Foreword |
|
xxi | |
Preface |
|
xxiii | |
Acknowledgments |
|
xxvii | |
About this book |
|
xxix | |
About the authors |
|
xxxiv | |
About the cover illustration |
|
xxxvi | |
|
Part 1 An introduction to SSI |
|
|
1 | (84) |
|
1 Why the internet is missing an identity layer--and why SSI can finally provide one |
|
|
3 | (18) |
|
|
|
1.1 How bad has the problem become? |
|
|
5 | (1) |
|
1.2 Enter blockchain technology and decentralization |
|
|
5 | (1) |
|
1.3 The three models of digital identity |
|
|
6 | (4) |
|
The centralized identity model |
|
|
7 | (1) |
|
The federated identity model |
|
|
8 | (1) |
|
The decentralized identity model |
|
|
9 | (1) |
|
1.4 Why "self-sovereign"? |
|
|
10 | (2) |
|
1.5 Why is SSI so important? |
|
|
12 | (1) |
|
1.6 Market drivers for SSI |
|
|
13 | (4) |
|
|
14 | (1) |
|
|
15 | (1) |
|
|
15 | (1) |
|
|
16 | (1) |
|
1.7 Major challenges to SSI adoption |
|
|
17 | (4) |
|
Building out the new SSI ecosystem |
|
|
17 | (1) |
|
Decentralized key management |
|
|
18 | (1) |
|
|
18 | (1) |
|
|
19 | (2) |
|
2 The basic building blocks of SSI |
|
|
21 | (18) |
|
|
|
|
2.1 Verifiable credentials |
|
|
22 | (2) |
|
2.2 Issuers, holders, and verifiers |
|
|
24 | (2) |
|
|
26 | (3) |
|
|
29 | (1) |
|
2.5 Decentralized identifiers (DIDs) |
|
|
30 | (3) |
|
2.6 Blockchains and other verifiable data registries |
|
|
33 | (1) |
|
2.7 Governance frameworks |
|
|
34 | (2) |
|
2.8 Summarizing the building blocks |
|
|
36 | (3) |
|
|
38 | (1) |
|
3 Example scenarios showing how SSI works |
|
|
39 | (19) |
|
|
|
|
3.1 A simple notation for SSI scenario diagrams |
|
|
40 | (1) |
|
3.2 Scenario 1: Bob meets Alice at a conference |
|
|
41 | (5) |
|
3.3 Scenario 2: Bob meets Alice through her online blog |
|
|
46 | (2) |
|
3.4 Scenario 3: Bob logs in to Alice's blog to leave a comment |
|
|
48 | (1) |
|
3.5 Scenario 4: Bob meets Alice through an online dating site |
|
|
49 | (2) |
|
3.6 Scenario 5: Alice applies for a new bank account |
|
|
51 | (1) |
|
3.7 Scenario 6: Alice buys a car |
|
|
52 | (2) |
|
3.8 Scenario 7: Alice sells the car to Bob |
|
|
54 | (2) |
|
|
56 | (2) |
|
|
57 | (1) |
|
4 SSI Scorecard: Major features and benefits of SSI |
|
|
58 | (27) |
|
|
|
4.1 Feature/benefit category 1: Bottom line |
|
|
60 | (2) |
|
|
60 | (1) |
|
Reduced customer onboarding costs |
|
|
60 | (1) |
|
Improved e-commerce sales |
|
|
61 | (1) |
|
Reduced customer service costs |
|
|
61 | (1) |
|
New credential issuer revenue |
|
|
62 | (1) |
|
4.2 Feature/benefit category 2: Business efficiencies |
|
|
62 | (6) |
|
|
63 | (1) |
|
|
63 | (2) |
|
|
65 | (1) |
|
Delegation and guardianship |
|
|
66 | (1) |
|
Payment and value exchange |
|
|
67 | (1) |
|
4.3 Feature/benefit category 3: User experience and convenience |
|
|
68 | (4) |
|
|
68 | (1) |
|
|
68 | (1) |
|
|
69 | (1) |
|
Delegation and guardianship |
|
|
70 | (1) |
|
Payment and value exchange |
|
|
71 | (1) |
|
4.4 Feature/benefit category 4: Relationship management |
|
|
72 | (5) |
|
|
72 | (1) |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
75 | (1) |
|
Loyalty and rewards programs |
|
|
76 | (1) |
|
4.5 Feature/benefit category 5: Regulatory compliance |
|
|
77 | (8) |
|
|
77 | (1) |
|
|
78 | (1) |
|
|
79 | (1) |
|
|
80 | (1) |
|
RegTech (Regulation Technology) |
|
|
81 | (1) |
|
|
82 | (3) |
|
|
85 | (190) |
|
5 SSI architecture: The big picture |
|
|
87 | (24) |
|
|
|
88 | (1) |
|
5.2 Layer 1: Identifiers and public keys |
|
|
88 | (6) |
|
Blockchains as DID registries |
|
|
89 | (1) |
|
Adapting general-purpose public blockchains for SSI |
|
|
90 | (1) |
|
Special-purpose blockchains designed for SSI |
|
|
91 | (1) |
|
Conventional databases as DID registries |
|
|
92 | (1) |
|
Peer-to-peer protocols as DID registries |
|
|
93 | (1) |
|
5.3 Layer 2: Secure communication and interfaces |
|
|
94 | (7) |
|
|
94 | (1) |
|
Web-based protocol design using TLS |
|
|
95 | (1) |
|
Message-based protocol design using DIDComm |
|
|
95 | (2) |
|
|
97 | (1) |
|
API-oriented interface design using wallet Dapps |
|
|
97 | (1) |
|
Data-oriented interface design using identity hubs (encrypted data vaults) |
|
|
98 | (1) |
|
Message-oriented interface design using agents |
|
|
99 | (2) |
|
|
101 | (6) |
|
JSON Web Token (JWT) format |
|
|
102 | (1) |
|
|
103 | (3) |
|
W3C verifiable credential formats 104 - Credential exchange protocols |
|
|
106 | (1) |
|
5.5 Layer 4: Governance frameworks |
|
|
107 | (2) |
|
5.6 Potential for convergence |
|
|
109 | (2) |
|
|
109 | (2) |
|
6 Basic cryptography techniques for SSI |
|
|
111 | (15) |
|
|
|
|
112 | (2) |
|
|
113 | (1) |
|
Using hash functions in SSI |
|
|
113 | (1) |
|
|
114 | (2) |
|
Symmetric-key cryptography |
|
|
114 | (1) |
|
Asymmetric-key cryptography |
|
|
115 | (1) |
|
|
116 | (1) |
|
6.4 Verifiable data structures |
|
|
116 | (4) |
|
Cryptographic accumulators |
|
|
117 | (1) |
|
|
117 | (2) |
|
|
119 | (1) |
|
Merkle-Patricia trie: A hybrid approach |
|
|
120 | (1) |
|
|
120 | (6) |
|
|
120 | (1) |
|
|
121 | (3) |
|
A final note about proofs and veracity |
|
|
124 | (1) |
|
|
125 | (1) |
|
|
126 | (31) |
|
|
|
|
127 | (1) |
|
|
127 | (1) |
|
Receiving a free local access pass |
|
|
127 | (1) |
|
Using an electronic prescription |
|
|
128 | (1) |
|
|
128 | (3) |
|
|
131 | (3) |
|
Federated identity management vs. VCs |
|
|
131 | (1) |
|
Specific trust relationships in the VC trust model |
|
|
132 | (1) |
|
|
133 | (1) |
|
7.4 W3C and the VC standardization process |
|
|
134 | (1) |
|
7.5 Syntactic representations |
|
|
135 | (4) |
|
|
135 | (1) |
|
Beyond JSON: Adding standardized properties |
|
|
136 | (1) |
|
|
136 | (1) |
|
|
137 | (2) |
|
|
139 | (3) |
|
7.7 Verifiable presentations |
|
|
142 | (1) |
|
7.8 More advanced VC properties |
|
|
143 | (7) |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (2) |
|
When the holder is not the subject |
|
|
147 | (3) |
|
7.9 Extensibility and schemas |
|
|
150 | (1) |
|
7.10 Zero-knowledge proofs |
|
|
151 | (2) |
|
7.11 Protocols and employments |
|
|
153 | (2) |
|
7.12 Security and privacy evaluation |
|
|
155 | (1) |
|
|
155 | (2) |
|
|
156 | (1) |
|
8 Decentralized identifiers |
|
|
157 | (32) |
|
|
|
8.1 The conceptual level: What is a DID? |
|
|
158 | (3) |
|
|
158 | (1) |
|
|
158 | (1) |
|
|
159 | (1) |
|
|
160 | (1) |
|
8.2 The functional level: How DIDs work |
|
|
161 | (10) |
|
|
161 | (2) |
|
|
163 | (1) |
|
|
164 | (2) |
|
|
166 | (2) |
|
Comparison with the Domain Name System (DNS) |
|
|
168 | (1) |
|
Comparison with URNs and other persistent Identifiers |
|
|
169 | (1) |
|
|
170 | (1) |
|
8.3 The architectural level: Why DIDs work |
|
|
171 | (8) |
|
The core problem of Public Key Infrastruct ure (PK1) |
|
|
172 | (2) |
|
Solution 1 The conventional PKI model |
|
|
174 | (2) |
|
Solution 2 The web-of-trust model |
|
|
176 | (1) |
|
Solution 3 Public key-based identifiers |
|
|
176 | (2) |
|
Solution 4 DIDs and DID documents |
|
|
178 | (1) |
|
8.4 Four benefits of DIDs that go beyond PKI |
|
|
179 | (4) |
|
Beyond PKI benefit 1 Guardianship and controllership |
|
|
179 | (1) |
|
Beyond PKI benefit 2 Service endpoint discovery |
|
|
180 | (1) |
|
Beyond PKI benefit 3 DID-to-DID connections |
|
|
181 | (1) |
|
Beyond PKI benefit 4 Privacy by design at scale |
|
|
182 | (1) |
|
8.5 The semantic level: What DIDs mean |
|
|
183 | (6) |
|
The meaning of an address |
|
|
183 | (1) |
|
DID networks and digital trust ecosystems |
|
|
184 | (1) |
|
Why isn't a DID human-meaningful? |
|
|
185 | (1) |
|
What does a DID identify? |
|
|
186 | (3) |
|
9 Digital wallets and digital agents |
|
|
189 | (31) |
|
|
9.1 What is a digital wallet, and what does it typically contain? |
|
|
190 | (1) |
|
9.2 What is a digital agent, and how does it typically work with a digital wallet? |
|
|
191 | (1) |
|
|
192 | (1) |
|
9.4 Design principles for SSI digital wallets and agents |
|
|
193 | (3) |
|
Portable and Open-By-Default |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
9.5 Basic anatomy of an SSI digital wallet and agent |
|
|
196 | (1) |
|
9.6 Standard features of end-user digital wallets and agents |
|
|
197 | (5) |
|
Notifications and user experience |
|
|
198 | (1) |
|
Connecting: Establishing new digital trust relationships |
|
|
198 | (1) |
|
Receiving, offering, and presenting digital credentials |
|
|
199 | (1) |
|
Revoking and expiring digital credentials |
|
|
200 | (1) |
|
Authenticating: Logging you in |
|
|
201 | (1) |
|
Applying digital signatures |
|
|
202 | (1) |
|
|
202 | (3) |
|
Automatic encrypted backup |
|
|
202 | (1) |
|
|
203 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
9.8 Advanced features of wallets and agents |
|
|
205 | (5) |
|
Multiple-device support and wallet synchronization |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (1) |
|
Compliance and monitoring |
|
|
207 | (1) |
|
Secure data storage (vault) support |
|
|
207 | (1) |
|
|
208 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (2) |
|
Delegation (rights, roles, permissions) |
|
|
210 | (1) |
|
|
210 | (1) |
|
Specialized wallets and agents |
|
|
211 | (1) |
|
|
211 | (1) |
|
Special security considerations |
|
|
211 | (1) |
|
9.10 Guardianship and delegation |
|
|
212 | (2) |
|
|
212 | (1) |
|
Guardian delegates and guardian credentials |
|
|
213 | (1) |
|
9.11 Certification and accreditation |
|
|
214 | (1) |
|
9.12 The Wallet Wars: The evolving digital wallet/agent marketplace |
|
|
214 | (6) |
|
|
215 | (1) |
|
|
216 | (1) |
|
|
216 | (3) |
|
|
219 | (1) |
|
10 Decentralized key management |
|
|
220 | (28) |
|
|
10.1 Why any form of digital key management is hard |
|
|
221 | (1) |
|
10.2 Standards and best practices for conventional key management |
|
|
222 | (1) |
|
10.3 The starting point for key management architecture: Roots of trust |
|
|
223 | (2) |
|
10.4 The special challenges of decentralized key management |
|
|
225 | (2) |
|
10.5 The new tools that VCs, DIDs, and SSI bring to decentralized key management |
|
|
227 | (3) |
|
Separating identity verification from public key verification |
|
|
227 | (1) |
|
Using VCs for proof of identity |
|
|
228 | (1) |
|
|
229 | (1) |
|
Automatic encrypted backup with both offline and social recovery methods |
|
|
229 | (1) |
|
|
229 | (1) |
|
10.6 Key management with ledger4oased DID methods (algorithmic roots of trust) |
|
|
230 | (1) |
|
10.7 Key management with peer-based DID methods (self-certifying roots of trust) |
|
|
231 | (2) |
|
10.8 Fully autonomous decentralized key management with Key Event Receipt Infrastructure (KERI) |
|
|
233 | (13) |
|
Self-certifying identifiers as a root of trust |
|
|
234 | (1) |
|
Self-certifying key event logs |
|
|
235 | (1) |
|
Witnesses for key event logs |
|
|
236 | (1) |
|
Pre-rotation as simple, safe, scalable protection against key compromise |
|
|
236 | (2) |
|
System-independent validation (ambient verifiability) |
|
|
238 | (1) |
|
Delegated self-certifying identifiers for enterprise-class key management |
|
|
239 | (2) |
|
Compatibility with the GDPR "right to be forgotten" |
|
|
241 | (1) |
|
KERI standardization and the KERI DID method |
|
|
242 | (1) |
|
A trust-spanning layer for the internet |
|
|
242 | (4) |
|
|
246 | (2) |
|
|
247 | (1) |
|
11 SSI governance frameworks |
|
|
248 | (27) |
|
|
11.1 Governance frameworks and trust frameworks: Some background |
|
|
248 | (2) |
|
11.2 The governance trust triangle |
|
|
250 | (2) |
|
11.3 The Trust over IP governance stack |
|
|
252 | (9) |
|
Layer 1 Utility governance frameworks |
|
|
253 | (2) |
|
Layer 2 Provider governance frameworks |
|
|
255 | (1) |
|
Layer 3 Credential governance frameworks |
|
|
256 | (2) |
|
Layer 4 Ecosystem governance frameworks |
|
|
258 | (3) |
|
11.4 The role of the governance authority |
|
|
261 | (1) |
|
11.5 What specific problems can governance frameworks solve? |
|
|
262 | (3) |
|
Discovery of authoritative issuers and verified members |
|
|
262 | (1) |
|
|
263 | (1) |
|
Certification, accreditation, and trust assurance |
|
|
263 | (1) |
|
Levels of assurance (LOAs) |
|
|
264 | (1) |
|
|
264 | (1) |
|
|
264 | (1) |
|
11.6 What are the typical elements of a governance framework? |
|
|
265 | (4) |
|
|
265 | (1) |
|
|
266 | (1) |
|
Risk assessment, trust assurance, and certification |
|
|
266 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
267 | (1) |
|
|
268 | (1) |
|
Inclusion, equitability, and accessibility rules |
|
|
268 | (1) |
|
|
268 | (1) |
|
11.7 Digital guardianship |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
271 | (4) |
|
|
273 | (2) |
|
Part 3 Decentralization as a model for life |
|
|
275 | (56) |
|
12 How open source software helps you control your self-sovereign identity |
|
|
277 | (10) |
|
|
12.1 The origin of free software |
|
|
278 | (2) |
|
12.2 Wooing businesses with open source |
|
|
280 | (1) |
|
12.3 How open source works in practice |
|
|
281 | (2) |
|
12.4 Open source and digital identities |
|
|
283 | (4) |
|
|
285 | (2) |
|
13 Cypherpunks: The origin of decentralization |
|
|
287 | (6) |
|
|
|
13.1 The origins of modern cryptography |
|
|
287 | (2) |
|
13.2 The birth of the cypherpunk movement |
|
|
289 | (1) |
|
13.3 Digital freedom, digital cash, and decentralization |
|
|
290 | (1) |
|
13.4 From cryptography to cryptocurrency to credentials |
|
|
291 | (2) |
|
|
292 | (1) |
|
14 Decentralized identity for a peaceful society |
|
|
293 | (7) |
|
|
14.1 Technology and society |
|
|
294 | (1) |
|
14.2 A global civil society |
|
|
295 | (2) |
|
14.3 Identity as a source of conflict |
|
|
297 | (1) |
|
14.4 Identity as a source of peace |
|
|
298 | (2) |
|
|
299 | (1) |
|
15 Belief systems as drivers for technology choices in decentralization |
|
|
300 | (10) |
|
|
15.1 What is a belief system? |
|
|
300 | (1) |
|
15.2 Blockchain and DLT as belief systems |
|
|
301 | (2) |
|
|
303 | (1) |
|
|
303 | (1) |
|
15.3 How are blockchains and DLTs relevant to SSI? |
|
|
303 | (1) |
|
15.4 Characterizing differences between blockchain and DLT |
|
|
304 | (2) |
|
Governance: How open is the network to open participation? |
|
|
305 | (1) |
|
Censorship resistance: How centralized is trust? |
|
|
305 | (1) |
|
Openness: Who can run a node? |
|
|
306 | (1) |
|
15.5 Why "believers" and not "proponents" or "partisans"? |
|
|
306 | (2) |
|
How do we measure decentralization? |
|
|
307 | (1) |
|
15.6 Technical advantages of decentralization |
|
|
308 | (2) |
|
|
309 | (1) |
|
16 The origins of the SSI community |
|
|
310 | (13) |
|
|
|
16.1 The birth of the internet |
|
|
311 | (1) |
|
16.2 Losing control over our personal information |
|
|
311 | (1) |
|
|
312 | (1) |
|
16.4 International Planetwork Conference |
|
|
312 | (1) |
|
16.5 Augmented Social Network and Identity Commons |
|
|
313 | (1) |
|
16.6 The Laws of Identity |
|
|
313 | (1) |
|
16.7 Internet Identity Workshop |
|
|
314 | (1) |
|
16.8 Increasing support of user control |
|
|
314 | (1) |
|
16.9 Rebooting the Web of Trust |
|
|
314 | (1) |
|
16.10 Agenda for Sustainable Development and ID2020 |
|
|
315 | (1) |
|
16.11 Early state interest |
|
|
316 | (1) |
|
16.12 MyData and Learning Machine |
|
|
317 | (1) |
|
16.13 Verifiable Claims Working Group, Decentralized Identity Foundation, and Hyperledger Indy |
|
|
318 | (1) |
|
16.14 Increasing state support for SSI |
|
|
318 | (1) |
|
|
319 | (1) |
|
16.16 World Economic Forum reports |
|
|
319 | (1) |
|
16.17 First production government demo of an SSI-supporting ledger |
|
|
319 | (1) |
|
|
320 | (1) |
|
16.19 Official W3C standards |
|
|
320 | (1) |
|
|
320 | (3) |
|
|
321 | (2) |
|
|
323 | (8) |
|
|
17.1 Going back to the starting point |
|
|
323 | (2) |
|
17.2 Identity as the source of relationships and value |
|
|
325 | (1) |
|
17.3 The properties of money |
|
|
325 | (1) |
|
17.4 The three functions of money |
|
|
326 | (1) |
|
17.5 The tokenization of value with identity |
|
|
327 | (4) |
|
|
329 | (2) |
|
Part 4 How SSI will change your business |
|
|
331 | (9) |
|
18 Explaining the value of SSI to business |
|
|
333 | (7) |
|
|
18.1 How might we best explain SSI to people and organizations? |
|
|
334 | (3) |
|
Failed experiment 1 Leading with the technology |
|
|
335 | (1) |
|
Failed experiment 2 Leading with the philosophy |
|
|
335 | (1) |
|
Failed experiment 3 Explaining by demonstrating the tech |
|
|
336 | (1) |
|
Failed experiment 4 Explaining the (world's) problems |
|
|
337 | (1) |
|
18.2 Learning from other domains |
|
|
337 | (1) |
|
18.3 So how should we best explain the value of SSI? |
|
|
338 | (1) |
|
18.4 The power of stories |
|
|
339 | (1) |
|
|
339 | (1) |
|
Part 1 The current physical world |
|
|
340 | (2) |
|
Part 2 The SSI world--like the current physical world, but better |
|
|
342 | (2) |
|
Part 3 Introducing the Sparkly Ball--or, what's wrong with many current digital identity models |
|
|
344 | (63) |
|
18.6 SSI Scorecard for apartment leasing |
|
|
345 | (2) |
|
|
346 | (1) |
|
19 The Internet of Things opportunity |
|
|
347 | (9) |
|
|
|
|
19.1 IoT: Connecting everything safely |
|
|
347 | (1) |
|
19.2 How does SSI help IoT? |
|
|
348 | (1) |
|
19.3 The business perspective for SSI and IoT |
|
|
349 | (1) |
|
19.4 An SSL-based IoT architecture |
|
|
350 | (2) |
|
19.5 Tragic story: Bob's car hacked |
|
|
352 | (1) |
|
19.6 The Austrian Power Grid |
|
|
353 | (1) |
|
19.7 SSI Scorecard for IoT |
|
|
354 | (2) |
|
|
355 | (1) |
|
20 Animal care and guardianship just became crystal clear |
|
|
356 | (9) |
|
|
|
|
20.1 Enter Mei and Bailey |
|
|
357 | (6) |
|
Bailey gets aleif-sovereign identity |
|
|
357 | (1) |
|
|
358 | (1) |
|
Vacation for Mei and Bailey |
|
|
358 | (2) |
|
|
360 | (1) |
|
Lost and found at your fingertips |
|
|
361 | (2) |
|
20.2 Digital identity unlocks opportunities for the well-being of animals and people |
|
|
363 | (1) |
|
20.3 SSI for animals reaffirms their inherent worth |
|
|
363 | (1) |
|
20.4 SSI Scorecard for pets and other animals |
|
|
364 | (1) |
|
21 Open democracy, voting, and SSI |
|
|
365 | (9) |
|
|
21.1 The problems with postal voting |
|
|
366 | (1) |
|
21.2 The problems with e-voting |
|
|
367 | (1) |
|
21.3 Estonia: A case study |
|
|
367 | (1) |
|
21.4 The three pillars of voting |
|
|
368 | (1) |
|
|
368 | (1) |
|
|
368 | (1) |
|
21.5 The advantages of SSI |
|
|
369 | (5) |
|
SSI Scorecard for voting 3 |
|
|
70 | (302) |
|
|
372 | (2) |
|
22 Healthcare supply chain powered by SSI |
|
|
374 | (9) |
|
|
|
|
375 | (1) |
|
22.2 Supply chain transparency and efficiency through SSI |
|
|
376 | (1) |
|
22.3 Industry ecosystem efficiency powered by SSI |
|
|
377 | (2) |
|
22.4 Future supply chain transformation across industries: The big picture |
|
|
379 | (1) |
|
|
379 | (1) |
|
22.6 Authentication and quality |
|
|
380 | (1) |
|
22.7 SSI Scorecard for the pharma supply chain |
|
|
380 | (3) |
|
|
382 | (1) |
|
23 Canada: Enabling self-sovereign identity |
|
|
383 | (11) |
|
|
|
23.1 The Canadian context |
|
|
384 | (1) |
|
23.2 The Canadian approach and policy framework |
|
|
384 | (1) |
|
23.3 The Pan-Canadian Trust Framework |
|
|
385 | (2) |
|
|
387 | (1) |
|
|
388 | (1) |
|
23.6 Digital ecosystem roles |
|
|
388 | (2) |
|
23.7 Supporting infrastructure |
|
|
390 | (1) |
|
23.8 Mapping the SSI stack to the PCTF model |
|
|
391 | (1) |
|
23.9 Using the Verifiable Credentials Model |
|
|
391 | (1) |
|
23.10 Enabling Self-Sovereign Identity |
|
|
392 | (1) |
|
23.11 SSI Scorecard for the Pan-Canadian Trust Framework |
|
|
392 | (2) |
|
24 From elDAS to SSI in the European Union |
|
|
394 | (13) |
|
Dr. Ignacio Alamillo-Domingo |
|
|
24.1 PKI: The first regulated identity service facility in the EU |
|
|
395 | (1) |
|
24.2 The EU legal framework |
|
|
396 | (2) |
|
24.3 The EU identity federation |
|
|
398 | (4) |
|
The legal concept of electronic identification (eID) |
|
|
398 | (2) |
|
The scope of the eIDAS FIM Regulation and its relationship with national law |
|
|
400 | (2) |
|
24.4 Summarizing the value of eIDAS for SSI adoption |
|
|
402 | (1) |
|
24.5 Scenarios for the adoption of SSI in the EU identity metasystem |
|
|
403 | (3) |
|
24.6 SSI Scorecard for the EBSI |
|
|
406 | (1) |
References |
|
407 | (2) |
Appendix A Additional Livebook chapters |
|
409 | (5) |
Appendix B Landmark essays on SSI |
|
414 | (3) |
Appendix C The path to self-sovereign identity |
|
417 | (8) |
|
Appendix D Identity in the Ethereum blockchain ecosystem |
|
425 | (9) |
|
|
Appendix E The principles of SSI |
|
434 | (3) |
Contributing authors |
|
437 | (12) |
Index |
|
449 | |