Skip to content

Latest commit

 

History

History

advance-readings

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advance Readings

In advance of the design workshop, all participants produced a one-or-two page advance reading to be shared with the other attendees on either:

  • A specific problem that they wanted to solve with a web-of-trust solution, and why current solutions (PGP or CA-based PKI) can't address the problem?
  • A specific solution related to the web-of-trust that you'd like others to use or contribute to?

If you will be attending Rebooting the Web of Trust Fall 2022 in The Hague, Netherlands, please upload your advance readings to this directory with a pull request.

Pull Request Submission

To add a paper, create a pull request to this repo with your contribution (preferably as an .md file, but if you can't, as a PDF), along with updates to the README.md in this folder. Please also include a byline with contact information in the paper itself.

Please also enter your paper twice in this README file, once in the topical listing (adding a new category describing your topic, if necessary) and one in the alphabetical listing. Please be sure to include the full URL for your paper in the README, so that we can copy it to the main page URL and have it still correctly link.

If you don't know how to submit a pull request, please instead submit an issue.

Request RWOT11 discount code

To those who have submitted an Advance Readings paper, RWOT11 offers a steep discount on the ticket price for participation to the event. Please obtain your discount code as follows.

  • Copy the link to your Pull Request (see previous section)
  • Email to questions@weboftrust.info, paste the link to the Pull Request and ask for the discount code

Please make sure to make your Pull Request Submission BEFORE you buy the tickets for RWOT11, in order to apply your discount code.

Primer Listing

These primers overview major topics which are likely to be discussed at the design workshop. If you read nothing else, read these. (But really, read as much as you can!)

Topical Listing

Please add a level three header (###) for your paper's topic if it's not there already, then link it in the form:

[name](link)
   * by [author](mailto:if desired)
   * One to two sentence synopsis or quote
   * #hashtags for topics
  • by Adrian Gropper, MD, Patient Privacy Rights, Austin, Texas
  • A novel approach to digital identity protocols is presented that gives market power to the human subject of identity-based interactions through their ability to choose a delegate.
  • #Delegation #HumanRights #DID #VerifiableCredentials #w3c #GNAP
  • by Golda Velez, Cooperation.org, Tucson, Arizona
  • A pragmatic approach to enabling any observer to add to the linked trust ecosystem through observed claims. In particular applications to human rights and accountability, and the importance of broad adoption in heterogeneous domains in order to resist bad actors and provide aggregate privacy.
  • #Adoption #HumanRights #AI #risk #trust #hybrid #VerifiableCredentials
  • by Andrew Slack, SICPA, Switzerland
  • and Victor Martinez, SICPA, Switzerland
  • The experience and security of any system operated by people depends on the information conveyed through user interfaces, the response of the users, and the interpretation of their actions. Existing interaction patterns in verifiable credential wallets tend towards visual-centric models and rely on inconsistent representations of data. This paper explores design patterns to manage and exchange verifiable data in more accessible ways.
  • #Accesability #VerifiableCredentials
  • by Karim Stekelenburg, Animo Solutions, The Netherlands
  • Leveraging DIDComm to create a modern chat protocol that can compete with commonly used chat applications like WhatsApp and Telegram.
  • #DIDComm #protocol #messaging #chat
  • by Zaïda Rivai, Danube Tech Gmbh, Vienna
  • A proposal of critical ethical issues in the emerging technology AI & metaverse. What are the most important (ethical) issues regarding trust, AI and metaverse? How could we solve them? How could we fight bias fed in AI algorithms used for the metaverse or how to solve the intellectual property problem in the metaverse?
  • #ai #metaverse #trust #ethics
  • by Lohan Spies, IOHK/DIDx, Hong Kong/South Africa
  • A proposal to explore the concept of verifiable group credentials.
  • #VerifiableCredentials #GroupCredentials
  • by Carsten Stöcker, Spherity GmbH
  • and Christiane Wirrig, Spherity GmbH
  • The EU Commission's proposal for review of the eIDAS Regulation from 2021 has opened strong expectations for a deep change in traditional identity models. The EU might endorse a hybrid solution consisting of x509 certificates and decentralized PKI using DID/VC. This paper provides various options to address different implementation alternatives in combining x509 and DID/VC approaches.
  • #did, #eIDAS, #x509, #hybrid-wallets
  • by Stephen Curran, Cloud Compass Computing Inc., Canada
  • Adding details to the roadmap of the AnonCreds Specification Working Group about the use of AnonCreds with even more ledgers/VDRs, and the next version of the AnonCreds specification (and open source implementations), likely to be based on BBS+ Signatures.
  • #DIDComm, #credentials, #privacy, #zkp, #DIDs, #DIDMethods
  • by Fabrice Rochette, 2060.io
  • A discussion of how to make audited and intermediated DIDComm connections
  • #DIDComm #protocol #messaging #chat
  • by Manu Sporny, Digital Bazaar, USA
  • A way of publishing a list of authorized issuers to enable Verifiers to bootstrap into trusted ecosystems.
  • #VerifiableCredentials #w3c #trust #registries
  • by Kate Sills, Digital Contract Design
  • This paper compares did:btcr v0.1 to a naive, off-chain version in terms of vulnerabilities to a few identified attacks.
  • #did:btcr #did #registry
  • by Markus Sabadello, Danube Tech, Austria
  • Some thoughts on how to add and control caching in DID Resolution processes.
  • #did #did-resolution
  • by Henk van Cann, Blockchainbird.org, The Netherlands
  • Bridge Keep wallet of KERI / ACDC and the more sophisticated solutions at BCC for keeping secrets secret. At the same time: study and work towards KERI, CESR and ACDC supporting sophisticated multisignature schemes.
  • #SeedTool #KERI #CESR #ACDC #KEEP #ToIP #BCC
  • by Shaun Conway, ixo
  • Differentiating classes of DIDs for different applications, based on property sets and how these influence behaviours relating to the identified subject
  • #JSON-LD #DIDs
  • by Christopher Allen, Shannon Appelcline & Wolf McNally, Blockchain Commons
  • Personally held digital assets are very vulnerable to accidental loss. This reading outlines solutions to date and looks at plans for a collaborative seed recovery architecture.
  • #recovery #seed
  • by Sietse Ringers
  • Strong device binding using ECDSA in order to achieve eIDAS High may be combined with unlinkability in SSI systems at the cost of introducing a TTP which deals with the linkability introduced by ECDSA.
  • #ssi #eidas #credentials #privacy #zkp
  • by Dr. Andre Kudra, esatus AG, Germany
  • Credential Formats analyzed and compared by an international expert group
  • #Credentials #Formats #Signature #Revocation #Key-Management
  • by Paul Bastian, Bundsedruckerei GmbH, Germany
  • Categorizing and analyzing potential Wallet Security Architectures
  • #ssi #Wallet #Credentials #Key-Management #Holder-Authentication #revocation #recovery #privacy
  • by Nikos Fotiou, Athens University of Economics and Business
  • Verifiable Credentials for expressing user capabilities, issued using OAuth 2.0, and used for accessing HTTP-based resources that abide by the Zero-Trust principle.
  • #IAA, #VerifiableCredentials, #ZTA
  • by Erica Connell, Legendary Requirements
  • Let's produce a ~1-minute animation that tells the story of DIDs and RWOT. Working with collaborators from RWOT11, we will develop creative ideas and set the framework for the realization of a brief, stop-motion animated short.
  • #RWOTAnimation #DIDs #changetheworld #attendRWOT
  • by Carsten Stöcker, Spherity GmbH
  • and Christiane Wirrig, Spherity GmbH
  • ZTA is an important design philosophy to establish security mechanisms at the API layer of each individual IT resource for increasing API Endpoint Security. This paper discusses how credentials can enable ZTA mechanisms to secure ERP systems for supply chain use cases.
  • #ABAC, #API-Endpoint-Security, #Authorisation, #Credentials, #SupplyChain, #Wallets, #ZTA
  • by Lal Chandran (iGrant.io, Sweden) and Fredrik Linden (MyData, Sweden)
  • A novel approach to building lawful, human-centric and scalable data spaces, making data transactions trustworthy, auditable and immutable via data exchange agreements. It provides a suite of tools that enable automated agreement handling for data exchange between a Data Source (DS) and Data Using Service (DUS). The proposed approach brings in the requisite trust and governance to establish a ubiquitous data exchange marketplace while empowering individuals to be in control of their data. Automated agreement handling is required for a scalable and regulatory-compliant data marketplace (data space). All organisations need to ensure that they are on the right side of the law (e.g. the GDPR) when consuming personal data (risk management) and to establish the digital trust needed for individuals to say yes to sharing their data.
  • #eSSIF-Lab #SSI-ecosystem #dataagreeents #rightdata #dataexchangeagreements #gdpr #privacybydesign #wallet #dataspace #datamarketplace
  • by Will Abramson, Legendary Requirements, work funded by Digital Contract Design
  • Let's make BIP 322 smart signatures a usable verification method for Verifiable Credential use cases.
  • by Robert Mao, ArcBlock, United States
  • DID Connect is a suite of RESTful APIs, UX components and SDK that provide a framework for DID interactions, connecting people, devices and applications via DID and Verifiable Credentials.
  • #connect #application #framework #VerifiableCredentials #UX
  • by Juan Caballero, Centre.io, Berlin/United States
  • It would be great if a group of researchers and/or coordinators across DID methods could write lightweight micro-implementation guide covering cross-DID-method capabilities, anchored in properties defined in the DID data model and/or traits (see other paper below). This could be folded in as a section of the official W3C implementation guide at a later date if appropriate.
  • #documentation #crosschain #crossmethod #portability #metawallet #DIDextensions
  • by Mirko Mollik
  • DIDs allow us today to request the public keys to validate signature from a distributed verifiable data registry. Why not addressing all required resources like that, but independent from one specific vdr?
  • #did #vdr #resources
  • by Vinay Vasanji
  • A proposal to specify a p2p DID Method using the BitTorrent DHT, and a consumer use-case to drive its large scale adoption.
  • #DIDs #DIDmethods #p2p #peertopeer #applications #wallet
  • by Charles Cunningham and Wayne Chang, Spruce Systems, Inc., Berlin/New York
  • A proposal for characterising and categorising DID methods by supported feature sets to evaluate technical suitability for different use cases, applications and environments.
  • #dids #didmethods #identitymanagement #applications #devx
  • by Snorre Lothar von Gohren Edwin, Diwala, Uganda/Oslo
  • A proposal to reason about bringing your own wallet to the table.
  • #discover #protocols #wallet
  • by Philippe Page
  • DKMS-4-SSI is driven by the need of security for a Dynamic Data Economy. By design DDE transactions take place in a Zero-Trust environement and relies on assymetric cryptography (public/private keys) to create/use/verify self-addressing idenitfiers (SAID).
  • #eSSIF-Lab #SSI-ecosystem #key-management #keri #cesr
  • by Ankur Banerjee
  • A discussion on the potential drawbacks of proof-of-authority and soul-bound tokens (SBTs), with an alternative system that could be constructed using Elo rating systems used in the world of sports and web services.
  • #reputation #trust #scoring
  • by Wolf McNally, Christopher Allen, Shannon Appelcline, Blockchain Commons
  • An introduction to the Envelope data structure and its novel approach to facilitating the construction and transformation of “smart documents”, including native facilities for encryption, signing, elision (redaction), sharding, and noncorrelation.
  • #VerifiableCredentials #identity #sharding #signing
  • By Caspar Roelofs and Carlos Fontana, Gimly, the Netherlands
  • An exploration of technical requirements, limitations and solutions to implement SSI with low-computational smart devices and low bandwith data-transmission such as NFC smartcards, IoT devices, NFC, BLE communication.
  • #NFC #IoT #BLE #DIDComm #Inclusion
  • by Frédéric Martin, myDID SA
  • by Imad El Aouny, myDID SA
  • A proposal to enhance DID privacy and reduce possible correlations
  • #Privacy #DID #VerifiableCredentials #Wallet #Communication
  • by Ariel Gentile
  • An exploration on different needs to make DIDComm-based mobile wallets interoperable and aware of the constraints given by mobile environments
  • #DIDComm #protocol #messaging #Mobile #communications
  • by Oskar van Deventer, TNO, Netherlands
  • Overview of the eSSIF-Lab SSI ecosystem. "eSSIF-Lab is a 7 M€, three-year (2019-2022), European-Commission-funded program that has been sponsoring start-ups, SMEs and innovators to develop open-source SSI components, SSI products and SSI services."
  • #eSSIF-Lab #SSI-ecosystem #Europe
  • by Charles E. Lehner, Spruce Systems, Inc., New York
  • A proposal for generalizing the Secure Scuttlebutt system for DIDs and Data Integrity.
  • #VerifiableCredentials #SecureScuttlebutt
  • by Alex Blom, Bloqzone, Netherlands
  • Examining different solutions to the problem of identified communications
  • #SIP #DIDComm #chat #communications
  • by Nick Meyne from Co-op Credentials
  • Systemic approaches to the design of a digital identity and trust network for a co-operative ecosystem
  • #identity, #trust, #community, #platform_co-operatives, #ecosystems, #systemic_design
  • by Fabio Tagliaferro, Commercio.Network & University of Verona, Italy
  • Leverage the power of national European identities to obtain SSI credentials, starting from the Italian SPID ecosystem.
  • #VerifiableCredentials #Europe #SPID #Italy #SSI
  • by Christopher Chung
  • An emergent identity mesh built from authenticated data points
  • #webs-of-trust #data #authentication #community #network
  • by Oliver Klingefjord, Replabs, Berlin.
  • A proposal for a novel multi-dimensional reputation system framework for social media using language models and webs of trust.
  • #Reputation #Webs-of-trust #Trust-networks
  • by Martin Riedel, Identity.com
  • Evaluating DID (Document) State on-chain and the challenges around nomenclatures and spec-compliance.
  • #dids #didmethods #identitymanagement #applications
  • by Brent Zundel, Avast s.r.o.
  • A proposal for a conversation about whether reducing correlation is necessary during credential exchange.
  • #VerifiableCredentials #HolderBinding #Zero-knowledge-proofs #ZKP
  • by Manu Sporny, Digital Bazaar, USA
  • A Verifiable Credential extension to support rendering using graphics, audio, or braille.
  • #VerifiableCredentials #w3c #a11y
  • by Shigeya Suzuki, Ph.D, Project Professor, Graduate School of Media and Governance, Keio University, Japan
  • Using DNS as root of trust with help of ICANN's virtualized decentralized governance mechanism
  • #RootOfTrust #DNS #DNSSEC #ICANN #VirtualizedDecentralization #MultistakeholderGovernance
  • by Ahamed Azeem, Danube Tech, Austria.
  • A discussion about revocation methods used in SSI and VC and describes a suitable approach for privacy-preserving revocation.
  • #Revocation #VC #RevocationLists2020 #IndyRevocationn
  • by Eric Schuh, Legendary Requirements, USA
  • A software framework to enable the choice of how to self custody digital assets
  • #recovery #wallet #threat-model
  • by Timo Glastra, Animo Solutions, The Netherlands
  • Social recovery of wallet data and keys by leveraging sharding.
  • #recovery #wallet #sharding
  • by Amy Guy
  • How can we make it easier to ask the hard questions about the work we do?
  • #ethics #SSI-ecosystem #community
  • by Will Abramson, Legendary Requirements, UK
  • How easy is it to spend cash around the world these days? Let's find out, by actively attempting to and recording the results.
  • by Moritz Schlichting, Animo Solutions, Utrecht, The Netherlands
  • A data generator for SSI interactions and mocking
  • #eSSIF-Lab #SSI-ecosystem #Europe #Data #Generator #tools
  • by Maaike van Leuken, TNO, Eindhoven, The Netherlands
  • An overview of SSI standardization
  • #eSSIF-Lab #Standardization
  • by Isaac Henderson Johnson Jeyakumar, University of Stuttgart, Germany & Michael Kubach, Fraunhofer IAO, Germany.
  • A proposal for a Trust Registry concept to enhance interoperability and prevent Phishing/MITM attacks in different components of the SSI Ecosystem.
  • #TrustRegistry #TRAIN #trustworthiness #SSI #eSSIF-Lab
  • by: Belsy Yuen, Elena Chachkarova, Egidio Casati
  • A proposal for a decentralised trust framework powering regulated crypto assets
  • #crypto-asset #ssi #regulated-deFi #kYC #smart-contract-wallet #on-chain-verifier
  • by Ian Grigg
  • By way of anecdotes, an exploration as to why WoT didn't work, and why Trust is harder. A request for more anecdotes to shed light on the way forward.
  • #WOT #web-of-trust #trust #community
  • by Phillip D. Long, Dmitri Zagidulin, Kerri Lemoie
  • A proposal for a Verifiable Endorsements mechanism for VCs.
  • by Rieks Joosten, TNO, Netherlands
  • In order to adopt VCs (or SSI technology), we need to explore what individual parties need apart from what's already part of VCs (e.g.: proofs), and how such needs can (also) be accommodated.
  • #validation #verification #sovereignty
  • by Oliver Terbu, Spruce Systems, Inc., Berlin/New York
  • A proposal how to define a flexible and deterministic approach to verify the binding between the holder and the credential subject of the verifiable credential which is a blindspot of the W3C Verifiable Credentials Data Model 1.0 standard today.
  • #VerifiableCredentials #HolderBinding #2FA #Biometrics #Delegation
  • by Joe Andrieu, Legendary Requirements, Ventura, CA, USA
  • A Best Practice for Decentralized Identifiers Verifiable Identifiers (VIDs) are a DID best practice for platform-independent, privacy-agile, cryptographic verification of actions taken on behalf of that identifier.
  • #DID #VID #IID #best-practice
  • by Daniel Moledo
  • VUI (Verifier Universal Interface) specification proposal to achieve interoperability for the verification process: that is, to eliminate a possible vendor lock-in between any wallet and any verifier tool.
  • #VerifiableCredentials #Verifier
  • by Ana Goessens
  • Continuing the conversation on the topics surrounding SSI, using methods from commercial branding to semantic philosophy.
  • #Terminology #Semantics
  • by Berend Sliedrecht, Animo, The Netherlands
  • A proposal on working with zkSNARKs within the verifiable credential space
  • #VerifiableCredentials #ZKP #zksnark

... more ...

Alphabetical Listing

Please also enter your paper alphabetically in the form:

* [Paper Name](link)

RWOT10 Papers

You may also want to consult the papers from RWOT10, as that design workshop was cancelled due to COVID.