222
M. Polychronaki et al.
3.2.1
Decentralized Identifiers (DIDs)
DIDs are based on the idea of globally unique identifiers. It is a new standard that
allows entities to generate their own identities taking advantage of systems they trust,
while they remain the true holders of their identities [19]. This standard focuses on
the information which a decentralized identity should hold and on the description of
the actors in a decentralized IAM architecture.
The DID standard is essentially a unique identifier comprising three sections:
• The “scheme DID” which is a specific JSON schema in order to provide context
consistency
• The “DID method” which specifies the type of identity created and what methods
are to be used on it (e.g., update, deactivate, etc.)
• The “Method specific identifier” which is the unique id number, resolving to a
unique DID Document containing the entity’s attributes.
The DID document is the part of the identity which contains all the necessary
information regarding the entity it represents. It may also contain the cryptographic
material for verification on the system. Its attributes can be modified by the DID
controller, the component with the capability to produce changes to the DID, if
defined within the DID method.
Lastly, one more basic component is the verifiable data registry, which is the
system running on top of a network, offering the necessary services for registering
and returning data regarding DIDs. The most common examples of these are the
distributed ledgers, such as blockchain, any decentralized file system or peer-to-peer
network.
3.2.2
Verifiable Credentials (VCs)
On the other hand, VC is the standard which focuses on the cryptographic capabilities
of an identity, aiming at the creation of digital credentials which are verifiable through
the web, offering the same benefits with the physical ones (e.g., driver’s license) [26].
VCsaretobeusedwithcryptographictechnicsandalgorithmstoproducedifferent
verifiable public keys for the properties an entity may want to proof, without compro-
mising any personal details or information. This can be achieved by generating veri-
fiable presentations, digitally signed by the entity in order to prove the ownership
and authorship of the respective identity.
VCs are designed in such a way that they can provide privacy to the users as well as
scalability to the system. Officially, the characteristics of this standard are specified
within the scope of an ecosystem, which comprised three basic components, besides
the holder of the identity: