Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID...

28
Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December 2019 #financialinclusion

Transcript of Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID...

Page 1: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Deploying Decentralised ID Authentication in DFSKim Hamilton DuffyMIT Digital Credentials Consortium

4-5 December 2019#financialinclusion

Page 2: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

• Intro to Verifiable Credentials

• DIDs and Verifiable Credentials

• Examples

2

What we’ll cover

Page 3: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Verifiable CredentialsIntroduction

3

Page 4: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

4

What is a Credential?

Page 5: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Verifiable Credential

5

• One or more claims

• Metadata• Issuer

• Expiry date and time

• Representative image

• How to verify

• Revocation mechanism

• Proof• Integrity

• Authenticity

Page 6: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

{

"type": ["VerifiableCredential", "UniversityDegreeCredential"],

"issuer": "did:example:2ec211f712ebc6e1ebfeb6f1c27",

"credentialSubject": {

"id": "did:example:ebfeb1f712ebc6f1c276e12ec21",

"degree": {

"type": "BachelorDegree",

"name": "Bachelor of Science in Mechanical Engineering"

}

},

"proof": {

"type": "RsaSignature2018",

"created": "2017-06-18T21:19:10Z",

"creator": "did:example:2ec211f712ebc6e1ebfeb6f1c27#keys-1",

"nonce": "c0ae1c8e-c7e7-469f-b252-86e6a0e7387e",

"signatureValue":

"BavEll0/I1zpYw8XNi1bgVg/sCneO4Juge...+W3JT24="

}

}6

Page 7: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Verifiable Credentials and DIDs

7

Page 8: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Enabling decentralized trustwith Verifiable Credentials and Decentralized Identifiers

• Individual is center of exchange

• Decentralized storage• Controlled by individual

• Decentralized verification

8

Issue Credential

Register Proof

Exchange Credential

Validate Integrity and Provenance

Distributed Ledger

IssuerSubject/Holder Relying

Party

Page 9: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Overview

9

Relying PartyHolder

Auth Challenge / Response

Credential Exchange Protocol

Page 10: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

DIDs resolve to DID Documents

• DID Documents contain:• Verification methods

• Service endpoints for interacting with the DID subject

• Examples:• Authentication

• Requesting a digital signature on a document

10

Page 11: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Example DID Document

11

{

"@context": "https://w3id.org/future-method/v1",

"id": "did:example:123456789abcdefghi",

"publicKey": [],

"authentication": [+],

"service": [+]

}

{

"id": "did:example:123456789abcdefghi#oidc",

"type": "OpenIdConnectVersion1.0Service",

"serviceEndpoint": "https://openid.example.com/"

}, {

"id": "did:example:123456789abcdefghi#hub",

"type": "HubService",

"serviceEndpoint":

"https://hub.example.com/.identity/did:example:0123456789abcdef/"

}

{

"id": "did:example:123456789abcdefghi#keys-2",

"type": "Ed25519VerificationKey2018",

"controller": "did:example:123456789abcdefghi",

"publicKeyBase58":

"H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"

}

Page 12: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

DID Auth with WebAuthn

12

Page 13: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

DID Auth and Verifiable Credentials Relationships

1. DID Auth and Verifiable Credentials exchange are separate

2. Verifiable Credentials exchange is an extension to (or part of) DID Auth

3. DID Auth is a certain kind of Verifiable Credential

13

Relying PartyHolder

Auth Challenge / Response

Credential Exchange Protocol

Page 14: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

ExamplesVerifiable Credentials and Decentralized Identifiers

14

Page 15: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Traditional Learner/Worker Records

• Issuer or Central Authority is needed for verification• Bottleneck• Failure point• Lack of Agency and Control over our

data

• Questions• How to bootstrap into the system?

• Leverage existing trust networks?

• Establish a history?

15

Page 16: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Learner/Worker Records

• Credential Fraud• More than 50,000 PhDs are purchased from diploma mills every year

• Exceeds the quantity legitimately awarded

• Cost to employers

• Cost to learners

...who don’t necessarily know it’s a diploma mill

16

Page 17: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Digital Academic Credentials

17

DISPLAY

CONTENT

TRUST

ANCHORRECIPIENT

IDENTIFIER

PORTABLE VERIFIABLE

CREDENTIAL

Page 18: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Benefits

• Can cryptographically prove control of credentials

• Layered approach

• Key lifecycle is a first-class concern

• Robust privacy/security spectrum

18

Page 19: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Additional Benefits

• Fraud reduction

• Verifiable history and audit trail

• Individuals control their own records

• Verifiable w/out central authority

• Bootstrap individuals with non-traditional backgrounds

19

Page 20: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

British Columbia VON Project

20Digitally Native Credentials

Page 21: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

VON Use Cases

21

• Streamlined processes for small businesses

• Safe workplace credentials

• KYC

Page 22: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December
Page 23: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Proof of Concept Use Case Who’s Involved

VON Business Credentials British Columbia Government

CU Ledger Credit Union Banking Security

Sovrin + Credit Union National Association

Building Blocks Food Aid World Food Programme (Syrian Refugee Aid)

Dutch Digital ID Digital ID TU Delft + Dutch Gov + Others

Walmart Supply Chain

Food Supply Tracking Walmart + Hyperledger Fabric

TradeLens Shipping Shipping + Tracking IBM + Maersk

23

Page 24: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

US Government Support

• Improve Supply Chain Management

• Combat Counterfeit GoodsTo that end, DHS S&T is pursuing two broad courses of action to encourage a more open and inclusive future for blockchain technology:

1. Support development of globally available specifications (precursor to standards) that are open, royalty free, and free to implement to ensure interoperability across systems while ensuring there is no vendor lock-in.

a. Decentralized Identifiers (DIDs) via World Wide Web Consortium (W3C) Standardization Process

b. Verifiable Claims Data Model via W3C Standardization Process

c. Decentralized Key Management System via TBD (Potentially OASIS)

2. Actively work with and support our DHS Component customers, such as CBP, to understand their potential use cases for blockchain and help them achieve their outcomes with the needed R&D expertise and technologies.

24

Source: DHS Science and Technology

Directorate's Testimony before the US

House of Representatives, May 8, 2018

Page 25: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

DID Data Model

DID Method Specs

Universal Resolver

DID Auth

Verifiable Credentials

Standards and Specifications

25

Verifiable Credentials Exchange

Storage/Hubs

*

*

Page 26: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Standardization Track2019 2020 2021 2022

W3C DID Data Model

VC Ecosystem and Protocols

DID Stack: Resolution, Auth

Secure Hubs/Vaults

W3C Verifiable CredentialsData Model

,

Pre-standards pipeline

Standardization Track

Page 27: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

References

• DHS Science and Technology Directorate's Testimony before the US House of Representatives, May 8, 2018

• https://www.dhs.gov/news/2018/05/08/written-testimony-st-house-science-space-technology-subcommittee-oversight-and

• DID Auth

• https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/final-documents/did-auth.md• https://ssimeetup.org/introduction-did-auth-markus-sabadello-webinar-10/

• https://www.wired.com/story/billion-records-exposed-online/

27

Page 28: Deploying Decentralised ID Authentication in DFS · 2019-12-12 · Deploying Decentralised ID Authentication in DFS Kim Hamilton Duffy MIT Digital Credentials Consortium 4-5 December

Kim Hamilton DuffyArchitectMIT Digital Credentials Consortium

Thank you

@kimdhamilton

[email protected]