Digital self sovereign identity Image
01.01.2020

10 Principles for Digital Identity

MATTR

These principles were originally posted by Christopher Allen following the Internet Identity Workshop (IIW) in 2016 and remain relevant today.

A number of different people have written about the principles of identity. Kim Cameron wrote one of the earliest “Laws of Identity”, while the aforementioned Respect Network policy and W3C Verifiable Claims Task Force FAQ offer additional perspectives on digital identity. This section draws on all of these ideas to create a group of principles specific to self sovereign identity. As with the definition itself, consider these principles a departure point to provoke a discussion about what’s truly important.

These principles recognise that an identity system must balance transparency, fairness, and support of the commons with protection for the individual.

1. Existence

Users must have an independent existence. Any self sovereign identity is ultimately based on the ineffable “I” that’s at the heart of identity. It can never exist wholly in digital form. This must be the kernel of self that is upheld and supported. A self sovereign identity simply makes public and accessible some limited aspects of the “I” that already exists.

2. Control

Users must control their identities. Subject to well-understood and secure algorithms that ensure the continued validity of an identity and its claims, the user is the ultimate authority on their identity. They should always be able to refer to it, update it, or even hide it. They must be able to choose celebrity or privacy as they prefer. This doesn’t mean that a user controls all of the claims on their identity: other users may make claims about a user, but they should not be central to the identity itself.

3. Access

Users must have access to their own data. A user must always be able to easily retrieve all the claims and other data within his identity. There must be no hidden data and no gatekeepers. This does not mean that a user can necessarily modify all the claims associated with his identity, but it does mean they should be aware of them. It also does not mean that users have equal access to others’ data, only to their own.

4. Transparency

Systems and algorithms must be transparent. The systems used to administer and operate a network of identities must be open, both in how they function and in how they are managed and updated. The algorithms should be free, open-source, well-known, and as independent as possible of any particular architecture; anyone should be able to examine how they work.

5. Persistence

Identities must be long-lived. Preferably, identities should last forever, or at least for as long as the user wishes. Though private keys might need to be rotated and data might need to be changed, the identity remains. In the fast-moving world of the Internet, this goal may not be entirely reasonable, so at the least identities should last until they’ve been outdated by newer identity systems. This must not contradict a “right to be forgotten”; a user should be able to dispose of an identity if he wishes and claims should be modified or removed as appropriate over time. To do this requires a firm separation between an identity and its claims: they can't be tied forever.

6. Portability

Information and services about identity must be transportable. Identities must not be held by a singular third-party entity, even if it's a trusted entity that is expected to work in the best interest of the user. The problem is that entities can disappear – and on the Internet, most eventually do. Regimes may change, users may move to different jurisdictions. Transportable identities ensure that the user remains in control of his identity no matter what, and can also improve an identity’s persistence over time.

7. Interoperability

Identities should be as widely usable as possible. Identities are of little value if they only work in limited niches. The goal of a 21st-century digital identity system is to make identity information widely available, crossing international boundaries to create global identities, without losing user control. Thanks to persistence and autonomy these widely available identities can then become continually available.

8. Consent

Users must agree to the use of their identity. Any identity system is built around sharing that identity and its claims, and an interoperable system increases the amount of sharing that occurs. However, sharing of data must only occur with the consent of the user. Though other users such as an employer, a credit bureau, or a friend might present claims, the user must still offer consent for them to become valid. Note that this consent might not be interactive, but it must still be deliberate and well-understood.

9. Minimalisation

Disclosure of claims must be minimised. When data is disclosed, that disclosure should involve the minimum amount of data necessary to accomplish the task at hand. For example, if only a minimum age is called for, then the exact age should not be disclosed, and if only an age is requested, then the more precise date of birth should not be disclosed. This principle can be supported with selective disclosure, range proofs, and other zero-knowledge techniques, but non-correlatibility is still a very hard (perhaps impossible) task; the best we can do is to use minimalisation to support privacy as best as possible.

10. Protection

The rights of users must be protected. When there is a conflict between the needs of the identity network and the rights of individual users, then the network should err on the side of preserving the freedoms and rights of the individuals over the needs of the network. To ensure this, identity authentication must occur through independent algorithms that are censorship-resistant and force-resilient and that are run in a decentralised manner.


Glossary

Authority. A trusted entity that is able to verify and authenticate identities. Classically, this was a centralised (or later, federated) entity. Now, this can also be an open and transparent algorithm run in a decentralised manner.

Claim. A statement about an identity. This could be: a fact, such as a person’s age; an opinion, such as a rating of their trustworthiness; or something in between, such as an assessment of a skill.

Credential. In the identity community, this term overlaps with claims. Here it is used instead for the dictionary (dictionary.com) definition: “entitlement to privileges, or the like, usually in written form”. In other words, credentials refer to the state-issued plastic and paper IDs that grant people access in the modern world. A credential generally incorporates one or more identifiers and numerous claims about a single entity, all authenticated with some sort of digital signature.

Identifier. A name or other label that uniquely identifies an identity. For simplicity's sake, this term has been avoided in this article (except in this glossary), but it's generally important to an understanding of digital identity.

Identity. A representation of an entity. It can include claims and identifiers. In this article, the focus is on digital identity.


This article is adapted from Christopher Allen’s “The Path to Self-Sovereign Identity” under a Creative Commons Attribution-ShareAlike 4.0 International License.

You may also be interested in.

15.07.2020 Originally published on July 15, 2020 at medium.com

If you build an island, you’ll need a boat

Emily Fry and Tobias Looker

08.05.2020 Originally published on May 8, 2020 at medium.com

JWT vs Linked Data Proofs: comparing Verifiable Credentials

Nader Helmy

08.05.2020 Originally published on May 8, 2020 at medium.com

A solution for privacy-preserving Verifiable Credentials

Nader Helmy

31.03.2020 Originally published on March 31, 2020 at womeninidentity.org

SSI? What we really need is full data portability

Emily Fry and Elizabeth M. Renieris