Crates.io | noble-did |
lib.rs | noble-did |
version | 0.1.0 |
source | src |
created_at | 2022-04-23 07:50:01.435071 |
updated_at | 2022-04-23 07:50:01.435071 |
description | The DID pallet provides functionality for DIDs management. |
homepage | https://core.tetcoin.org |
repository | https://github.com/tetcore/noble-did |
max_upload_size | |
id | 572557 |
size | 10,872 |
The DID pallet provides functionality for DIDs management. It uses a universal identity registry where all the required data is associated with an address. It enables the possibility to create a portable, persistent, privacy-protecting, and personal identity.
NOTE: This pallet is intended for demonstration purposes and is not audited or ready for production use.
A decentralized identity or self-sovereign identity is a new approach where no one but you own or control the state of your digital identity.
Some of the inherited benefits of self-sovereign identity are:
Decentralized identifiers (DIDs) are a new type of identifier to provide verifiable, decentralized digital identity. These new identifiers are designed to enable the controller of a DID to prove control over it and to be implemented independently of any centralized registry, identity provider, or certificate authority. DIDs are URLs that relate a DID subject to a DID document allowing trustable interactions with that subject. DID documents are simple documents describing how to use that specific DID. Each DID document can express cryptographic material, verification methods, or service endpoints, which provide a set of mechanisms enabling a DID controller to prove control of the DID. Service endpoints enable trusted interactions with the DID subject. - DID - W3C Community Contributor
Execute module tests
cargo test -p pallet-did
This registry allows a regular key pair delegating signing for various purposes to externally managed key pairs. This allows an account or smart contract to be represented, both on-chain as well as off-chain or in payment channels through temporary or permanent delegates.
Any account regardless of whether it's a key pair or a smart contract, is considered to be an account identifier. An identity needs no registration.
Each identity has a single address which maintains ultimate control over it. By default, each identity is controlled by itself. There is only ever a single identity owner. More advanced ownership models could be managed through a multi-signature account.
Ownership of identity is verified by calling the identity_owner(identity: &T::AccountId)
function. This returns the address of the current Identity Owner.
The account owner can replace themselves at any time, by calling the dispatchable change_owner(origin, identity: T::AccountId, new_owner: T::AccountId)
function.
Delegates are addresses that are delegated for a specific time to perform a function on behalf of an identity.
Delegates expire. The expiration time is application specific and dependent on the security requirements of the identity owner. Validity is set using the number of blocks from the time that adding the delegate is set.
You can check to see if an address is a delegate for an identity using the valid_delegate(identity: &T::AccountId, delegate_type: &Vec<u8>, delegate: &T::AccountId)
function. It depends if the address is a valid delegate of the given type.
An identity can assign multiple delegates to manage signing on their behalf for specific purposes.
The account owner can call the add_delegate(origin, identity: T::AccountId, delegate: T::AccountId, delegate_type: Vec<u8>, valid_for: T::BlockNumber)
function.
A delegate may be manually revoked by calling the revoke_delegate(origin, identity: T::AccountId, delegate_type: Vec<u8>, delegate: T::AccountId)
function.
These attributes are set using the add_attribute(origin, identity: T::AccountId, name: Vec<u8>, value: Vec<u8>, valid_for: T::BlockNumber)
function.
These attributes are revoked using the revoke_attribute(origin, identity: T::AccountId, name: Vec<u8>)
function.
An identity may need to publish some information that is only needed off-chain but still requires the security benefits of using a blockchain.
This can be done by signing an off-chain transaction with the AttributeTransaction
structure and updating it on-chain by executing the execute(origin, transaction: AttributeTransaction<T::Signature, T::AccountId>)
function.
A set of data that describes the subject of a DID, including mechanisms, such as public keys and pseudonymous biometrics, that the DID subject can use to authenticate itself and prove their association with the DID. A DID Document may also contain other attributes or claims describing the subject. These documents are graph-based data structures that are typically expressed using JSON-LD, but may be expressed using other compatible graph-based data formats. DID - Documents
To create a DID-Document, a DID resolver needs to get all the information from the registry and validate the credentials. DID resolvers are a separate component in the DID stack.
{
"@context":"https://w3id.org/did/v1",
"id":"did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX",
"publicKeys":[
{
"id":"did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX#owner",
"owner":"did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX",
"type":"Secp256k1VerificationKey2018",
"publicKeyHex":"e43a60dbfc251a3a835b45b172bcb49243ed56f820ca89a1c746143c1ab9565d",
"address":"5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX"
},
{
"id":"did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX#signingKey#delegate-1",
"type":"Sr25519VerificationKey2018",
"publicKeyHex":"dea36bf1a0c198afd259633c2e70b502b19577cc5133760ac569ea6fb4d3b977",
"address":"5H6d2vR8iqQRANBe7bNegFbEiEJgeCKid4VhS3Pg52VUEqeM"
},
{
"id": "did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX#delegate-2",
"type": "RSAVerificationKey2018",
"owner": "did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX",
"publicKeyPem": "-----BEGIN PUBLIC KEY...END PUBLIC KEY-----\r\n",
}
],
"service": [
{
"id": "did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX#openid",
"serviceEndpoint":"https://openid.example.com/",
"type":"OpenIdConnectVersion1.0Service"
}
],
"authentication":[
{
"type":"Secp256k1SignatureAuthentication2018",
"publicKey":"did:substrate:5HDx7jPsiED6n47eNfERrBBRHZb59jVW6UMZZMTSBpikzvhX#owner",
}
],
"updated":"2019-06-03T06:41:39.723Z"
}
{
"@context":"https://w3id.org/did/v1",
"id":"did:ethr:0xb9c5714089478a327f09197987f16f9e5d936e8a",
"publicKey":[
{
"id":"did:ethr:0xb9c5714089478a327f09197987f16f9e5d936e8a#owner",
"type":"Secp256k1VerificationKey2018",
"owner":"did:ethr:0xb9c5714089478a327f09197987f16f9e5d936e8a",
"ethereumAddress":"0xb9c5714089478a327f09197987f16f9e5d936e8a"
}
],
"authentication":[
{
"type":"Secp256k1SignatureAuthentication2018",
"publicKey":"did:ethr:0xb9c5714089478a327f09197987f16f9e5d936e8a#owner"
}
]
}
{
"@context":"https://w3id.org/did/v1",
"id":"did:3:zdpuAt4qH8ur3vHpVrP1xb7rtJuyVUVbRiGatkkVcJZRgAXDf",
"publicKeys":[
{
"id":"did:3:zdpuAt4qH8ur3vHpVrP1xb7rtJuyVUVbRiGatkkVcJZRgAXDf#signingKey",
"type":"Secp256k1VerificationKey2018",
"publicKeyHex":"03fdd57adec3d438ea237fe46b33ee1e016eda6b585c3e27ea66686c2ea5358479"
},
{
"id":"did:3:zdpuAt4qH8ur3vHpVrP1xb7rtJuyVUVbRiGatkkVcJZRgAXDf#encryptionKey",
"type":"Curve25519EncryptionPublicKey",
"publicKeyBase64":"AtF8hCxh9h1zlExuOZutuw+tRzmk3zVdfA=="
},
{
"id":"did:3:zdpuAt4qH8ur3vHpVrP1xb7rtJuyVUVbRiGatkkVcJZRgAXDf#managementKey",
"type":"Secp256k1VerificationKey2018",
"ethereumAddress":"0xb9c5714089478a327f09197987f16f9e5d936e8a"
}
],
"authentication":[
{
"type":"Secp256k1SignatureAuthentication2018",
"publicKey":"did:3:zdpuAt4qH8ur3vHpVrP1xb7rtJuyVUVbRiGatkkVcJZRgAXDf#signingKey"
}
]
}
This DID pallet is for learning and evaluation purposes only. This code not audited and reviewed for production use cases. You can expect bugs and security vulnerabilities. Do not use it as-is in real applications.