appendix C The path to self-sovereign identity

Christopher Allen

We originally planned to include this essay in the list of landmark essays in appendix B. However, it is central enough to the history of SSI that we wanted to include it directly in the body of the book. It was originally published by Christopher Allen on his website, Life with Alacrity, on April 25, 2016. The full version is available at http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html and includes footnotes and a glossary. Christopher is a pioneer in collaboration, security, and trust on the internet. In the late 1990s, he worked with Netscape to develop Secure Sockets Layer (SSL) and co-authored the IETF Transport Layer Security (TLS) standard that is at the heart of secure commerce on the web (it powers the lock on your browser address bar). Christopher is the founder of Blockchain Commons, a former co-chair of the W3C Credentials Community Group, and the founder of the semi-annual Rebooting the Web of Trust design workshops.

You can’t spell “identity” without an “I”

Identity is a uniquely human concept. It is that ineffable “I” of self-consciousness, something that is understood worldwide by every person living in every culture. As René Descartes said, “Cogito ergo sum”—I think, therefore I am.

However, modern society has muddled this concept of identity. Today, nations and corporations conflate driver’s licenses, Social Security cards, and other state-issued credentials with identity; this is problematic because it suggests a person can lose their very identity if a state revokes their credentials or even if they just cross state borders. I think, but I am not.

Identity in the digital world is even trickier. It suffers from the same problem of centralized control, but it’s simultaneously very balkanized: identities are piecemeal, differing from one internet domain to another.

As the digital world becomes increasingly important to the physical world, it also presents a new opportunity; it offers the possibility of redefining modern concepts of identity. It might allow us to place identity back under our control—once more reuniting identity with the ineffable “I.”

In recent years, this redefinition of identity has begun to have a new name: self-sovereign identity. However, to understand this term, we need to review some history of identity technology.

The evolution of identity

The models for online identity have advanced through four broad stages since the advent of the internet: centralized identity, federated identity, user-centric identity, and self-sovereign identity.

Phase one: Centralized identity (administrative control by a single authority or hierarchy)

In the internet’s early days, centralized authorities became the issuers and authenticators of digital identity. Organizations like IANA (1988) determined the validity of IP addresses, and ICANN (1998) arbitrated domain names. Then, beginning in 1995, certificate authorities (CAs) stepped up to help internet commerce sites prove they were who they said they were.

Some of these organizations took a small step beyond centralization and created hierarchies. A root controller could anoint other organizations to each oversee its own hierarchy. However, the root still had the core power—it was just creating new, less-powerful centralizations beneath it.

Unfortunately, granting control of digital identity to centralized authorities of the online world suffers from the same problems caused by the state authorities of the physical world: users are locked in to a single authority that can deny their identity or even confirm a false identity. Centralization innately gives power to the centralized entities, not to the users.

As the internet grew, and as power accumulated across hierarchies, a further problem was revealed: identities were increasingly balkanized. They multiplied as websites did, forcing users to juggle dozens of identities on dozens of different sites—while having control over none of them.

To a large extent, identity on the internet today is still centralized—or at best, hierarchical. Digital identities are owned by CAs, domain registrars, and individual sites and then rented to users or revoked at any time. However, for the last two decades, there’s also been a growing push to return identities to the people so that they actually could control them.

Interlude: Foreshadowing the future

Pretty Good Privacy (PGP, 1991) offered one of the first hints of what could become self-sovereign identity. It introduced the Web of Trust, which established trust for a digital identity by allowing peers to act as introducers and validators of public keys. Anyone could be a validator in the PGP model. The result was a powerful example of decentralized trust management, but it focused on email addresses, which meant that it still depended on centralized hierarchies. For a variety of reasons, PGP never became broadly adopted.

Other early thoughts appeared in “Establishing Identity without Certification Authority” (1996), a paper by Carl Ellison that examined how digital identity was created. He considered both authorities such as CAs and peer-to-peer systems like PGP options for defining digital identity. He then settled on a method for verifying online identity by exchanging shared secrets over a secure channel. This allowed users to control their own identity without depending on a managing authority.

Ellison was also at the heart of the simple public key infrastructure / simple distributed security infrastructure project (SPKI/SDSI, 1999). Its goal was to build a simpler public infrastructure for identity certificates that could replace the complicated X.509 system. Although centralized authorities were considered as an option, they were not the only option.

It was a beginning, but an even more revolutionary reconception of identity in the 21st century would be required to truly bring self-sovereignty to the forefront.

Phase two: Federated identity (administrative control by multiple, federated authorities)

The next major advancement for digital identity occurred at the turn of the century when a variety of commercial organizations moved beyond hierarchy to debalkanize online identity in a new manner.

Microsoft’s Passport (1999) initiative was one of the first. It imagined federated identity, which allowed users to utilize the same identity on multiple sites. However, it put Microsoft at the center of the federation, which made it almost as centralized as traditional authorities.

In response, Sun Microsoft organized the Liberty Alliance (2001). It resisted the idea of centralized authority, instead creating a “true” federation, but the result was instead an oligarchy: the power of centralized authority was now divided among several powerful entities.

Federation improved on the problem of balkanization: users could wander from site to site under the system. However, each individual site remained an authority.

Phase three: User-centric identity (individual or administrative control across multiple authorities without requiring a federation)

The Augmented Social Network (ASN, 2000) laid the groundwork for a new sort of digital identity in its proposal to create a next-generation internet. In an extensive white paper, ASN suggested building “persistent online identity” into the very architecture of the internet. From the viewpoint of self-sovereign identity, its most important advance was “the assumption that every individual ought to have the right to control their or her own online identity.” The ASN group felt that Passport and the Liberty Alliance could not meet these goals because the “business-based initiatives” put too much emphasis on the privatization of information and the modeling of users as consumers. These ASN ideas would become the foundation of much that followed.

The Identity Commons (2001-present) began to consolidate the new work on digital identity with a focus on decentralization. Its most important contribution may have been the creation, in association with the Identity Gang, of the Internet Identity Workshop (2005-present) working group. For the last 10 years, the IIW has advanced the idea of decentralized identity in a series of semi-yearly meetings.

The IIW community focused on a new term that countered the server-centric model of centralized authorities: user-centric identity. The term suggests that users are placed in the middle of the identity process. Initial discussions of the topic focused on creating a better user experience, which underlined the need to put users front and center in the quest for online identity. However, the definition of a user-centric identity soon expanded to include the desire for a user to have more control over their identity and for trust to be decentralized.

The work of the IIW has supported many new methods for creating digital identity, including OpenID (2005), OpenID 2.0 (2006), OpenID Connect (2014), OAuth (2010), and Fast IDenfication Online (FIDO, 2013). As implemented, user-centric methodologies tend to focus on two elements: user consent and interoperability. By adopting them, a user can decide to share an identity from one service to another and thus debalkanize their digital self.

The user-centric identity communities had even more ambitious visions; they intended to give users complete control of their digital identities. Unfortunately, powerful institutions co-opted their efforts and kept them from fully realizing their goals. Much as with the Liberty Alliance, final ownership of user-centric identities today remains with the entities that register them.

OpenID offers an example. A user can theoretically register their own OpenID, which they can then use autonomously. However, this takes some technical know-how, so the casual internet user is more likely to use an OpenID from one public website as a login for another. If the user selects a site that is long-lived and trustworthy, they can gain many of the advantages of a self-sovereign identity—but it could be taken away at any time by the registering entity!

Facebook Connect (2008) appeared a few years after OpenID, leveraging lessons learned, and thus was several times more successful largely due to a better user interface. Unfortunately, Facebook Connect veers even further from the original user-centric ideal of user control. To start with, there’s no choice of provider; it’s Facebook. Worse, Facebook has a history of arbitrarily closing accounts, as was seen in the recent real-name controversy. As a result, people who access other sites with their “user-centric” Facebook Connect identity may be even more vulnerable than OpenID users to losing that identity in multiple places at one time.

It’s central authorities all over again. Worse, it’s like state-controlled authentication of identity, except with a self-elected “rogue” state. In other words: being user-centric isn’t enough.

Phase four: Self-sovereign identity (individual control across any number of authorities)

User-centric designs turned centralized identities into interoperable federated identities with centralized control while also respecting some level of user consent about how to share an identity (and with whom). It was an important step toward true user control of identity, but just a step. To take the next step required user autonomy.

This is the heart of self-sovereign identity, a term that’s coming into increased use in the 2010s. Rather than just advocating that users be at the center of the identity process, self-sovereign identity requires that users be the rulers of their own identity.

One of the first references to identity sovereignty occurred in February 2012, when developer Moxie Marlinspike wrote about “Sovereign Source Authority.” He said that individuals “have an established Right to an ‘identity’” but that national registration destroys that sovereignty. Some ideas are in the air, so it’s no surprise that almost simultaneously, in March 2012, Patrick Deegan began work on Open Mustard Seed, an open source framework that gives users control of their digital identity and their data in decentralized systems. It was one of several “personal cloud” initiatives that appeared around the same time.

Since then, the idea of self-sovereign identity has proliferated. Marlinspike has blogged about how the term has evolved. As a developer, he shows one way to address self-sovereign identity: as a mathematical policy, where cryptography is used to protect a user’s autonomy and control. However, that’s not the only model. Respect Network instead addresses self-sovereign identity as a legal policy; it defines contractual rules and principles that members of its network agree to follow. The Windhover Principles for Digital Identity, Trust, and Data and Evernym’s Identity System Essentials offer some additional perspectives on the rapid advent of self-sovereign identity since 2012.

In the last year, self-sovereign identity has also entered the sphere of international policy. This has largely been driven by the refugee crisis that has beset Europe, which has resulted in many people lacking a recognized identity due to their flight from the state that issued their credentials. However, it’s a longstanding international problem, as foreign workers have often been abused by the countries they work in due to the lack of state-issued credentials.

If self-sovereign identity was becoming relevant a few years ago, its importance has skyrocketed in light of current international crises. The time to move toward self-sovereign identity is now.

A definition of self-sovereign identity

With all that said, what is self-sovereign identity, exactly? The truth is that there’s no consensus. As much as anything, this article is intended to begin a dialogue on that topic. However, I wish to offer a starting position.

Self-sovereign identity is the next step beyond user-centric identity, and that means it begins at the same place: the user must be central to the administration of identity. That requires not just the interoperability of a user’s identity across multiple locations, with the user’s consent, but also true user control of that digital identity, creating user autonomy. To accomplish this, a self-sovereign identity must be transportable; it can’t be locked down to one site or locale.

A self-sovereign identity must also allow ordinary users to make claims, which could include personally identifying information or facts about personal capability or group membership. It can even contain information about the user that was asserted by other persons or groups.

In the creation of a self-sovereign identity, we must be careful to protect the individual. A self-sovereign identity must defend against financial and other losses, prevent human rights abuses by the powerful, and support the rights of the individual to be oneself and to freely associate.

However, there’s a lot more to self-sovereign identity than just this brief summation. Any self-sovereign identity must also meet a series of guiding principles—and these principles provide a better, more comprehensive definition of what self-sovereign identity is. A proposal for them follows.

Ten principles of self-sovereign identity

A number of different people have written about the principles of identity. Kim Cameron wrote one of the earliest “Laws of Identity,” while the aforementioned Respect Network policy and W3C Verifiable Claims Task Force FAQ offer additional perspectives on digital identity. This section draws on all of these ideas to create a group of principles specific to self-sovereign identity. As with the definition itself, consider these principles a departure point to provoke a discussion about what’s truly important.

These principles attempt to ensure the user control that’s at the heart of self-sovereign identity. However, they also recognize that identity can be a double-edged sword—usable for both beneficial and maleficent purposes. Thus, an identity system must balance transparency, fairness, and support of the commons with protection for the individual:

  1. Existence. Users must have an independent existence. Any self-sovereign identity is ultimately based on the ineffable “I” that’s at the heart of identity. It can never exist wholly in digital form. This must be the kernel of self that is upheld and supported. A self-sovereign identity simply makes public and accessible some limited aspects of the “I” that already exists.

  2. Control. Users must control their identities. Subject to well-understood and secure algorithms that ensure the continued validity of an identity and its claims, the user is the ultimate authority on their identity. The user should always be able to refer to it, update it, or even hide it. The user must be able to choose levels of visibility, celebrity, or privacy, as they prefer. This doesn’t mean that a user controls all of the claims on their identity: other users may make claims about a user, but they should not be central to the identity itself.

  3. Access. Users must have access to their own data. A user must always be able to easily retrieve all the claims and other data within the user’s identity. There must be no hidden data and no gatekeepers. This does not mean that a user can necessarily modify all the claims associated with the identity, but it does mean the user should be aware of them. It also does not mean that users have equal access to others’ data, but to only their own.

  4. Transparency. Systems and algorithms must be transparent. The systems used to administer and operate a network of identities must be open, both in how they function and in how they are managed and updated. The algorithms should be free, open-source, well-known, and as independent as possible of any particular architecture; anyone should be able to examine how they work.

  5. Persistence. Identities must be long-lived. Preferably, identities should last forever, or at least for as long as the user wishes. Though private keys might need to be rotated and data might need to be changed, the identity remains. In the fast-moving world of the internet, this goal may not be entirely reasonable, so at the least, identities should last until they’ve been outdated by newer identity systems. This must not contradict a “right to be forgotten”; a user should be able to dispose of an identity if the user wishes, and claims should be modified or removed as appropriate over time. To do this requires a firm separation between an identity and its claims: they can’t be tied forever.

  6. Portability. Information and services about identity must be transportable. Identities must not be held by a singular third-party entity, even if it’s a trusted entity that is expected to work in the best interest of the user. The problem is that entities can disappear—and on the internet, most eventually do. Regimes may change, users may move to different jurisdictions. Transportable identities ensure that users remain in control of their identity no matter what and can also improve an identity’s persistence over time.

  7. Interoperability. Identities should be as widely usable as possible. Identities are of little value if they work only in limited niches. The goal of a 21st-century digital identity system is to make identity information widely available, crossing international boundaries to create global identities without losing user control. Thanks to persistence and autonomy, these widely available identities can then become continually available.

  8. Consent. Users must agree to the use of their identity. Any identity system is built around sharing that identity and its claims, and an interoperable system increases the amount of sharing that occurs. However, sharing of data must only occur with the consent of the user. Though other users such as an employer, a credit bureau, or a friend might present claims, the user must still offer consent for them to become valid. Note that this consent might not be interactive, but it must still be deliberate and well-understood.

  9. Minimalization. Disclosure of claims must be minimized. When data is disclosed, that disclosure should involve the minimum amount of data necessary to accomplish the task at hand. For example, if only a minimum age is called for, then the exact age should not be disclosed, and if only an age is requested, then the more precise date of birth should not be disclosed. This principle can be supported with selective disclosure, range proofs, and other zero-knowledge techniques, but non-correlatibility is still a very hard (perhaps impossible) task; the best we can do is to use minimalization to support privacy as best as possible.

  10. Protection. The rights of users must be protected. When there is a conflict between the needs of the identity network and the rights of individual users, then the network should err on the side of preserving the freedoms and rights of the individuals over the needs of the network. To ensure this, identity authentication must occur through independent algorithms that are censorship-resistant and force-resilient and that are run in a decentralized manner.

Conclusion

The idea of digital identity has been evolving for a few decades now, from centralized identities to federated identities to user-centric identities to self-sovereign identities. However, even today exactly what a self-sovereign identity is, and what rules it should recognize, aren’t well-known.

This article seeks to begin a dialogue on that topic, by offering up a definition and a set of principles as a starting point for this new form of user-controlled and persistent identity of the 21st century.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.189.178.237