[Part 2 of 2] We talk with Orie Steele of Transmute, an editor of the did:key spec and Mike Varley of SecureKey, who has worked through that spec and implemented did:key for his company. did:key might be the simplest and most useful DID method out there. It certainly was the most surprising when we first learned of it: did:key encodes everything needed to generate a valid DID Document in the DID itself, making it easy to understand and implement.
References
- BLS12-381
- CCG – Credentials Community Group at the World Wide Web Consortium
- COSE – CBOR Object Signing and Encryption
- Daniel J. Bernstein (djb)
- Decentralized Identity Foundation (DIF)
- did:peer Specification
- DID Test Suite
- Digital Signatures
- DHS SVIP (Department of Homeland Security’s Silicon Valley Innovation Program) Demo Week
- ED25519
- Elliptic Curve Digital Signature Algorithm (ECDSA)
- Go Lang
- Internet Assigned Numbers Authority (IANA)
- JOSE – Javascript Object Signing and Encryption
- Key Agreement
- Legendary Requirements
- Lib Sodium
- Multibase
- National Institute of Standards and Technology (NIST)
- NIST Curve P256
- NIST Curve P384
- NIST Curve P521
- Pretty Good Privacy (PGP)
- Public Key Cryptography
- Safe Curves Website
- Secp256k1
- Secure Key
- Sidetree
- Signal
- SSI – Self Sovereign Identity
- Stevens Institute of Technology at Hoboken
- Transmute Industries
- Transmute Industries DID key
- TrustBloc
- UVARINT
- Verifiable Claims Data Model and Representations specification
- Verifiable Credentials
- Verified Me
- W3C DID Core Specification v1.0
- W3C DID Specification Registries
- W3C DID Test Suite
- X25519
- Zero Knowledge Proof
Hosts: Joe Andrieu, Eric Schuh, and Erica Connell
Producer: Erica Connell
Executive Producer: Joe Andrieu
The Rubric is a production of Legendary Requirements
©2021 Legendary Requirements, LLC. All rights reserved.