administrative roots of trust 224
advanced properties, VCs 143-148
credentialSubject property 147-148
DisputeCredential property 144
refreshService property 143-144
AES (Advanced Encryption Standard) 114
agencies, Layer 2 governance and 255
Agenda for Sustainable Development and ID2020 315-316
agent authorization registries 92
agent-oriented architecture (AOA) model 100
agents, message-oriented interface design and
99-101
Alberta Credential Ecosystem 392
algorithmic roots of trust 224-225
Allen, Christopher 288, 315-316
AML (Anti-Money Laundering) 35
AML5 (Fifth Anti-Money Laundering Directive) 80
animal care and guardianship example 356-364
digital identity unlocks opportunities for well-being 363
anti-correlation, ZKP (zero-knowledge proofs) 123
Anti-Money Laundering (AML) 35
AOA (agent-oriented architecture) model 100
Apache Software Foundation 283
API-oriented interface design, using wallet Dapps 97-98
Applicability of Blockchain Technology to Privacy Respecting Identity Management 225
applying for bank account scenario 51-52
architectural decentralization 307
architectural level, DIDs 171-179
ASN (Augmented Social Network) 313
asymmetric-key (public-key) cryptography 114-115
ATF (Anti-Terrorism Financing) 35
auditor accreditors, ecosystem governance frameworks and 260
auditors, ecosystem governance frameworks and 260
Augmented Social Network (ASN) 313
Augmented Social Network, The (Jordan, Hauser, and Foster) 313
auto-authentication 48-49, 201
user experience and convenience 68
user experience and convenience 68-69
automatic encrypted backup 202-203, 229
B2C (business-to-consumer) transactions 194
backup and recovery, digital wallets 202-205
automatic encrypted backup 202-203
banking and finance, as market driver for SSI 15
Before Babylon, Beyond Bitcoin (Birch) 323
technical advantages of decentralization
308-309
why believers and not proponents or partisans 306-308
belief systems. See also blockchain
Birth of the Chaordic Age (Hock) 252
adapting general-purpose public blockchains for SSI 90-91
public permissionless proof-of-stake blockchains 254
public permissionless proof-of-work blockchains 253
special-purpose blockchains designed for SSI 91-92
Blockchain and Distributed Ledger Technologies—Reference Architecture 255
Bottom line category, SSI scorecard 60-62
new credential issuer revenue 62
reduced customer onboarding costs 60-61
reduced customer service costs 61-62
bottom-up trust, VC trust model 133-134
BPA (business process automation) 62, 65
British Columbia Verifiable Organizations Network 392
Business efficiencies category, SSI scorecard 62-67
delegation and guardianship 66
business process automation (BPA) 62, 65
business-to-consumer (B2C) transactions 194
Buterin, Vitalik 291, 307, 315
Byzantine Generals Problem 307
CA (certificate authority) 174-175
California Consumer Privacy Act (CCPA) 79
California Privacy Rights Act 79
Camenisch-Lysyanskaya ZKP system (CL Signatures) 152
CAs (certificate authorities) 311
CCPA (California Consumer Privacy Act) 79
certificate authorities (CAs) 174-175, 311
certification 214, 263-264, 266-267
certification authorities, ecosystem governance frameworks and 260
CHAPI (Credential Handler API) 153
Chaum, David 185, 290, 311, 324
client-server relationships 41
client-side wallets (non-custodial wallets, cloud wallets) 27
connecting through online blog 46-47
making direct, private connection 43-46
collision-resistant hash functions 113
commenting on blog scenario 48-49
communication and interfaces 94-101
API-oriented interface design using wallet Dapps 97-98
data-oriented interface design using identity hubs 98-99
message-oriented interface design using agents 99-101
message-based protocol design using DIDComm 95-97
web-based protocol design using TLS 95
compact prefix tries (radix tries) 119
compliance and monitoring, digital wallets 207
concept of disintermediation 379
connecting through online blog scenario 46-47
Continental centralized identity model 7
conventional databases, as DID registries 92-93
Crazy Story of the Time When Almost Anyone in America Could Issue Their Own Currency, The (Wile) 328
credential governance frameworks 256-258
Credential Handler API (CHAPI) 153
credential registries, in Layer 3 governance frameworks 256-257
credential-issuance process 199
credential-verification process 200
new credential issuer revenue 62
physical credentials vs. VCs 23
W3C verifiable credential formats 104-106
Credentials Community Group 314
credentials. See also VCs (verifiable credentials)
credentialSubject property 140, 147-148
CRM (customer relationship management) 72
cryptographic accumulators 117
cryptographic infrastructure 172
cryptographically protected private storage 195
asymmetric-key cryptography 115
symmetric-key cryptography 114-115
origins of modern cryptography 287-289
ZKP (zero-knowledge proofs) 120-125
public/private key cryptography 10, 31
verifiable data structures 116-120
cryptographic accumulators 117
customer onboarding costs 60-61
customer relationship management (CRM) 72
continuing influence of 291-292
origins of modern cryptography 287-289
data origin authentication 395
data portability 80-81, 193-194
ZKP (zero-knowledge proofs) 121
data-oriented interface design 98-99
DDN (Defense Data Network) 311
technical advantages of 308-309
decentralized identifiers. See DIDs (decentralized identifiers)
Decentralized Identity (white paper) 319
Decentralized Identity Foundation 181, 205
Decentralized Identity Foundation Glossary Project 266
decentralized identity model 9-10
decentralized key management 220-247
DIDs (decentralized identifiers)
separating identity verification from public key verification 227-228
automatic encrypted backup with both offline and social recovery methods 229
KERI (Key Even Receipt Infrastructure)
233-246
delegated self-certifying identifiers for enterprise-class key management 239-240
pre-rotation protection against key compromise 236-238
SCIDs (self-certifying identifiers) as root of trust 234-235
self-certifying key event logs 235
system-independent validation (ambient verifiability) 238-239
trust-spanning layer for internet 242-246
witnesses for key event logs 236
ledger-based DID methods (algorithmic roots of trust) 230-231
peer-based DID methods (self-certifying roots of trust) 231-232
physical keys vs. digital keys 221-222
standards and best practices 222-223
Decentralized Key Management System (DKMS) 205, 225
decentralized n-party protocols 100
Decentralized Public Key Infrastructure (Allen, et al.) 315
decentralized public key infrastructure (DPKI) 10, 315
Defense Data Network (DDN) 311
ecosystem governance frameworks and 259
user experience and convenience 70-71
delegation credentials 66, 70-71
DERs (distributed energy resources) 353
design principles, digital wallets 193-196
portable and open-by-default 193-194
DHS (U.S. Department of Homeland Security) 32, 225, 316
DHTs (distributed hash tables) 254
DIACC (Digital Identity and Authentication Council of Canada) 317
relationship between DIDs and DID subjects and 161-162
conventional databases as 92-93
peer-to-peer protocols as 93-94
DID-to-DID connections 32, 181-182
DIDComm (DID Communication) 95-97, 162
DIDs (decentralized identifiers) 9, 30-32,
157-188, 316-317
asymmetric-key cryptography 115
DID-to-DID connections 181-182
guardianship and controllership 179-180
privacy by design at scale 182-183
digital trust ecosystems 184-185
human-meaningful naming problem
185-186
separating identity verification from public key verification 227-228
service endpoint discovery 180
DIF (Decentralized Identity Foundation) 97-98, 318
Diffie, Bailey Whitfield 288, 291
digital certificates (certs) 174
receiving, offering , and presenting 199-200
Digital Ecosystems Roles Model 389
digital guardianship 180, 229, 256, 269-270
blockchain technology and decentralization
5-6
decentralized identity model 9-10
open source software and 283-286
digital keys vs. physical keys 222
digital signatures 25, 116, 202
digital trust ecosystems 184-185
digital trust relationships 198-199
automatic encrypted backup with both offline and social recovery methods 229
automatic encrypted backup 202-203
certification and accreditation 214
portable and open-by-default 193-194
digital trust relationships 198-199
special security considerations 211-212
guardianship and delegation 212-213
multiple-device support and wallet synchronization 205
secure data storage (vault) support 207-208
DisputeCredential property 144
distributed directed acyclic graphs 89
divisibility, as property of money 326
DKMS (Decentralized Key Management System) 205, 225
DLTs (distributed ledger technologies) 89
DPKI (decentralized public key infrastructure) 10, 315, 398
durability, as property of money 325
Amazon's one-click purchasing 72
as market driver for SSI 14-15
EBSI (EU European Blockchain Services Infrastructure) 254
ECDSA (Elliptic Curve Digital Signature ALgorithm) 116
ecosystem governance frameworks 258-260
connecting through online blog 46-47
making direct, private connection 43-45
EFF (Electronic Frontier Foundation) 290
efficiency, hash functions 113
EHRs (electronic health records) 15-16
eID (electronic identification) 401
eIDAS (electronic IDentification, Authentication and trust Services) 80, 254, 386
value of for SSI adoption 402-403
eIDAS Regulation 396-398, 401-402
Electronic Frontier Foundation (EFF) 290
electronic health records (EHRs) 15-16
Elliptic Curve Digital Signature ALgorithm (ECDSA) 116
emergencies, digital wallets 209
asymmetric-key cryptography 115
symmetric-key cryptography 114-115
end verifiable key event logs 239
special security considerations 211-212
Estonia voting case study 367-368
EU European Blockchain Services Infrastructure (EBSI) 254
European Identity Conference 321
legal concept of eID (electronic identification) 398-400
scenarios for adoption of SSI in EU identity metasystem 403-406
SSI Scorecard for EBSI (European Blockchain Services Infrastructure) 406-407
value of eIDAS for SSI adoption 402-403
evidence property, VCs 145-146
exchange protocols, credentials 106
Extensible Data Interchange (XDI) 312
Extensible Resource Identifier (XRI) 312
Fast IDentification Online (FIDO) 202
FATF (Financial Action Task Force) 386
FIDO (Fast IDentification Online) 202
FIM (federated identity management) 8, 131-132
first production government demo of SSI-supporting ledger 319
Framework for Designing Cryptographic Key Management Systems, A 222
functional level, DIDs 161-170
GDPR (EU General Data Protection Regulation) 77, 230, 270, 319
data protection 79-80, 92, 121, 194
KERI (Key Even Receipt Infrastructure) and 241
GF DID (DID of the governance framework) 262
GLEIF (Global Legal Entity Identifier Foundation) 210, 272
Gnosis multisig Ethereum wallet 222
governance frameworks 34-36, 107-109
certification, accreditation, and trust assurance 263-264
discovery of authoritative issuers and verified members 262
liability and insurance 264-265
LOAs (levels of assurance) 264
inclusion, equitability, and accessibility rules 268
risk assessment, trust assurance, and certification 266-267
Governance Stack Working Group, at ToIP Foundation 265
governance trust triangle 250-252
ecosystem governance frameworks and 259
hardware developers, Layer 2 governance and 255
healthcare supply chain, powered by SSI 374-382
authentication and quality 380
future supply chain transformation across industries 379
industry ecosystem efficiency powered by SSI 377-379
SSI Scorecard for pharma supply chain 380-382
supply chain transparency and efficiency SSI 376-377
healthcare, as market driver for SSI 15-16
HIPAA (Health Insurance Portability and Accountability Act) 77
holders 24-26, 36, 129-130, 133, 257
hourglass theorem of protocol stack design 244
HSMs (hardware security modules) 240
human-meaningful naming problem, DIDs
185-186
Hyperledger Indy 91, 105, 205, 254, 318
IAM (identity and access management) 13,
210-211
IANA (Internet Assigned Numbers Authority) 311
ICAAN (Internet Corporation for Assigned Names and Numbers) 311
ID4D (Digital IDs for Development) 315
identifier-to-controller binding problem
DIDs and DID documents solution 178-179
public key-based identifiers solution 177
identifiers and public keys 88-94
adapting general-purpose public blockchains for SSI 90-91
conventional databases as 92-93
peer-to-peer protocols as 93-94
special-purpose blockchains designed for SSI 91-92
identity and access management (IAM) 13,
210-211
going back to starting point 323-324
identity as source of relationships and value 325
three functions of money 326-327
tokenization of value with identity 327-329
identity hubs (encrypted data vaults) 98-99
Identity in a Digital World 319
Identity Is the New Money (Birch) 5, 323
Identity System Essentials (Smith and Khovratovich) 316
IDPs (identity providers) 8-9, 131-132
IIW (Internet Identity Workshop) 6, 310-311, 314, 320
in-between license, open source 283
Information Fiduciaries and the First Amendment (Baldwin) 269
Innovation Meets Compliance (Sovrin Foundation) 231, 241
insurance, digital wallets 209-210
insurers, in Layer 3 governance frameworks
257-258
Intention Economy, The (Searls) 328
API-oriented interface design using wallet Dapps 97-98
data-oriented interface design using identity hubs (encrypted data vaults) 98-99
message-oriented interface design using agents 99-101
International Planetwork Conference 312-313
Internet Assigned Numbers Authority (IANA) 311
Internet Corporation for Assigned Names and Numbers (ICAAN) 311
Internet Identity Workshop (IIW) 6, 310-311, 314, 320
interoperability, ecosystem governance frameworks and 259
InterPlanetary File System (IPFS) 254
IoT (Internet of Things) 347-355
connecting everything safely 347-348
IPFS (InterPlanetary File System) 254
issuers 24-26, 36, 129-130, 133, 257
JavaScript Object Notation (JSON) 135-136
JavaScript Object Signing and Encryption (JOSE) stack 99
JOSE (JavaScript Object Signing and Encryption) stack 99
JSON (JavaScript Object Notation) 135-136
JSON-LD (JSON Linked Data) 104, 136-137
JWT (JSON Web Token) credential format 99, 102-103, 137-139
KERI (Key Event Receipt Infrastructure) 94, 177, 233-246, 254
delegated self-certifying identifiers for enterprise-class key management 239-240
pre-rotation protection against key compromise 236-238
SCIDs (self-certifying identifiers) as root of trust 234-235
self-certifying key event logs 235
system-independent validation (ambient verifiability) 238-239
trust-spanning layer for internet 242-246
witnesses for key event logs 236
key compromise, pre-rotation protection against 236-238
self-certifying key event logs 235
Key Management Interoperability Protocol (KMIP) 223
KMIP (Key Management Interoperability Protocol) 223
KYC (Know Your Customer) 35, 60
Laws of Identity (Cameron) 313-314
least privileges (least authority) 127, 130, 155
ledger-based DIDs 171, 230-231
LEI (Legal Entity Identifier) 210
LESS identity (legally enabled self-sovereign identity) 403
levels of assurance (LOAs) 146, 264
Levy, Steven 277, 287, 290-291
LGPL (Lesser General Public License) 283
liability and insurance 264-265
limited supply, as property of money 325
LNP (local telephone number portability) 81
LOAs (levels of assurance) 146, 264
loyalty and rewards programs 76-77
Lumedic Health Network Governance Framework 272
business efficiency and customer experience 13
resistance to the surveillance economy 13
sovereign individual movement 14
market forces, as driver of convergence in SSI 109
Mastercard network example 251
meeting at a conference scenario 41-46
meeting via dating site scenario 49-51
member directories, ecosystem governance frameworks and 260
MemberPass digital credential 60
message-oriented interface design 99-101
method-specific identifiers 164
MFA (multi-factor authentication) 201-202
MNP (mobile number portability) 81
(MPTs) Merkle-Patricia tries 120
multi-credential proofs 122-123
multi-factor authentication (MFA) 201-202
multi-signature authorization policies 212
multiple-device support, digital wallets 205
Nakamoto, Satoshi 5, 290, 301, 307
NASA, use of open source 281-282
National Center for Supercomputing Applications (NCSA) 280
National Health Care Anti-Fraud Association 60
National Security Agency (NSA) 287-288
natural person certificates 396
NCSA (National Center for Supercomputing Applications) 280
NIC (Network Information Center) 311
NIS Directive (Directive on Security of Network and Information Systems) 80
NIST (U.S. National Institute of Standards and Technology) 222
notifications, digital wallets 198
NSA (National Security Agency) 287-288
OCA (overlay-capture architecture) 208
offline operations, digital wallets 205-206
automatic encrypted backup with 229
OIDC (OpenID Connect) protocol 162
OIX (Open Identity Exchange) 250
one-click purchasing (Amazon) 72
Open Identity Exchange (OIX) 250
sharing with rules license 282
digital identities and 283-286
wooing businesses with 280-281
OpenID Connect (OIDC) protocol 162
Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data (Young, Edge, Reed and Thorp) 315
Origins of Totalitarianism, The (Arendt) 356
overlay-capture architecture (OCA) 208
P2P (peer-to-peer) networks 302
Pan-Canadian Trust Framework 272
passwordless login (auto-authentication) 48-49
Path to Self Sovereign Identity, The (Allen) 316
user experience and convenience 71-72
PCTF (Pan-Canadian Trust Framework) 384-387
peace through digital identity 293-299
identity as source of conflict 297-298
identity as source of peace 298-299
peer-based DID methods (self-certifying roots of trust) 231-232
peer-to-peer (P2P) networks 302
peer-to-peer digital certificates 176
peer-to-peer protocols, as DID registries 93-94
peer-to-peer relationships 9, 41
persistent (permanent) identifiers 159, 169
person identification data, in eIDAS Regulation 398
Personal Data Ecosystem Consortium 314
personal information, losing control over 311-312
PGP (Pretty Good Privacy) 176, 233, 289, 312
pharma supply chain, SSI Scorecard for 380-382
physical keys vs. digital keys 221-222
Policy on Service and Digital 385
political governance decentralization 307
portability, as property of money 326
PoW (proof-of-work) algorithm 307
premium private channels 74-75
Pretty Good Privacy (PGP) 176, 233, 289, 312
privacy by design at scale, DIDs 182-183
privacy-protected connections 195
private DID-to-DID connections 196
proof-of-work (PoW) algorithm 307
ZKP (zero-knowledge proofs) 120-125
multi-credential proofs 122-123
privacy and personal control 121
message-based protocol design using DIDComm 95-97
web-based protocol design using TLS 95
provider governance frameworks 255-256
PSD2 (Second Payment Services Directive) 80
public permissioned blockchains 254
public-key-to-identifier binding problem
conventional PKI solution 174-175
public key-based identifiers solution 177-178
public/private key cryptography 10, 31
as offline recovery technique 203
connecting through online blog 47
making direct, private connection 42-44
radix tries (compact prefix tries) 119
Rebooting the Web of Trust (RWoT) 314-315, 320
Recommendation for Key Management 222
refreshService property, VCs 143-144
RegTech (Regulation Technology) 81-84
Regulatory compliance category, SSI scorecard 77-84
RegTech (Regulation Technology) 81-84
Relationship management category, SSI scorecard 72-77
loyalty and rewards programs 76-77
premium private channels 74-75
relationships, identity as source of 325
relying party (RP) 8, 173, 223
Requirements for DIDs (Reed and Chasen) 316
resistance to preimage, hash functions 113
Respect Trust Framework 314, 316
REST (representational state transfer) 95, 100
Reusable Proof-of-Work (RPOW) 290
RFC (Request for Comments) 206
Rivest-Shamir-Adleman (RSA) algorithm 115
decentralized key management 223-225
SCIDs (self-certifying identifiers) as 234-235
RPOW (Reusable Proof-of-Work) 290
RSA (Rivest-Shamir-Adleman) algorithm 115
RWoT (Rebooting the Web of Trust) 314-315, 320
SAML (Security Assertion Markup Language) protocol 8
SBIR (Small Business Innovation Research) topic 6
scale, enterprise wallets 210-211
Scandinavian centralized identity model 7
SCIDs (self-certifying identifiers) 233
for enterprise-class key management 239-240
SDG (Sustainable Development Goal) 16.9
316-317
SDS (secure data stores) 30, 207
Searls, Doc 72, 277, 310, 313-314, 328
Second Payment Services Directive (PSD2) 80
secure data storage (vault) support 207-208
Security Assertion Markup Language (SAML) protocol 8
selective disclosure 102, 122, 127, 140, 155, 397
self-certifying roots of trust 224-225, 231-233
digital trust ecosystems 184-185
human-meaningful naming problem 185-186
server-side wallets (custodial wallets, cloud wallets) 27
service endpoint discovery, DIDs 180
SGF (Sovrin Governance Framework) 269-271
sharing with rules license, open source 282
simple credential-sharing model 104
Small Business Innovation Research (SBIR) topic 6
automatic encrypted backup with 229
software developers, Layer 2 governance and 255
Sovereign Individual, The (Davidson and Rees-Mogg) 14
Sovrin Governance Framework (SGF) 269-271
SPKI (Simple Public Key Infrastructure) 289
blockchains and DLTs relevant to 303-304
Canadian approach and policy framework 384-385
digital ecosystem roles 388-390
mapping SSI stack to PCTF model 391
PCTF (Pan-Canadian Trust Framework)
385-387
SSI Scorecard for PCTF (Pan-Canadian Trust Framework) 392-393
using VCs (Verifiable Credentials) 391-392
community, origins of 248-273, 310-322
Agenda for Sustainable Development
315-316
ASN (Augmented Social Network) and identity commons 313
DIF (Decentralized Identity Foundation) 318
first production government demo of SSI-supporting ledger 319
IIW (Internet Identity Workshop) 314
increasing state support for SSI 318
International Planetwork Conference
312-313
MyData and Learning Machine 317
personal information, losing control over 311-312
RWoT (Rebooting Web of Trust) 314-315
user control, increasing support of 314
Verifiable Claims Working Group 318
WEF (World Economic Forum) reports 319
decentralization by design 196
decentralized identifiers 30-32
decentralized key management 18
explaining value of to business 333-346
failed experiments with 335-337
learning from other domains 337-338
SSI Scorecard for apartment leasing 345-346
governance authority, role of 261
governance frameworks 34-36, 265-269
inclusion, equitability, and accessibility rules 268
risk assessment, trust assurance, and certification 266-267
governance trust triangle 250-252
healthcare supply chain powered by 374-382
authentication and quality 380
future supply chain transformation across industries 379
industry ecosystem efficiency powered by SSI 377-379
SSI Scorecard for pharma supply chain
380-382
supply chain transparency and efficiency SSI 376-377
IoT (Internet of Things) and 348-352
scenarios for adoption of in EU identity metasystem 403-406
ToiP (Trust over IP) governance stack 252-260
credential governance frameworks 256-258
ecosystem governance frameworks 258-260
provider governance frameworks 255-256
utility governance frameworks 253-255
verifiable data registries 33-34
problems with postal voting 366
three pillars of voting 368-369
applying for bank account 51-52
connecting through online blog 46-47
new credential issuer revenue 62
reduced customer onboarding costs 60-61
reduced customer service costs 61-62
Business efficiencies category 62-67
delegation and guardianship 66
for EBSI (European Blockchain Services Infrastructure) 406-407
for IoT (Internet of Things) 354-355
for pharma supply chain 380-382
Regulatory compliance category 77-84
RegTech (Regulation Technology) 81-84
Relationship management category 72-77
loyalty and rewards programs 76-77
premium private channels 74-75
User experience and convenience category
68-72
delegation and guardianship 70-71
payment and value exchange 71-72
communication and interfaces 94-101
API-oriented interface design using wallet Dapps 98
data-oriented interface design using identity hubs 98-99
interface design options 97-101
message-based protocol design DIDComm 95-97
message-oriented interface design using agents 99-101
web-based protocol design using TLS 95
W3C verifiable credential formats 104-106
identifiers and public keys 88-94
adapting general-purpose public blockchains for SSI 90-91
blockchains as DID registries 89-90
conventional databases as DID registries
92-93
peer-to-peer protocols as DID registries 93-94
special-purpose blockchains designed for SSI 91-92
Stallman, Richard 279, 281-282
in Sovrin Governance Framework 270
storability, as property of money 326
current physical world 340-341
what's wrong with many current digital identity models 344-345
world like current physical world, but better 342-343
sustainable development goals (SDGs) 315-317
symmetric-key (secret-key) crypto-
graphy 114-115
syntactic representations 135-139
adding standardized properties 136
system-independent validation (ambient verifiability) 238-239
TAF (trust assurance framework) 266
technical trust, human trust vs. 252
Technology-Free Definition of Self Sovereign Identity, A (Andrieu) 317
TEE (trust execution environment) 350
Telecommunications Act of 1996 81
TeleSign Consumer Account Security Report (2015) 63
third-party controllers (controllership) 180
time-based license, open source 283
TLS (Transport Layer Security) 95
ToIP (Trust over IP) governance stack 252-260
credential governance frameworks 256-258
ecosystem governance frameworks 258-260
provider governance frameworks 255-256
utility governance frameworks 253-255
ToIP (Trust over IP) stack 37, 108-109, 184-185
ToIP Concepts and Terminology Working Group 266
ToIP Governance Stack Working Group 252
ToIP Layer 1 networks in Finland 272
ToIP standard specifications (TSSs) 268
TPMs (trusted platform modules) 240
in Sovrin Governance Framework 270
in Sovrin Governance Framework 270
transactional approach, identifier-to-controller binding problem 177
transactional roots of trust) 224
transitive trust 109, 259, 262
transparent, community-wide policies 270
Transport Layer Security (TLS) 95
travel, as market driver for SSI 16-17
triple play of cryptography 34
Triple-Signed Receipts protocol 93
trust assurance 263-264, 266-267
trust assurance framework (TAF) 266
trust assurance frameworks 212
trust marks, ecosystem governance frameworks and 260
trust relationships, VC trust model 132-133
trust triangle 25-26, 34-36, 101, 172-173, 199
trust-spanning layer for internet 242-246
trustable interaction, DID documents 162
TSSs (ToIP standard specifications) 268
TTPs (Trusted Third Parties) 174-175
U.S. Department of Homeland Security (DHS) 32, 225, 316
UNCITRAL (United Nations Commission on International Trade Law) 386
unidirectional functions (one-way functions) 113
uniformity, as property of money 325
Universal Declaration on Cultural Diversity 298
URIs (Uniform Resource Identifiers) 158
URLs (Uniform Resource Locators) 158-159
URNs (Uniform Resource Names) 159-160,
169-170
usability, ecosystem governance frameworks and 260
user control, increasing support of 314
User experience and convenience category, SSI scorecard 68-72
delegation and guardianship 70-71
payment and value exchange 71-72
utility governance frameworks 253-255
tokenization of with identity 327-329
VCs (verifiable credentials) 9, 22-24, 126-156, 258, 391-392
credentialSubject property 147-148
DisputeCredential property 144
refreshService property 143-144
applying for bank account 51-52
challenges to overcome 155-156
delegation credentials 66, 70-71
extensibility and schemas 150-151
protocols and deployments 153-154
receiving free local access pass 127-128
security and privacy evaluation 155
simple credential-sharing model 104
syntactic representations 135-139
adding standardized properties 136
trust triangle 25-26, 101, 199
VPs (verifiable presentations) 142-143
W3C verifiable credential formats 104-106
ZKP (zero-knowledge proof) model 105,
151-152
VCTF (Verifiable Claims Task Force) 104, 134
VCWG (Verifiable Claims Working Group) 104, 134, 316, 318
VDR (verifiable data registry) 228, 239, 253
Verifiable Claims Task Force (VCTF) 104, 134
Verifiable Credentials Data Model 104-105
verifiable data registries 33-34, 36, 89, 130, 133
verifiable data structures 116-120
cryptographic accumulators 117
verifiable Legal Entity Identifier (vLEI) 210
Verifiable Organizations Network 154
verifiers 24-26, 36, 129-130, 133, 257
verifying the verifier technique, digital wallets 206-207
vLEI (verifiable Legal Entity Identifier) 210
VON (Verifiable Organizations Network) 318
VPs (verifiable presentations) 131, 142-143
VRM (vendor relationship management) 72, 77
W3C (World Wide Web Consortium) 134-135
W3C Credentials Community Group 104
W3C DID Working Group 32, 164, 320
W3C verifiable credential formats 104-106, 320
W3C Web Accessibility Guidelines 268
extra-strategic capabilities 216
WEF (World Economic Forum) reports 319
Windley, Phil 250, 310, 313-314
user experience and convenience 69-70
XDI (Extensible Data Interchange) 312
XNS Public Trust Organization 312
XRI (Extensible Resource Identifier) 312
Yadis (Yet Another Digital Identity Interoperability System) 314
Young, Kaliya (Identity Woman) 310, 313-316
Zimmermann, Phillip 176, 233, 289, 312
ZKP (zero-knowledge proofs) 79, 91, 105, 120-125
multi-credential proofs 122-123
18.191.210.205