SlideShare a Scribd company logo

PolygonID Zero-Knowledge Identity Web2 & Web3

SSIMeetup
SSIMeetup

Polygon ID offers tools that allow developers to build self-sovereign, decentralized and private identity solutions for users that leverage zero knowledge proofs. Polygon ID was released as open source last March 2023 at ETH Denver. In this presentation, Otto Mora, BD Lead for Americas, and Oleksander Brezhniev, Technical Lead at Polygon ID, will be covering aspects of the did:PolygonID method including: Verifiable presentations leveraging ZK Proofs; How the Proofs are generated; Credential Issuance Methods; and Identity Management Features.

PolygonID Zero-Knowledge Identity Web2 & Web3

1 of 20
Download to read offline
This presentation is released under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.org
Zero-Knowledge Identity
for Web2 & Web3
Otto Mora
@OttoMorac
1. Empower global SSI
communities
2. Open to everyone interested
in SSI
3. All content is shared with CC
BY SA
Alex Preukschat @SSIMeetup
@AlexPreukschat
James Monaghan
@james_monaghan
Coordinating Node
SSIMeetup.org
SSIMeetup objectives
https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org
Polygon ID - @OttoMorac
Agenda - Polygon ID
● Intro
● Polygon ID: Verifiable presentations leveraging ZK Proofs
● did:PolygonID overview:
○ How ZK Proofs are generated
○ Credential Issuance Methods
○ Identity Management Features
○ Merkle Trees and Claims Revocation
● What is available today?
● Q&A
https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org
Polygon ID - @OttoMorac
Have you or a friend ever
done this?
This means that people want selective disclosure in the physical
world, they just don't know that you can do this in the virtual world
too!
https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org
Polygon ID - @OttoMorac
Verifiable Presentations leveraging ZK Proofs
Polygon ID is a user-centered proving system which aims to make all interactions Private by default
Credential is an open and
verifiable standard that can
represent any identity
information.
(For example: date of birth
Jan 1, 1983)
Owner of the credential can
prove to another party that a
credential is true, without
revealing any information
beyond the validity of the
credential itself using
zkSNARK cryptography.
Verifier can request any proof of the
information contained in the identity
credential (using the zkQuery
Request Language) and obtain
guaranteed correctness without
access to the private credential.
(For example: is the credential owner
older than 18 years? Y/N)
Verifiable
Credential
https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org
Polygon ID - @OttoMorac
Are Polygon ID ZK proofs
stored on-chain?
Can polygon ID ZK proofs
be verified on-chain?
No! Yes!
Ad

Recommended

Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Verifiable Credentials, Self Sovereign Identity and DLTs
Verifiable Credentials, Self Sovereign Identity and DLTs Vasiliy Suvorov
 
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --
Modern Authentication -- FIDO2 Web Authentication (WebAuthn) を学ぶ --Jun Kurihara
 
Hyperledger Fabric Private Chaincodeについて
Hyperledger Fabric Private ChaincodeについてHyperledger Fabric Private Chaincodeについて
Hyperledger Fabric Private ChaincodeについてHyperleger Tokyo Meetup
 
SSI DIDs VCs 入門資料
SSI DIDs VCs 入門資料SSI DIDs VCs 入門資料
SSI DIDs VCs 入門資料KAYATO SAITO
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15
IDA,VC,DID関連仕様 最新情報 - OpenID BizDay #15OpenID Foundation Japan
 
MicrosoftのDID/VC実装概要
MicrosoftのDID/VC実装概要MicrosoftのDID/VC実装概要
MicrosoftのDID/VC実装概要Naohiro Fujie
 

More Related Content

What's hot

S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...日本マイクロソフト株式会社
 
Idcon25 FIDO2 の概要と YubiKey の実装
Idcon25 FIDO2 の概要と YubiKey の実装Idcon25 FIDO2 の概要と YubiKey の実装
Idcon25 FIDO2 の概要と YubiKey の実装Haniyama Wataru
 
韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020
韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020
韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020OpenID Foundation Japan
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
自己主権型IDと分散型ID
自己主権型IDと分散型ID自己主権型IDと分散型ID
自己主権型IDと分散型IDNaohiro Fujie
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized IdentityJim Flynn
 
自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥
自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥
自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥blockchainexe
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified ID今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified IDNaohiro Fujie
 
分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要Naohiro Fujie
 
ブロックチェーン系プロジェクトで着目される暗号技術
ブロックチェーン系プロジェクトで着目される暗号技術ブロックチェーン系プロジェクトで着目される暗号技術
ブロックチェーン系プロジェクトで着目される暗号技術MITSUNARI Shigeo
 
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Brandon Muramatsu
 
Bitcoinを技術的に理解する
Bitcoinを技術的に理解するBitcoinを技術的に理解する
Bitcoinを技術的に理解するKenji Urushima
 
zk-SNARKsの仕組みについて
zk-SNARKsの仕組みについてzk-SNARKsの仕組みについて
zk-SNARKsの仕組みについてts21
 
Fast Multiparty Threshold ECDSA with Fast TrustlessSetup
Fast Multiparty Threshold ECDSA with Fast TrustlessSetupFast Multiparty Threshold ECDSA with Fast TrustlessSetup
Fast Multiparty Threshold ECDSA with Fast TrustlessSetupNational Chengchi University
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workAll Things Open
 

What's hot (20)

S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
S13_レガシー ID 管理者でも分かる Verifiable Credentials のセッション [Microsoft Japan Digital D...
 
Idcon25 FIDO2 の概要と YubiKey の実装
Idcon25 FIDO2 の概要と YubiKey の実装Idcon25 FIDO2 の概要と YubiKey の実装
Idcon25 FIDO2 の概要と YubiKey の実装
 
bitcoin technology
bitcoin technologybitcoin technology
bitcoin technology
 
韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020
韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020
韓国における FIDO/ eKYC /DID の現状と今後の取り組み - OpenID Summit 2020
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
自己主権型IDと分散型ID
自己主権型IDと分散型ID自己主権型IDと分散型ID
自己主権型IDと分散型ID
 
Overview of Decentralized Identity
Overview of Decentralized IdentityOverview of Decentralized Identity
Overview of Decentralized Identity
 
Verifiable credentials explained by CCI
Verifiable credentials explained by CCIVerifiable credentials explained by CCI
Verifiable credentials explained by CCI
 
自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥
自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥
自己主権型アイデンティティを実現するIDYXテクノロジー | 鈴木 大、中山貴祥
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified ID今なら間に合う分散型IDとEntra Verified ID
今なら間に合う分散型IDとEntra Verified ID
 
分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要
 
OpenID Connect 4 SSI
OpenID Connect 4 SSIOpenID Connect 4 SSI
OpenID Connect 4 SSI
 
ブロックチェーン系プロジェクトで着目される暗号技術
ブロックチェーン系プロジェクトで着目される暗号技術ブロックチェーン系プロジェクトで着目される暗号技術
ブロックチェーン系プロジェクトで着目される暗号技術
 
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...Digital Credentials Enabling Mobility and Verification of Educational Achieve...
Digital Credentials Enabling Mobility and Verification of Educational Achieve...
 
Bitcoinを技術的に理解する
Bitcoinを技術的に理解するBitcoinを技術的に理解する
Bitcoinを技術的に理解する
 
zk-SNARKsの仕組みについて
zk-SNARKsの仕組みについてzk-SNARKsの仕組みについて
zk-SNARKsの仕組みについて
 
Fast Multiparty Threshold ECDSA with Fast TrustlessSetup
Fast Multiparty Threshold ECDSA with Fast TrustlessSetupFast Multiparty Threshold ECDSA with Fast TrustlessSetup
Fast Multiparty Threshold ECDSA with Fast TrustlessSetup
 
Zero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they workZero Knowledge Proofs: What they are and how they work
Zero Knowledge Proofs: What they are and how they work
 

Similar to PolygonID Zero-Knowledge Identity Web2 & Web3

OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)Torsten Lodderstedt
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36Torsten Lodderstedt
 
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...Srini Karlekar
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
 
Certificate Validation using block chain
Certificate Validation using block chainCertificate Validation using block chain
Certificate Validation using block chainAshokkumarK20CS004
 
KYC using Blockchain
KYC using BlockchainKYC using Blockchain
KYC using Blockchainijtsrd
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication ModelsRaj Chanchal
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For EducationSanjeev Raman
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)Torsten Lodderstedt
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscapekantarainitiative
 
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...Paris Open Source Summit
 
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NGWorteks
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization ModelsCSCJournals
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...IRJET Journal
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossASRoger CARHUATOCTO
 
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...SSIMeetup
 

Similar to PolygonID Zero-Knowledge Identity Web2 & Web3 (20)

OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
SmartQuora - Learn to build a Smart Contract application on Hyperledger Block...
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
Certificate Validation using block chain
Certificate Validation using block chainCertificate Validation using block chain
Certificate Validation using block chain
 
Presentation
PresentationPresentation
Presentation
 
KYC using Blockchain
KYC using BlockchainKYC using Blockchain
KYC using Blockchain
 
Authentication Models
Authentication ModelsAuthentication Models
Authentication Models
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
IDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things LandscapeIDoT: Challenges from the IDentities of Things Landscape
IDoT: Challenges from the IDentities of Things Landscape
 
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
#OSSPARIS19 - MicroServices authentication and authorization with LemonLDAP::...
 
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
[POSS 2019] MicroServices authentication and authorization with LemonLDAP::NG
 
Authentication and Authorization Models
Authentication and Authorization ModelsAuthentication and Authorization Models
Authentication and Authorization Models
 
Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...Application to Quickly and Safely Store and Recover Credit Card’s Information...
Application to Quickly and Safely Store and Recover Credit Card’s Information...
 
Identity Federation on JBossAS
Identity Federation on JBossASIdentity Federation on JBossAS
Identity Federation on JBossAS
 
Blockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and DegreesBlockchain Poc for Certificates and Degrees
Blockchain Poc for Certificates and Degrees
 
Access management
Access managementAccess management
Access management
 
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
Alastria Digital Identity: the Spanish Blockchain solution for SSI - Carlos P...
 

More from SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDSSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersSSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaSSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackSSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveSSIMeetup
 

More from SSIMeetup (20)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher AllenSelf-Sovereign Identity: Ideology and Architecture with Christopher Allen
Self-Sovereign Identity: Ideology and Architecture with Christopher Allen
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
Decentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep diveDecentralized Identifier (DIDs) fundamentals deep dive
Decentralized Identifier (DIDs) fundamentals deep dive
 

Recently uploaded

Red shadows ringing in Japan's Cyberspace
Red shadows ringing in Japan's CyberspaceRed shadows ringing in Japan's Cyberspace
Red shadows ringing in Japan's Cyberspacesttyk
 
Obstructive jaundice is a medical condition characterized by the yellowing of...
Obstructive jaundice is a medical condition characterized by the yellowing of...Obstructive jaundice is a medical condition characterized by the yellowing of...
Obstructive jaundice is a medical condition characterized by the yellowing of...ssuser7b7f4e
 
Augmented and Mixed Reality Solutions for Aerospace & Defense
Augmented and Mixed Reality Solutions for Aerospace & DefenseAugmented and Mixed Reality Solutions for Aerospace & Defense
Augmented and Mixed Reality Solutions for Aerospace & Defensethirdeyegen65
 
Modern Red Teaming - subverting mature defenses on a budget
Modern Red Teaming - subverting mature defenses on a budgetModern Red Teaming - subverting mature defenses on a budget
Modern Red Teaming - subverting mature defenses on a budgetmatt806068
 
UGBINTERNETBANKING FACILITY LAUNCHED.pptx
UGBINTERNETBANKING FACILITY LAUNCHED.pptxUGBINTERNETBANKING FACILITY LAUNCHED.pptx
UGBINTERNETBANKING FACILITY LAUNCHED.pptxRiteshsahu101
 
Augmented and Mixed Reality Solutions for Frontline Medical Professionals
Augmented and Mixed Reality Solutions for Frontline Medical ProfessionalsAugmented and Mixed Reality Solutions for Frontline Medical Professionals
Augmented and Mixed Reality Solutions for Frontline Medical Professionalsthirdeyegen65
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
[Hackersuli]Privacy on the blockchain
[Hackersuli]Privacy on the blockchain[Hackersuli]Privacy on the blockchain
[Hackersuli]Privacy on the blockchainhackersuli
 
history of tau gamma architect.1968.....
history of tau gamma architect.1968.....history of tau gamma architect.1968.....
history of tau gamma architect.1968.....josephiigo
 
AWS Overview of AWS Clarify, Feature Store, Hyper parameter Tuning
AWS Overview of AWS  Clarify, Feature Store, Hyper parameter TuningAWS Overview of AWS  Clarify, Feature Store, Hyper parameter Tuning
AWS Overview of AWS Clarify, Feature Store, Hyper parameter TuningVarun Garg
 

Recently uploaded (13)

Red shadows ringing in Japan's Cyberspace
Red shadows ringing in Japan's CyberspaceRed shadows ringing in Japan's Cyberspace
Red shadows ringing in Japan's Cyberspace
 
Obstructive jaundice is a medical condition characterized by the yellowing of...
Obstructive jaundice is a medical condition characterized by the yellowing of...Obstructive jaundice is a medical condition characterized by the yellowing of...
Obstructive jaundice is a medical condition characterized by the yellowing of...
 
Augmented and Mixed Reality Solutions for Aerospace & Defense
Augmented and Mixed Reality Solutions for Aerospace & DefenseAugmented and Mixed Reality Solutions for Aerospace & Defense
Augmented and Mixed Reality Solutions for Aerospace & Defense
 
Modern Red Teaming - subverting mature defenses on a budget
Modern Red Teaming - subverting mature defenses on a budgetModern Red Teaming - subverting mature defenses on a budget
Modern Red Teaming - subverting mature defenses on a budget
 
INTERNET
INTERNETINTERNET
INTERNET
 
UGBINTERNETBANKING FACILITY LAUNCHED.pptx
UGBINTERNETBANKING FACILITY LAUNCHED.pptxUGBINTERNETBANKING FACILITY LAUNCHED.pptx
UGBINTERNETBANKING FACILITY LAUNCHED.pptx
 
B1 Evaluation.docx
B1 Evaluation.docxB1 Evaluation.docx
B1 Evaluation.docx
 
Augmented and Mixed Reality Solutions for Frontline Medical Professionals
Augmented and Mixed Reality Solutions for Frontline Medical ProfessionalsAugmented and Mixed Reality Solutions for Frontline Medical Professionals
Augmented and Mixed Reality Solutions for Frontline Medical Professionals
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
[Hackersuli]Privacy on the blockchain
[Hackersuli]Privacy on the blockchain[Hackersuli]Privacy on the blockchain
[Hackersuli]Privacy on the blockchain
 
history of tau gamma architect.1968.....
history of tau gamma architect.1968.....history of tau gamma architect.1968.....
history of tau gamma architect.1968.....
 
Riesgos online
Riesgos onlineRiesgos online
Riesgos online
 
AWS Overview of AWS Clarify, Feature Store, Hyper parameter Tuning
AWS Overview of AWS  Clarify, Feature Store, Hyper parameter TuningAWS Overview of AWS  Clarify, Feature Store, Hyper parameter Tuning
AWS Overview of AWS Clarify, Feature Store, Hyper parameter Tuning
 

PolygonID Zero-Knowledge Identity Web2 & Web3

  • 1. This presentation is released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org Zero-Knowledge Identity for Web2 & Web3 Otto Mora @OttoMorac
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA Alex Preukschat @SSIMeetup @AlexPreukschat James Monaghan @james_monaghan Coordinating Node SSIMeetup.org SSIMeetup objectives
  • 3. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Agenda - Polygon ID ● Intro ● Polygon ID: Verifiable presentations leveraging ZK Proofs ● did:PolygonID overview: ○ How ZK Proofs are generated ○ Credential Issuance Methods ○ Identity Management Features ○ Merkle Trees and Claims Revocation ● What is available today? ● Q&A
  • 4. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Have you or a friend ever done this? This means that people want selective disclosure in the physical world, they just don't know that you can do this in the virtual world too!
  • 5. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Verifiable Presentations leveraging ZK Proofs Polygon ID is a user-centered proving system which aims to make all interactions Private by default Credential is an open and verifiable standard that can represent any identity information. (For example: date of birth Jan 1, 1983) Owner of the credential can prove to another party that a credential is true, without revealing any information beyond the validity of the credential itself using zkSNARK cryptography. Verifier can request any proof of the information contained in the identity credential (using the zkQuery Request Language) and obtain guaranteed correctness without access to the private credential. (For example: is the credential owner older than 18 years? Y/N) Verifiable Credential
  • 6. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Are Polygon ID ZK proofs stored on-chain? Can polygon ID ZK proofs be verified on-chain? No! Yes!
  • 7. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Verifiable Presentation Issuer Polygon ID - DID Method supporting VCs Holder (Wallet) Verifier DID Registry + Claims and Revocations Merkle Tree Roots Verifiable Credential 1 JSON-LD Iden3 Claim … Record identity states … Verify identity states presented match the ones published Verifiable Credential 2 JSON-LD Iden3 Claim Verifiable Credential N JSON-LD Iden3 Claim Note: JWZ is Json Web Zero Knowledge, a form of modified JWT did:polygonid - Privacy preserving verifiable credentials method, selective and private disclosure of specific data attributes without revealing the user's main identifier. JWZ with a Proof of a zk Query request for Verifiable Credential 1 Get latest identity states JWZ with a Proof of a zk Query request for Verifiable Credential 2 JWZ with a Proof of a zk Query request for Verifiable Credential N
  • 8. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Covid Passport ID Personal information ... ... User information Credential Signature Proof generation and validation Finally, the user generates a proof using his wallet. Verifier validates information by only using the BJJ signature generated previously by the Issuer. Participants Events Milestone User provides information and Issuer validates it and generates the "credential" Generated by Issuer using the Polygon ID technology User and Verifier “SIG Method”: Issuance of Credentials with Baby JubJub (BJJ) Key Signatures The credential is not added to the Issuer’s Merkle tree, instead a baby jub jub (BJJ) signature is used which is then verified upon presentation. After the initial issuer state has been published on-chain; it is free to issue claims off-chain (similar to did:ethr). The credential is not added to the Issuer’s Merkle tree, instead a babyjubjub (BJJ) signature is added to the credential.
  • 9. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac By means of a zk Proof one party (the User or Prover) can prove to another party (the Verifier) that a given information is known, without conveying any additional information that is not essential to an interaction. The protocol ensures that the zk Proof information can only be verified by the recipient if the actual information being proven does exist, without the need to share the concrete information. “MTP Method”: Issuance of Credentials with Claims Merkle Tree (Merkle Tree Proof) Covid Passport ID Unique Root Hash generated based on the information provided in the Merkle Tree. Personal information ... ... The validation of the proof is done against the Hash published on-chain NO personal information is shared with the verifier at any time hence, the privacy is preserved. This method enables smart contracts to issue credentials. User information Merkle Tree Hash published on-chain Proof generation/ validation Finally, the user generates a proof using his wallet. Verifier validates information against hash generated previously by Issuer or delegated party. Participants Events Milestone User provides information and Issuer validates it and generates the "claims" (leafs) of the Merkle Tree. Generated by Issuer using the Polygon ID technology User and Verifier Generated by Issuer using Polygon ID technology
  • 10. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac did:PolygonID - Identity Management Profiles for identities: users can have as many identifiers (or dids) as they like • Default behavior: anonymous random identifier generated for each interaction • User can decide to select a permanent identifier for interactions with a verifier • Identity Profiles allow users to hide their Genesis Identifier during interactions. Instead, users will be identified by their Identity Profile. Kevin Wendell Crumb Hedwig Dennis Patricia The Beast
  • 11. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Splitting keys from Identities: did:PolygonID - Identity Management • Support for multiple keys and key rotation • Sybil resistance, Proof of uniqueness, and one-person-one-vote through the use of nullifiers • A history of the profiles used is kept by the user locally in their identity wallet Hedwig Profile
  • 12. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Messaging Protocol did:PolygonID - Additional Features • Support for message based communication protocol (“iden3comm” adapted from didcomm) • Communication is transport agnostic and does not need require the usage of https (like Open ID / Oauth does) Additional features: • Smart contracts can verify credentials that were issued off-chain and on-chain • Smart contracts can act as issuers of credentials (“MTP” type credentials) Communication could take place over bluetooth
  • 13. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac • Claims can be issued by the identity holder (and added to the claims tree when issued using the MTP method, more on this later) • Each claim has a unique “revocation nonce” which can be used to revoke the claim (more on revocation later) did:PolygonID - Claims tree Claims Tree: Claims Tree may hold: • Keys • Credentials issued
  • 14. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Identity State Contract: • Initially identities are in genesis state, where their state can be proven directly with the identifier. • The identity states are all published in a "global identity state tree" (sparse merkle tree) on chain. Proofs can be provided to demonstrate that one of the identities is being used without revealing which one. • A smart contract is kept up to date with the information of the identity state (more on this later). The smart contract also has check of state transition function, needed to update the identity state and verify correctness of the transition. did:PolygonID - Identity State Global Identity State Tree (GIST) ID State1 ID State2 ID State3 Key / Value pairs Key: Path to Leaf Value: Identity State ID StateN ID State4 ID State5 ID State6 ID State7 …
  • 15. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac The identity state is a hash of the three merkle trees, which themselves are a hash of: the claim tree the revocation tree the roots tree 15 Polygon ID Identity State stored on-chain 1 2 3 did:PolygonID - Merkle Trees and identity State
  • 16. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac The revocation tree specifies which claims have been revoked The information revealed is only the unique identifier of which claims have been revoked. The revocation tree is composed of the revocation nonces (unique revocation numeric identifier for the claims) and is stored in a public file storage such as Amazon S3, IPFS, Filecoin or similar). 16 Revocation data stored publicly did:PolygonID - Claims Revocation
  • 17. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Contrasting usage of Zero Knowledge Proofs in Identity Feature Polygon ID Anon creds BBS+ ZK Proof type Groth16 SNARKs (STARKs to be used in the future) CL-RSA (requires larger keys for security) BBS+ Signature scheme Keys Baby JubJub (BJJ, lightweight for mobile devices) “link secret” for identity binding, RSA for CL-RSA signatures BLS12-381 Selective Disclosure Yes Yes Yes Predicate Proofs Yes Yes No Private non- revocation proofs Yes, using Sparse Merkle Trees. Computational and storage efficiency. Yes, using Crypto accumulators (CKS scheme). Very computationally heavy and storage demanding. No Credential Issuance Issued in VC format against identifier. Non-interactive. Can be generated from a mobile device or a server. Issued in custom format against link secret commitment. Requires interaction with identity holder. Computationally heavy Issued in VC format against identifier. Non-interactive Blockchain EVM compatible HyperLedger Indy - On-chain verifiability Yes No No
  • 18. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac What is available today? Our technology Our Partners For Users: For Issuer: For Verifiers: Polygon ID App Mobile solution to manage identity, claims and generate zkProofs. • Issuer Node Enables issuers to issue credentials, revoke / update credentials, and manage keys. Verifier Library Integration • Proof validation: -off-chain → libraries in golang + javascript -on-chain → smart contracts (solidity) to interact with SDKS for Wallet Apps: Mobile SDK in Flutter, and Javascript SDK.
  • 19. https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup.org Polygon ID - @OttoMorac Thank You id-bd@polygon.technology Contact us here! Otto Mora Polygon ID, Americas Tech Sales. @ottomorac Oleksander Brezhniev Polygon ID Technical Lead @OBrezhniev