This proposal introduces a standard for decentralized identity verification (DID) on the blockchain. The standard leverages cryptographic hashes to represent identity proofs and events for transparency and traceability. By emphasizing simplicity, privacy, and user control, this proposal aims to reduce overhead for developers and users, ensuring seamless integration into decentralized applications (dApps). It offers a minimalistic solution that keeps identity structure simple and enables off-chain mechanisms for detailed identity management and verification.
Motivation
Centralized identity verification methods are cumbersome, prone to data breaches, and fail to provide users control over their identity data. Existing DID solutions often introduce complexity, making adoption challenging for developers and users. This proposal seeks to address these issues by:
Offering a minimalistic, decentralized standard that simplifies identity verification.
Providing privacy-preserving mechanisms that keep sensitive identity data off-chain.
Encouraging wider adoption by enabling seamless integration into dApps across various industries.
Stakeholders
The following stakeholders will benefit from this proposal:
dApp Developers
Developers creating decentralized applications that require identity verification can implement this standard to provide users with secure, decentralized identity management. The minimalistic design makes it easier to integrate into existing workflows without adding unnecessary complexity.
Service Providers
Platforms offering services such as decentralized finance (DeFi), gaming, or social networking can integrate this standard to verify user identities without relying on centralized authorities. This reduces the risk of fraud and enhances user trust.
Enterprises
Companies looking to integrate blockchain-based identity solutions into their existing systems can use this standard to ensure secure and privacy-preserving identity verification. This allows for a seamless transition to decentralized technologies while maintaining user privacy and security.
Developers of Interoperability Solutions
Those working on cross-platform and cross-blockchain interoperability can implement this standard to enable a unified identity verification mechanism across different systems, reducing complexity and increasing user control over their identities.
Differentiation
This proposal stands out from other DID standards by focusing on minimalism, user control, and privacy. Unlike other solutions that encompass a wide range of identity attributes and interactions, this standard keeps the structure simple and relies on off-chain mechanisms for detailed identity management. Its simplicity fosters easier adoption, making it ideal for dApps that prioritize user-centric, secure ecosystems.
Specification
The Decentralized Identity Verification (DID) standard introduces a simple, secure, and privacy-preserving mechanism for verifying user identities on the blockchain. The key components of this standard are outlined below:
Identity Contract
A smart contract that acts as the central authority for identity verification. The contract stores the status of identity verifications for users and ensures that verification events are triggered securely and transparently.
Verification Function
The verifyIdentity function allows a user to submit two verification hashes that represent off-chain proofs or attestations of identity. These hashes can be derived from external sources such as third-party verifiers, documents, or attestations.The function compares the provided hashes and updates the identity verification status accordingly.
Input Parameters:
identityHash: A cryptographic hash representing the user’s identity.
verificationHash: A cryptographic hash derived from the proof or attestation used to verify the identity.
IdentityVerified Event
The IdentityVerified event is emitted when the user’s identity verification is successfully updated. This event ensures traceability and transparency, allowing dApp developers and users to track verification statuses.
Identity Structure
The identity is a simple structure represented by a unique address (public key). Additional identity attributes, such as name or age, are optional and left to off-chain management. This minimal approach keeps the implementation lean, avoiding unnecessary complexity and encouraging broader adoption.
Interface
pragmasolidity^0.8.0;interfaceIDecentralizedIdentity{// Struct to represent an identity
structIdentity{addressuserAddress;// Ethereum address of the user
bytes32identityHash;// Hash of the identity data
bytes32[2]verificationHashes;// Hashes used for verifying identity
boolisVerified;// Indicates if the identity is verified
uint256timestamp;// Timestamp of identity creation
}// Event emitted when a new identity is created
eventIdentityCreated(addressindexeduserAddress,bytes32identityHash,uint256timestamp);// Event emitted when an identity is verified
eventIdentityVerified(addressindexeduserAddress,bytes32[2]verificationHashes,uint256timestamp);// Event emitted when an identity is revoked
eventIdentityRevoked(addressindexeduserAddress,uint256timestamp);// Function to create a new decentralized identity for the caller.
// Parameters:
// - identityHash: Hash of the identity data.
functioncreateIdentity(bytes32identityHash)external;// Function to verify the decentralized identity for the caller.
// Parameters:
// - verificationHashes: Hashes used for verifying the identity. These can be
// derived from off-chain proofs, cryptographic challenges, or other methods
// specific to the implementer's requirements. The exact meaning and derivation
// of the verificationHashes are left to the contract's implementer.
functionverifyIdentity(bytes32[2]calldataverificationHashes)external;// Function to revoke the decentralized identity for the caller.
functionrevokeIdentity()external;// Function to retrieve the decentralized identity for a given user address
// Parameters:
// - userAddress Ethereum address of the user.
// Returns:
// identity The decentralized identity struct.
functiongetIdentity(addressuserAddress)externalviewreturns(Identitymemory);}
Rationale
The design leverages cryptographic hashes to represent identity information, ensuring that sensitive data is not stored directly on the blockchain. The use of verificationHashes allows for flexible identity verification mechanisms. These hashes could be derived from various off-chain proofs, such as cryptographic challenges or attestations, depending on the implementer’s needs. By leaving the interpretation of the verification hashes open, the standard enables adaptability while maintaining privacy and security. Additionally, the inclusion of events ensures transparency and traceability.
Reference Implementation
pragmasolidity^0.8.0;import"./IDecentralizedIdentity.sol";contractDecentralizedIdentityisIDecentralizedIdentity{// Mapping to store identities by user address
mapping(address=>Identity)privateidentities;// Function to create a new decentralized identity for the caller.
// Parameters:
// - identityHash Hash of the identity data.
functioncreateIdentity(bytes32identityHash)externaloverride{// Ensure identity does not already exist
require(identities[msg.sender].userAddress==address(0),"Identity already exists");// Create the identity for the caller
identities[msg.sender]=Identity({userAddress:msg.sender,identityHash:identityHash,verificationHashes:[bytes32(0),bytes32(0)],// Initialize with empty hashes
isVerified:false,timestamp:block.timestamp});// Emit event for the creation of a new identity
emitIdentityCreated(msg.sender,identityHash,block.timestamp);}// Function to verify the decentralized identity for the caller.
// Parameters:
// - verificationHashes: Hashes used for verifying the identity.
functionverifyIdentity(bytes32[2]calldataverificationHashes)externaloverride{// Ensure identity exists
require(identities[msg.sender].userAddress!=address(0),"Identity does not exist");// Update verification hashes and mark identity as verified
identities[msg.sender].verificationHashes=verificationHashes;identities[msg.sender].isVerified=true;// Emit event for the verification of identity
emitIdentityVerified(msg.sender,verificationHashes,block.timestamp);}// Function to revoke the decentralized identity for the caller.
functionrevokeIdentity()externaloverride{// Ensure identity exists
require(identities[msg.sender].userAddress!=address(0),"Identity does not exist");// Mark identity as not verified
identities[msg.sender].isVerified=false;// Emit event for the revocation of identity
emitIdentityRevoked(msg.sender,block.timestamp);}// Function to retrieve the decentralized identity for a given user address
// Parameters:
// - userAddress Ethereum address of the user.
// Returns:
// identity The decentralized identity struct.
functiongetIdentity(addressuserAddress)externalviewoverridereturns(Identitymemory){returnidentities[userAddress];}}
Security Considerations
Secure Hashing: Ensure that identity and verification hashes are generated using a secure hashing algorithm to prevent collisions and ensure the integrity of the identity data.
Replay Attacks: Verification hashes should incorporate nonces or timestamps to prevent replay attacks.
Implementation Flexibility: Developers must ensure that hash generation and validation processes are robust and resistant to manipulation.