Crates.io | iop-morpheus-proto |
lib.rs | iop-morpheus-proto |
version | 0.0.16 |
source | src |
created_at | 2021-11-09 16:49:04.714399 |
updated_at | 2022-06-30 14:00:43.220964 |
description | Morpheus protocol definitions used on both node and sdk side of the IOP Stackā¢ |
homepage | |
repository | |
max_upload_size | |
id | 478965 |
size | 56,266 |
Morpheus is a framework for decentralized identifiers (DID), key and right management and cryptographically verifiable claims and credentials (VC) about such identities based on a web of trust. For an in-depth description, please check our developer portal.
Morpheus DIDs were based on the W3C DID specification and VCs on the W3C VC specification. Morpheus key management is basically a decentralized version of a Public Key Infrastructure (PKI). Adding Morpheus right management on top is close to a decentralized version of Active Directory. Morpheus VCs provide a privacy-by-design system and enable self sovereignty over your user data.
Having a Rust environment installed (e.g. by using rustup),
you can simply use cargo
to build and test everything, e.g. cargo build
.
Morpheus can generate safe identities for one-time use without requiring any network connectivity. Any key or right management and further optional features requiring public verification like timestamping of content ids and signatures need a public ledger.
The current implementation uses the Hydra blockchain, but is ledger-agnostic in general. Hydra was built as a bridge-chain of the Ark ecosystem and Morpheus adds a layer 2 plugin on top to define custom transactions managing DIDs and rights.
Anything else that does not need public verification is not stored on the ledger or anywhere publicly, with special emphasis on any user data, e.g. verifiable claims. Instead, user data is shared explicitly on demand with only a specific peer. Shared data contains a license describing who might use it for what purpose and when the license expires.
Before sharing user data, the user can mask out any details not meant for sharing without losing cryptographic verifiability of witness signatures. E.g. you have a digital ID signed by some authority. Ordering pizza, you can give your name and address without exposing any other details that are irrelevant for delivering your meal like your birthday and mother's name. Despite those details were masked out, the restaurant can still verify that data was witnessed by the authority. This is achieved by signing a Merkle-proof instead of the data directly. We use JSON digests for our proofs for easy implementation and portability.
Morpheus was built on the KeyVault and elaborates some concepts originally conceived under Mercury that turned out to deserve their own project.
Please contact the package authors.
See the IOP developer page.
Please contact the package authors.