Skip to main content

Decentralized Identifiers (DID)

A Decentralized Identifier (DID) is a unique identifier that enables self-sovereign identity and allows individuals or entities to have control over their digital identity. In our ZUNI system, DIDs play a crucial role in establishing trust and enabling secure interactions between different stakeholders. Here's an overview of the key concepts related to DIDs:

  • DID Subject: Each entity within the system must create a Solana wallet (account) and associate it with a DID. The DID subject refers to the entity that possesses the DID. It represents a specific individual or entity within the system. Each DID Subject use one or multiple key pairs to create and manage DID. One DID Subject could creates multiple DIDs.

  • DID Controller: The DID controller is the entity authorized to make changes to the DID document associated with a particular DID subject. By default, the DID controller is set to the DID subject's wallet address within the Solana blockchain.

  • Also Known As: This property allows the DID subject to refer to other identifiers associated with their digital identity. These identifiers can be other DIDs or various types of URIs, such as a website or social media profile.

  • Verification Methods: Verification methods are used to authenticate and authorize interactions with the DID subject. They establish the trustworthiness of the subject's identity. Here verification methods refers to public keys of each DID used for different purposes below:

    • Authentication: The authentication property defines the methods or verification processes used to verify the subject's identity, enabling secure access to systems or services.
    • Assertion: The assertion property allows the DID subject to express claims or statements. When verifying a Verifiable Credential (VC), the verifier can check if the signature satisfies the assertion methods defined by the issuer. This ensures that the VC's content is authentic and trustworthy.
    • Key Agreement: Key agreement methods define how (which key pairs) entities can generate encryption material to securely transmit confidential information to the DID subject. This property enables secure communication and data exchange between stakeholders.