Book #20 - Self-Sovereign Identity
Self-Sovereign Identity: Decentralized digital identity and verifiable credentials
by Alex Preukschat and Drummond Reed with Christopher Allen, Fabian Vogelsteller, and 52 other leading identity experts (2021)
Wednesday evenings - 6 pm pacific time (every other week)
Meetup: https://www.meetup.com/Los-Gatos-Rust-Reading-Group/events/281706128
Zoom: https://us02web.zoom.us/j/84281187589
Manning: https://www.manning.com/books/self-sovereign-identity
Chapter 9 November 10, 2021 | Presenter |
---|---|
What is a digital wallet, and what does it typically contain? |
|
What is a digital agent, and how does it typically work with a digital wallet? |
|
An example scenario |
|
Design principles for SSI digital wallets and agents |
|
Basic anatomy of an SSI digital wallet and agent |
|
Standard features of end-user digital wallets and agents |
|
Backup and recovery |
|
Advanced features of wallets and agents |
|
Enterprise wallets |
|
Guardianship and delegation |
|
Certification and accreditation |
|
The Wallet Wars: The evolving digital wallet/agent marketplace |
|
Chapter 8 October 27, 2021 | Presenter |
---|---|
The conceptual level: What is DID? | Casey |
The functional level: How DIDs work | Jens |
The architectural level: Why DIDs work | Jens |
Four benefits of DIDs that go beyond PKI | Casey |
The semantic level: What DIDs mean | Casey |
Chapter 7 September 15, 2021 | Presenter |
---|---|
Example uses of VCs | Nico |
The VC ecosystem | Casey |
The VC trust model | Nico |
W3C and the VC standardization process | Casey |
Syntactic representation | Nico |
Basic VC properties | Casey |
Verifiable presentations | Nico |
More advanced VC properties | Casey |
Extensibility and schemas | Nico |
Zero-knowledge proofs | Casey |
Protocols and deployments | Nico |
Security and privacy evaluation | Casey |
Hurdles to adoption | Nico |
Chapter 6 September 1, 2021 | Presenter |
---|---|
Hash functions | Jens |
Encryption | Casey |
Verifiable data structures | Casey |
Proofs | Casey |
Chapter 5 August 18, 2021 |
|
---|---|
The SSI Stack | Casey |
Layer 1: Identifiers and public keys | Casey |
Layer 2: Secure communication and interfaces | Casey |
Layer 3: Credentials | Casey |
Layer 4: Governance frameworks | Casey |
Potential for convergence | Casey |
Chapter 4 August 18, 2021 | Presenter |
---|---|
4.1 Bottom line | Jens |
4.2 Business efficiencies | Jens |
4.3 User experience and convenience | Casey |
4.4 Relationship management | Casey |
4.5 Regulatory compliance | Casey |
Chapter 3 July 21, 2021 | Presenter |
---|---|
A simple notation for SSI scenario diagrams | Casey |
Scenario #1 | Casey |
Scenario #2 | Casey |
Scenario #3 | Jens |
Scenario #4 | Jens - August 18 |
Scenario #5 | Casey - August 18 |
Scenario #6 | Casey - August 18 |
Scenario #7 | Casey - August 18 |
Chapter 2 June 16, 2021 | Presenter |
---|---|
Verifiable credentials | Casey |
Issuers, holders, and verifiers | Jens |
Digital wallets | Casey |
Digital agents | Jens |
Decentralized identifiers (DIDs) | Casey |
Blockchains and other verifiable data registries | Jens |
Governance frameworks | Casey |
Summarizing the building blocks | Jens |
Chapter 1 Why the Internet is missing an identity layer--and why SSI can finally provide one June 2, 2021 | Presenter |
---|---|
Introduction | Casey |
1.3 The three models of digital identity | Casey |
1.4 Why “self-sovereign”? | Jens |
1.6 Market drivers for SSI | Jens |