DE
13/12/2022

The Benefits of Self-Sovereign Identity Authentication Using Blockchain

Digital identity has become a part of everyday life and guarding it should be the utmost priority. In the United States alone, the number of identity theft cases reported to the Federal Trade Commission has significantly increased in the last five years – according to the FTC’s Consumer Sentinel Network (CSN) report. The standard way of using a single login and a password is no longer secure and Single Sign-On (SSO) authentication schemes that allow a user to log in with a single ID also seem increasingly outdated as it stores identity data in a centralized way.  

The rising alternative is the Self-Sovereign Identity (SSI) approach to the identity management, which takes advantage of blockchain technology. What makes it so different and secure, and how exactly does it work?

Holder, verifier and issuer

Self-Sovereign Identity makes it possible to change the identity and credential management model from the standard (centralized) client-server model to a peer-to-peer model that enables decentralization. In addition, blockchain technology guarantees the authenticity of data without storing it, which can significantly affect data security and minimize the risk of identity theft. Thanks to it, credentials such as national IDs and driving licenses can be created digitally by governments. 

A subject involved in the identity management process using SSI, usually a person or organization for whom the relevant credentials have been issued and are held in his digital wallet, is conceptually known as a holder. 

An issuer of the credential provides each credential to a specific entity. Examples of an issuer include government institutions, financial institutions and universities. In addition, each credential must be verifiable by the entity running the verification process, known as a verifier. The role of the verifier is to ask for proof (request proof), which the holder may or may not provide (consent is optional). 

All communication, including the signing of credentials, is done by using a Decentralized IDentifier (DID) protocol.  

The importance of DID

Thanks to SSI, credentials are created by you and stored in the blockchain or distributed network. 

A DID itself is a unique identifier. Here’s an example: 

did:test:2m423rm0gi3g59g3n5g. 

DIDs are longer than regular users’ credentials and are not easy to remember. Their main feature is their ability to show that you control and own it. It is possible, due to the fact the ledger stores the public key, while you hold the private key. 

To connect with different peers, you have to utilize different DIDs so every user may have a lot of them. The keys to connect with one organization or person will be used only once DIDs are registered on a distributed network, private blockchain, or public blockchain and do not have any central registration authority. 

It’s worth noting that a Decentralized IDentifier has four characteristics that have never been accessible for any other identifier in history: 

  • it is a permanent identifier and does not need to be changed, 
  • it can be used to check and get metadata, 
  • it proves who is the DID owner, using cryptography, 
  • it does not require a central registration authority. 

A DID is composed of three parts: method-specific identifier, method specification and scheme. Method specification makes it possible to use a DID with various blockchains and enables the right use of method-specific ID at the end of a given DID. 

Method specification describes the possibilities of reading and writing a DID on the blockchain, which might differ for each network depending on its specification. It also defines how to make CRUD (create, read, update, delete) operations on a DID and DID documents. 

What is a DID document?

It’s a JSON-LD document that describes the entity connected with the DID. It treats blockchain like a key-value store, where the key is the DID and the value is the DID document.  To simplify it, a DID makes it possible to see details of the DID document. 

DID document typically consists of six elements: 

  • Decentralized IDentifier used to describe itself
  • Set of public keys permitting it to be verified
  • Set of auth methods allowing authentication
  • Set of service endpoints that make interaction possible
  • A signature proving that the DID Documents are valid 
  • A timestamp representing the creation date

After presenting a DID to a website, using a dedicated link or QR code, the authentication process starts. The website checks your public key and requests you to sign a challenge with your private key. After positive verification of a private key signature with the public key, it is possible to see the DID document. It is not obligatory to store DID documents on the blockchain but keeping a pointer to the DID document on the blockchain is good practice to keep and use another network as a storage for DID documents.  

To make a DID and decentralized identity work together, three layers are required to establish a connection with two different users. 

The first one is the Edge Layer, for example, an app on a smartphone that acts as a digital wallet. The mentioned app will connect with the second layer, known as the Cloud layer. The Cloud layer contains entities that know how to resolve a DID into a DID document. Communication between entities in the Cloud layer is similar to communication in mail servers. The final layer is the DID layer, a blockchain where DID documents can be found. After establishing a connection with two different users, communication between counterparts may be done peer-to-peer in order to reduce actions involving blockchain which are not necessary when transmission is secure. 

Real-life use case scenarios of SSI authentication

Blockchain authentication has plenty of use cases. These real-life examples will show SSI technology and how credentials are issued, stored and verified. The model described below underlines the organizations needed to make the whole process work properly. 

For the sake of the use case scenario description, let’s pick an organization that sets the standards for the schemes. Ideally, a trusted organization – like a governmental body. After establishing which fields should be in such a scheme, the issuing organization (issuer) should follow this standard to align the certificates issued with the organizations verifying those certificates (verifier). As an illustration, let’s create a university graduation scheme and an employment certificate scheme. 

A student, let’s name him John, applies for a job after completing his studies. The corporation he chose requires proof of graduation. The university issues a graduation certificate based on a scheme set by the government – the graduation scheme. Once the certificate is successfully issued and accepted by John  he saves this data in his digital wallet, which is where it will be stored (using a mobile app). Thus, John assumes the role of credential holder. 

When applying for a job with a corporation, John presents credentials in their wallet. Once these credentials are accepted, the corporation obtains reliable proof of John’s graduation. 

In this example, John had the role of person proving his skills as a credentials holder (prover). The university was a credential issuer, while the corporation acted as a credentials verifier.   

Another example can be described as a natural course of a student’s life after he gets a corporate job – applying for a mortgage. To do this, he asks the corporation to issue a credential confirming his employment (a certificate of employment). Based on the scheme standard issued by the government – the corporation issues the relevant credentials (an employment certificate scheme), which, once accepted by John, now an employee in a company, stays in his virtual wallet. John already has two credentials in his digital wallet, which can be used depending on what data subsequent organizations will expect from him. 

John presents the required credentials to the bank (both credentials, to be precise). Once accepted, the bank can see John’s degree and the fact that the he is employed, which should greatly facilitate the decision when granting the loan. 

In this example, John also acted as a person proving his skills (credentials holder/prover). The university and the corporation acted as a credential issuer, and the bank acted as a verifier of the submitted data. 

The examples above show how, if schemes are standardized, users can store and use their own credentials in a secure and decentralized manner.

Ebook "How to Reduce Software Development Costs During an Economic Downturn"

Blockchain network and DID – technical explanation 

How does the information exchange between the issuer, holder and verifier work on the blockchain? Through communication between Aries Cloud Agent Python (ACA-Py) agents, which are directly plugged into the blockchain network. Such agents can be covered by any prepared application that supports the REST API (for example, a module developed in Spring Boot). This allows the REST module to expose endpoints that allow interaction with the ACA-Py agent, while listening for asynchronous messages coming from the blockchain network sent by an agent to dedicated endpoints (i.e., webhook). 

A connection is required to properly exchange data between a user (holder) and an organization (issuer). To do so, a link or QR code, for example, is made available on a dedicated webpage. The user, utilizing the appropriate application, activates the generated link, and as a result, AcceptInvitation messages are exchanged between the agents plugged into the blockchain network with the connectionId parameter, which is unique and dedicated to a specific session. 

Once the connection between the two agents (holder and issuer) is properly established, the actual data exchange can proceed, such as requesting the issuance of the appropriate credentials (issue credentials). In the case of John (holder) and a university (issuer), this can be a request for confirmation of graduation, which he may need to apply to another organization (verifier). According to the information given earlier, the verifier must be able to confirm that the provided credentials are correct – this is the exact spot when the communication between the verifier and the issuer takes place. 

Decentralized IDdentities of the future

Thanks to SSI, it is now possible to build new identity frameworks based on the concept of decentralized identities. By ensuring the authenticity of data without storing it, blockchain technology and the SSI authentication approach can significantly improve data security and minimize the risk of identity theft. This faster, more reliable and more secure solution seems to be the identity management technology of the future.  

Software Mind has extensive identity management-related experience and is up to date with the newest security trends and technologies. Our experts will gladly guide you through the world of security solutions.

Share

Newsletter

Stay on top of the game – follow our newsletter

Related posts

07/07/2022

Why is identity and access management so important in 2022?

23/06/2022

Which cyber security strategies does your company need in 2022 and beyond?

09/06/2022

A stable partnership is essential to software outsourcing

We may already be just one Email away from working together!

contact icon
Witold Gawlowski
Chief Commercial Officer
Kamil Fornal
Chief Operating Officer
scroll down icon back to
top