We are thrilled to share that our CTO, Martin, has co-authored a paper that dives into the realm of on-chain identity proof verification design patterns with Rebooting the Web of Trust. The paper, “On-Chain Identity Proof Verification Design Patterns: An Evaluation of Different Strategies to Inject Digital Identity into Decentralized Applications,” explores the various approaches and their trade-offs in implementing digital identity within decentralized applications. With extensive knowledge and experience in this space, Martin’s contribution to this essential publication demonstrates our commitment to staying at the forefront of innovation in the digital identity sector.
The Paper: On-Chain Identity Design Patterns
The paper discusses the problem space of on-chain web3 identity, characterized by a rivalry between on-chain tokens, off-chain verifiable credentials, and loosely defined “zero knowledge” solutions. This rivalry has emerged due to marketing imperatives and unfamiliarity with compliance and liability issues specific to identity.
The paper aims to provide a more useful taxonomy for mapping the solution space according to high-level patterns and trade-offs. It defines the problem space at the highest level. It focuses on various architectures that deploy on-chain artifacts to aid in the verification of claims about a wallet’s controller. The authors attempt to categorize these patterns before identifying the strengths and weaknesses of each. This is done against a short, hypothetical list of use cases.
In their methodology, the authors analyze diverse solutions with different privacy strategies. These solutions range from on-chain tokenized identities (i.e., “Soulbound Tokens”) to on-chain validation of proofs derived from correlation-resistant verifiable credentials (based, for example, on the anonCreds system of zero-knowledge presentation). They target a wide range of audiences, including originators of on-chain assets, resellers, DAOs, policymakers, regulators, and developers of decentralized apps (dApps) and other on-chain applications.
The paper’s goal is not to exhaustively evaluate these patterns. Instead, any evaluation should be more grounded in detailed use cases and non-technical requirements. Instead, the authors strive to identify traits inherent to each high-level pattern that could lead to fitness-for-purpose evaluations, i.e., the “strengths and weaknesses” of each.
Martin Riedel, CTO at Identity.com
Martin Riedel, our CTO, has extensive knowledge and experience within the on-chain web3 identity space. His co-authorship of this paper reflects his dedication to driving the development of cutting-edge identity management solutions. Martin shares, “With a wide range of solutions and research in the ecosystem, it’s challenging for newcomers to grasp the nuances of web3 identity. Our paper aims to establish a standard taxonomy of current solutions. It presents a high-level comparison of their properties and trade-offs, making it easier to understand and navigate this complex landscape.”
By emphasizing the importance of a unified taxonomy and acknowledging the various backgrounds contributing to the development of decentralized self-sovereign identity, Martin inspires readers to appreciate the diversity of thought and innovation within the field.
Please watch this video for a deeper understanding and further explanation of the different publications from decentralized identity experts.
We are extremely proud of Martin for his contribution to this paper. At Identity.com, we are committed to shaping the future of digital identity by continuously exploring innovative solutions and staying updated on the latest developments. We invite you to read the full paper and join us on our journey toward a more secure, private, and user-centric digital world.