agencies and industry, its goal is to develop an environment that encourages innovation, jobs and investment
- MOBI (USA) Vehicle identity; usage-based insurance; electric vehicle grid integration; connected mobility and data marketplace; supply chain and finance; securitization and smart contracts
The Mobility Open Blockchain Initiative (MOBI)’s Vehicle Identity Working Group (VIWG) aims to use DLT to make mobility safer, greener, cheaper and more accessible
- GDF (UK) DLT requirements
Global Digital Finance (GDF) is an industry membership body that promotes the adoption of best practices for cryptoassets and digital finance technologies, through the development of conduct standards, in a shared engagement forum with market participants, policy- makers and regulators
- BIG (Canada) DLT requirements (in progress)
The Blockchain Industry Group (BIG) is dedicated to promoting the adoption of blockchain technologies and digital currencies by actively collaborating with and promoting the efforts of our global blockchain community
- BIA (Estonia) Interoperability
The Blockchain Industrial Alliance (BIA) seeks to promote cross-blockchain transactions and interconnectivity. The goal of this alliance is to create a globally accepted standard for connecting blockchains and to bring innovations together
- BiTA (USA) “Interoperability; DLT requirements”
The Blockchain in Transport Alliance (BiTA) is seeking to develop and embrace a common framework and standards from which transport/logistics/supply-chain participants can build blockchain applications
- IEEE (USA) Internet of things (IoT); cryptocurrency exchange and payment; tokens; energy; digital assets
- FIPS PUB 201-3 (DRAFT) Federal Information Processing Standards Publication (Supersedes FIPS 201-2)
Personal Identity Verification (PIV) of Federal Employees and Contractors
Decentralized Key Management
- Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Puzzle - Drummond Reed
- Recommendations for Decentralized Key Management Systems
- Agent to Agent Communication: Daniel Hardman explains the goals of agent to agent communication
Comments by Staticman and Identosphere
Leave a Comment
Your email address will not be published. Required fields are marked *