In advance of the design workshop, all participants produced a one-or-two page advance reading to be shared with the other attendees on either:
- A specific problem that they wanted to solve with a web-of-trust solution, and why current solutions (PGP or CA-based PKI) can't address the problem?
- A specific solution related to the web-of-trust that you'd like others to use or contribute to?
If you will be attending Rebooting the Web of Trust September 2023 in Cologne, please upload your advance readings to this directory with a pull request.
To add a paper, create a pull request to this repo with your contribution (preferably as an .md file, but if you can't, as a PDF), along with updates to the README.md in this folder. Please also include a byline with contact information in the paper itself.
Please also enter your paper twice in this README file, once in the topical listing (adding a new category describing your topic, if necessary) and one in the alphabetical listing. Please be sure to include the full URL for your paper in the README, so that we can copy it to the main page URL and have it still correctly link.
If you don't know how to submit a pull request, please instead submit an issue.
To those who have submitted an Advance Readings paper, RWOT12 offers a steep discount on the ticket price for participation to the event. Please obtain your discount code as follows.
- Copy the link to your Pull Request (see previous section)
- Email to [email protected], paste the link to the Pull Request and ask for the discount code
Please make sure to make your Pull Request Submission BEFORE you buy the tickets for RWOT12, in order to apply your discount code.
These primers overview major topics which are likely to be discussed at the design workshop. If you read nothing else, read these. (But really, read as much as you can!)
- Advance Reading Primer — About the advance reading papers
- RWOT Primer — How the design workshop works
- DID Primer — Decentralized Identifiers (extended version also available)
- Functional Identity Primer — A different way to look at identity
- Verifiable Credentials Primer — the project formerly known as Verifiable Claims
- Glossary of Terms — a brief dictionary of technical terms used at RWOT
Please add a level three header (###
) for your paper's topic if it's not there already, then link it in the form:
[name](link)
* by [author](mailto:if desired)
* One to two sentence synopsis or quote
* #hashtags for topics
Verifiable Credentials for Company Identification using eIDAS Qualified Seal Certificates
- by Hans Boone
- proposal to bootstrap company identity by using qualified seal certificates.
- #qseal #eidas #ODI #vc
- by Fatemeh Fathi, Björn Adelberg, and Philipp Zagle
- A tool for decentralized storage of individual continuing education biographies
- #self-sovereign-identity #digital-identity #education #skills #distributed-ledger
Verifiable Credentials on the Ceramic Network
- by Golda Velez
- A proposal for native storage and retrieval of verifiable credentials on the Ceramic Network
- #verifiable-credentials #decentralization #ceramic #composedb #shared-data-layer
DIDs and Nostr — Key Management and More
- by Stevan Eraković
- How DIDs can bring easy key management and more to Nostr
- #nostr #dids #decentralized-identity #freedom-of-speech
DID Web Method 2.0: Using DID Traits To Improve on did:web
- by Dmitri Zagidulin, Benjamin Goering, and Juan Caballero
- Proposed enhancements to
did:web
method resulting in a new major version.
A path towards forward secrecy in DIDComm
- by Dan Carez
- A proposal to achieve forward secrecy and post-compromise security via the integration of ratcheted key exchanges in DIDComm.
- #didcomm #forward-secrecy #post-compromise-security #ratcheted-key-exchange
- By Jack Gretsch
- Context for those unfamiliar with the subject
- #wikipedia #selfsovereignidentity #decentralizedidentifiers
A basic conceptual model for verifiable identity
- by l. boldrin
- sketch of a formal model for verifiable identity
- #identity #model
- Decentralized Identity and Access Control Management in Forestry 4.0
- by Yongli Mou
- In the forestry sector, the application of Industry 4.0-compliant concepts, known as Forestry 4.0, holds the promise of revolutionizing forest management and conservation by offering IoT-based capabilities to monitor and manage forest resources.
- #self-sovereign-identity #access control management #IoT #smart Forestry
Deepkey: A Fully P2P Key Management Framework
- by Arthur Brock, Collin McClain
- This paper outlines a method for decentralized key management that relies only on keys and is the first of three papers outlining the digital identity building blocks provided within the Holochain ecosystem.
- #decentralized-identity #key-management #model
DIDs and Nostr — Key Management and More
- by Stevan Eraković
- How DIDs can bring easy key management and more to Nostr
- #nostr #dids #decentralized-identity #freedom-of-speech
Nostr Verifiable Presentation Protocol
- by Imad El Aouny, Frederic Martin
- Exchanging Verifiable Credentials (VCs) and Verifiable Presentations (VPs) within the Nostr ecosystem
- #did #vc #verifiablecredentials #vp #verifiablepresentations #nostr
Sustainable Privacy, Authenticity, and Confidentiality
- by Samuel M. Smith Ph.D.
- In the SPAC whitepaper, a protocol is described using best practices with readily available cryptographic operations to provide secure privacy, authenticity, and confidentiality. The protocol provides a foundation for best practices for what we are calling sustainable privacy.
- #spac #privacy #authenticity #confidentiality
-
Decentralized Identity and Access Control Management in Forestry 4.0
- by Yongli Mou
- Forestry 4.0, given its intrinsically decentralized and diverse framework involving multiple stakeholders and technologies, necessitates a decentralized IAM solution. This study delves into the potential application of self-sovereign identity as a viable solution to optimize access control management in Forestry 4.0 systems, thereby bolstering overall security and operational efficiency.
- #self-sovereign-identity #access control management #IoT #smart forestry
-
Echoes from History: Designing Self-Sovereign Identity with Care
- by Christopher Allen
- Self-sovereign identity represents an innovative new architecture for identity management. But, we must ensure that it avoids the pitfalls of previous identity systems. During World War II, two identity pioneers, the Dutch Jacobus L. Lentz and the French René Carmille, took different approaches toward the collection and recording of personally identifiable data. As a result, 75% of Dutch Jews fell victim to the Holocaust versus 23% of the Jews in France. Our foundational work on self-sovereign identity today could have similar repercussions down the road, so it’s imperative that we design this foundation responsibly with diligence and foresight
- #self-sovereign-identity #history #data-minimization #selective-disclosure
Decentralized Identity and Verifiable Claims for the Arts and Artists
- by Gaya Blair Pendleton, Valerie Brusola, Markus Willms, and Moses Ma
- Articulating the principles and key design considerations for a use case for DIDs and VCs in the world of fine arts involving both physical and digital collectibles
- #did #vc #verifiablecredentials #nft #art #provenance
Nostr Verifiable Presentation Protocol
- by Imad El Aouny, Frederic Martin
- Exchanging Verifiable Credentials (VCs) and Verifiable Presentations (VPs) within the Nostr ecosystem
- #did #vc #verifiablecredentials #vp #verifiablepresentations #nostr
Requirements towards Verifiable Credentials arising from Administrative Acts
- by Markus Batz ([email protected]), Dr. Sebastian Zickau ([email protected])
- Verifiable Credential are supposed to be used in administrative procedures on federal, regional, and municipal level. The Intention is to replace paper-based credentials to drive digitalization whilst implementing self-sovereign identity principals, especially increasing decentralization and user privacy. On the one hand several verifiable credential formats exist covering a set of features, where some features are common to all formats and some features are specific. Administrative acts on the other hand bring in certain requirements, which determine the relevance of these features for the respective administrative act. It is of interest whether certain pattern exists within these requirements fulfilled by certain features which allow to determine suitable or favorable verifiable credential formats for administrative acts.
- verifiablecredentials #federal #municipal #administration #credential-formats
Trust in Verifiable Digital Product Passport
- by Christian Fries, Sebastian Schmittner
- Using verifiable credentials to transform the digital product passport into a verifiable digital product passport
- #vc #verifiablecredentials #dpp
The Monetization of Verifiable Credential Issuer Verification
- by Jen Schreiber
- An exploration of how the monetization of Verifiable Credential Issuer verification will impact the integrity and trust networks within the SSI ecosystem
- #trust #verifiablecredentials #issuers #verification
Verifiable Credential Resolver (VCR) for supply chains
- by Mirko Mollik
- Resoling the endpoint to request VCs from a product having a DID
- #did #vc #verifiablecredentials #supplychain #dpp
Designing Verifiable Computation Presentations
- by Abhishek Mahadevan Raju (TNO)
- Incorporating Proof of Operation/Computation into Verifiable Presentations to facilitate scenarios requiring compelling evidence of completed computations, while potentially also maintaining privacy.
- #vc #verifiablecredentials #verifiablepresentations #verifiablecomputations #zkp #bbs
Verifiable Presentation of Linked Claim Graph
- by Golda Velez and Philip Long
- Validating sets of claims (verifiable credentials) linked together with multibase hashlinks or other content-hash addresses
- #vc #verifiablepresentations #credibility #hashlinks #ceramic
The Human Element: Threats to Trust in Self-Sovereign Identity Systems
- by Ankur Banerjee and Philip Long
- Modelling human factors that could be used to undermine SSI systems using "red team / blue team" techniques used in cybersecurity / war-gaming.
- #security #trust #credibility
ZkFundMe - A Zero-Knowledge Proof and Smart Contract Based Donation Platform
- by Ivan Dimitrov, Mikolaj Radlinski, Diana Dabboussi
- donation platform via zero-knowledge proof
- #zkp #donation #trust
Please also enter your paper alphabetically in the form:
* [Paper Name](link)
- A basic conceptual model for verifiable identity
- A path towards forward secrecy in DIDComm
- Decentralized Identity and Access Control Management in Forestry 4.0
- Decentralized Identity and Verifiable Claims for the Arts and Artists
- Deepkey: A Fully P2P Key Management Framework
- Designing Verifiable Computation Presentations
- DID Web Method 2.0: Using DID Traits To Improve on
did:web
- DIDs and Nostr — Key Management and More
- Echoes from History: Designing Self-Sovereign Identity with Care
- Explain it Like I'm Five
- The Monetization of Verifiable Credential Issuer Verification
- MyEduLife
- Nostr Verifiable Presentation Protocol
- Requirements towards Verifiable Credentials arising from Administrative Acts
- Sustainable Privacy, Authenticity, and Confidentiality
- The Human Element: Threats to Trust in Self-Sovereign Identity Systems
- Trust in Verifiable Digital Product Passports
- Verifiable Credential Resolver (VCR) for supply chains
- Verifiable Credentials for Company Identification using eIDAS Qualified Seal Certificates
- Verifiable Credentials over the Ceramic Network
- Verifiable Presentation of Linked Claim Graph
- ZkFundMe - A Zero-Knowledge Proof and Smart Contract Based Donation Platform