Remove tags distributed ledger
article thumbnail

Operationalizing Digital Relationships

Phil Windley

The credential they issue is founded on the credential definition and public DID (an algorithmic identifier) that Attester Org wrote to the ledger. As a credential issuer, Attester Org has an algorithmic identifier in the form of a public DID that has been recorded on the ledger. When Alice later needs to prove something (e.g.

article thumbnail

Launching the Sovrin Network

Phil Windley

We do not intend to ever reset the ledger. Transactions written to the provisional network will be part of the Sovrin ledger for all time. Rather, launching a distributed ledger involves a ceremony that is designed to give everyone confidence that the network is secure and has no backdoors through the principle of diffuse trust.

Network 63
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fixing the Five Problems of Internet Identity

Phil Windley

Summary: Sovrin capitalizes on decades of cryptographic research and the now widespread availability of decentralized ledger technology to rethink identity solutions so that we can have scalable, flexible, private interactions with consent despite the issues that distance introduces. Handling the Five Problems of Identity.

article thumbnail

The Case for Decentralized Identity

Phil Windley

Distributed ledgers—blockchains—promise to solve this by providing decentralized discovery that is secure and efficient. Decentralized identity might start with a distributed ledger, but making a system that is private, secure, and useful requires much more. But just having a blockchain isn't enough.

System 92
article thumbnail

dApps Are About Control, Not Blockchains

Phil Windley

In it, he defines a dApp (or decentralized application): The commonly accepted definition of a dApp is, in short, an application that can operate autonomously using a distributed ledger system. Tags: dapps picos blockchain pcaa Blockchains are an implementation choice and there are other ways to solve the problem.

article thumbnail

DIDComm and the Self-Sovereign Internet

Phil Windley

As an interoperable protocol, DIDComm is not dependent on a specific operating system, programming language, vendor, network, hardware platform, or ledger 3. Tags: decentralized+identifiers didcomm protocol ssi identity credentials self-sovereign vrm me2b. This is the basis for saying peer DIDs are self certifying.

article thumbnail

The Architecture of Identity Systems

Phil Windley

Identity systems that rely on a ledger have an algorithmic architecture. I'm using "ledger" as a generic term for any algorithmically controlled distributed consensus-based datastore including public blockchains, private blockchains, distributed file systems, and others. Algorithmic Architecture. click to enlarge).