Giter Club home page Giter Club logo

rwot11-the-hague's Introduction

Rebooting the Web of Trust XI: The Hague (September 2022)

This repository contains documents related to RWOT11, the eleventh Rebooting the Web of Trust design workshop, which will be held in the Hague, Netherlands, September, 2022

The goal of the workshop is to generate five technical white papers and/or proposals on topics decided by the group that would have the greatest impact on the future.

Final Papers

by Phillip D. Long, Dmitri Zagidulin, and Golda Velez

The Verifiable Credential (VC) ecosystem has encountered several use cases that require a third-party assertion, or a linked claim to an existing object (another VC, a PDF, a web page, etc). Whether it is product reviews, linked claims of self-created credentials, provenance of academic paper reviews, or some other general purpose third-party assertion, these use cases have several requirements in common. Each use case may also require a domain-specific set of fields.

We propose a minimal format for connecting (and optionally cryptographically binding) credentials that will allow each use of third-party assertions to be represented as a set of LinkedClaims. Such a data set will enable verifiers to evaluate the credibility of claims, including those sourced from outside the Verifiable Credential ecosystem.

Further, we propose to demonstrate the ability to compose several Verifiable Credentials into a single domain-specific credential using the LinkedClaim vocabulary that will satisfy the domain requirements of the likely users.

This approach will enable rich shared datasets to inform trust decisions while satisfying the requirements of domain-specific end users. One of the intentions of LinkedClaims Verifiable Credentials is to give individuals the agency to make such claims about themselves and others on their own terms.

by Andre Kudra*, Torsten Lodderstedt, Paul Bastian, Mirko Mollik, Maaike van Leuken, and Caspar Roelofs

This paper introduces a comparison matrix for the wide variety of credential formats — such as W3C Verifiable Credentials, AnonCreds, and ISO-standard Mobile Driving License (mDL) — and the various related signing algorithms, revocation mechanisms, and key-management systems (collectively referred to as credential profiles). The credential profile comparison matrix is a living document that serves as an accessible resource for an in-depth evaluation of the technical requirements and their technical and non-technical implications for different use-cases and objectives. This paper also explains the rationale behind this matrix, describes the various properties that are included in the matrix and their definitions, and serves as an application guide on how to use the matrix for more informed technical and non-technical discussions and decision making.

This work is the outcome of a collaborative writing session during RWOT11 in September 2022 and continues the work kicked off in an IIW XXIV session in April 2022 and worked on offline afterwards. The work should be considered an iterative process, with the matrix being a living document that will require continuous updating while facilitating discussion among technical and non-technical experts.

by Paul Bastian, Rieks Joosten, Zaïda Rivai, Oliver Terbu, Snorre Lothar von Gohren Edwin, Antonio Antonino, Nikos Fotiou, Stephen Curran, and Ahamed Azeem

The W3C Verifiable Credentials Data Model(VCDM) specifies Verifiable Credentials (VCs)[^1] as a collection of claims that are issued by a single party, and Verifiable Presentations (VPs) as a collection of claims that a holder can construct from different VCs issued by different parties. Over the last year(s), various issues have been raised that revolve around what has been called 'holder binding'. The term 'holder binding' itself isn't clearly defined, and is in fact quite contentious. This paper seeks to come to grips with this discussion. Our first contribution is the specification of a terminology, which is intended to help readers understand what we mean to say without requiring them to make assumptions about such meanings (as is often the case in discussions about 'holder binding'). Our second contribution is an analysis of a (fictitious) use-case that suggests that verifiers typically do not need to know who the holder is (i.e. who has presented the claims to be verified). This analysis shows that verifiers need capabilities to (a) learn which entity is the subject of a particular claim, and (b) to know whether or not two subject identifiers refer to the same entity or to different entities. Also, they may need assurances regarding the party on whose behalf the component that has electronically presented the claims, has been using those capabilities. Our third contribution is a proposal for the syntax and semantics of a new property that can be used in (different parts of) VCs/VPs, that will provide verifiers with such capabilities.

by Lal Chandran, Lotta Lundin, Fredrik Lindén,  Philippe Page,  Paul Knowles, Víctor Martínez Jurado, Andrew Slack

On the need to link verifiable credentials with the right to use data in a secure, inclusive user interaction.

In this collaborative work from RWOT11, we revisit the issue of patient data exchange in a setting requiring cross-border, multi jurisdiction, and inclusive access to all participants. A fundamental problem in developing large-scale real-world solutions based on verifiable credentials is keeping the simplicity of usage for individuals in different contexts without sacrificing security.

We aim to highlight selected technical challenges and outline how the DEXA and OCA protocols contribute to scalable solutions.

by Juan Caballero, Martin Riedel, Egidio Casati, Robert Mao, Fabrice Rochette, Andrea Scorza, Raphael Roullet

In recent months, a problem space has been roughly delineated and widely discussed under the rubric of "on-chain web3 identity." Marketing imperatives and the lack of familiarity with compliance and liability issues particular to identity have largely muddied the waters in the solution space, however, resulting in a reductive three-way rivalry between "soul-bound tokens", verifiable credentials, and loosely-defined "zero knowledge" solutions. Working at a high level, we tried to identify a taxonomy that would be more useful for mapping this solution space according to high-level patterns and tradeoffs.

We defined the problem space at the highest level thusly: various architectures deploy on-chain artefacts to aid in the verification of claims about a wallet's controller. From there, we tried to bucket these into patterns before identifying strengths and weaknesses of each against a short, exemplary list of use-cases. The goal was not so much evaluating these exhaustively, as any evaluation should be more squarely grounded in more detailed use-cases and non-technical requirements. Instead, we strove to identify traits inherent to each high-level pattern that could lead to high-level fitness-for-purpose evaluations, i.e. the "strengths and weaknesses" of each.

by Shannon Appelcline, Cihan Saglam, Kate Sills, Carsten Stöcker

Decentralized identity solutions, such as DID methods, tend to be designed to protect against certain attacks, but the purpose of that design usually is not explicitly stated in any architectural description or threat documentation. In particular, some DID methods have costly on-chain requirements that must have had a reasoning behind their requirement. We can today see that these DID methods were purposefully shaped, but it’s not clear why such decisions were made. The purpose of this paper is to describe a few colorful attacks on DID methods so that we can better understand what threats a system might be vulnerable to.

Although we derived the examples in this paper by examining current DID methods, we believe these attack vectors are more general, even for systems not using DIDs. The goal is to support engineers and developers who are developing decentralized identity solutions to safeguard their work and make it secure and compliant.

by Manu Sporny, Oskar van Deventer, Isaac Henderson Johnson Jeyakumar, Shigeya Suzuki, Konstantin Tsabolov, Line Kofoed, Rieks Joostena

Enabling anyone to share information about the Issuers and Verifiers for whom they assure trust

This work focuses on how a party or its agent can decide whether or not to engage with a counterparty in a transaction. The purpose of this work is to enable the sharing of a list of Verifiable Issuers and Verifiers in a way that is useful to a particular transaction. A set of use cases provide examples where verification of an Issuer ("Is that diploma from a recognized university?") or Verifier ("Should the wallet block an unauthorized Verifier?") is needed. The studied prior art highlights various solutions to verify Issuers and Verifiers and identifies a lack of standards. Important contributions from this paper include a unified set of requirements, a data model, and multiple serializations of the data model --- including but not limited to Verifiable Credentials, DNSSEC, and blockchain-based serializations --- that could then be incubated and sent onto the standards track at global standards setting organizations.

Advance Readings

In advance of the design workshop, all participants are invited to contribute a one-or-two page topic paper to be shared with the other attendees on either:

  • A specific problem that they wanted to solve with a web-of-trust solution, and why current solutions (PGP or CA-based PKI) can't address the problem?
  • A specific solution related to the web-of-trust that you'd like others to use or contribute to?

Please see the Advance Readings directory for all the current papers (and how to upload yours). Advance readings from RWOT10 (cancelled due to COVID) are also included.

Complete Rebooting the Web of Trust Listing

A different repository is available for each of the Rebooting the Web of Trust design workshops:

License

All of the contents of this directory are licensed Creative Commons CC-BY their contributors.

rwot11-the-hague's People

Contributors

ankurdotb avatar christophera avatar cstoecker avatar dmitrizagidulin avatar elenachachkarova avatar eric-schuh avatar genaris avatar gimly-caspar avatar gvelez17 avatar hackmd-deploy avatar henkvancann avatar iangfc avatar jandrieu avatar lalc avatar longpd avatar maaikevanleuken avatar mave99a avatar mitfik avatar msporny avatar nmeyne avatar osioke avatar oskar-van-deventer avatar peacekeeper avatar rhiaro avatar rieksj avatar shannona avatar timoglastra avatar victormartinez-work avatar wip-abramson avatar zaida-rivai avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

rwot11-the-hague's Issues

Demo Proposal - TNO EASSI - An SSI Wallet Gateway (eSSIF-Lab)

Name of Demo

TNO EASSI - An SSI Wallet Gateway

Demo Details (for titling)

There are many different SSI wallets, each with their own spin on technological, usability and privacy aspects. In order to ensure autonomy of the holder in choosing their preferred wallet, verifiers and issuers should offer support for a variety of wallets. However, this ordinarily requires quite some manpower, effort and money. TNO EASSI is a solution that allows parties in the role of issuer or verifier to offer support for many wallets to holders by simply connecting to a single gateway. This service facilitates the adoption of SSI by providing an easy to use API, that allows credential issuing and/or verifying organizations to integrate multiple SSI wallets—that may be based on different underlying technologies—with a single interface, taking inspiration from the payment service provider model for online payments.

Name(s) of speakers

Maaike van Leuken

Contact (phone & email)

+316 21435173
[email protected]

Name of Company/Project

TNO

Content (upload an outline or ppt or something to let us have some sense of what we need).

I will show a ppt presentation.

[Demo Proposal] DID Connect live demo

Name of Demo

DID Connect live demo

Demo Details (for titling)

This is a live demo for DID Connect (https://github.com/WebOfTrustInfo/rwot11-the-hague/blob/master/advance-readings/did-connect.md)

DID Connect is a suite of RESTful APIs, UX components and SDK that provide a framework for DID interactions, connecting people, devices and applications via DID and Verifiable Credentials. DID Connect allows for clients of all types including browser-based, mobile, and javascript clients, to request and receive information about identities and the presentation of Verifiable Credentials. DID Connect focuses on the end users experience and applications, it’s independent to specific DID method implementations.

The demo is performance with a browser with a playground applications on the cloud and a mobile digital wallet.

Name(s) of speakers

Robert Mao

Contact (phone & email)

+1 425 4425101
[email protected]

Name of Company/Project

ArcBlock, Inc. / DID Connect (United States)

Content (upload an outline or ppt or something to let us have some sense of what we need).

This session uses a browser with a demo running in our cloud, a digital wallet (https://didwallet.io). The demo is interactive, audience can participate with a downloaded digital wallet.

Demo Proposal: Data Exchange Agreements (eSSIF-Lab)

Name of Demo

Data Exchange Agreements - Making data transactions trustworthy, auditable and immutable (eSSIF-Lab)

Demo Details (for titling)

This session provides an end-to-end demo of data exchange agreement protocols during decentralised personal data exchange, using digital wallets and data intermediaries (or MyData Operators).

A Data Disclosure Agreement (DDA) enables automated agreement handling for data exchange between a Data Source (DS) and Data Using Service (DUS). It helps organisations to continue leveraging their data assets while being transparent and legitimate in their data usage. Automated agreement handling is a requisite for a scalable and regulatory-compliant data marketplace. It also provides individuals control over how their data is used and exchanged via Data Agreements.

The demonstration will cover the following:

  1. How any data using service can dynamically signup with a data source within a decentralised ecosystem via data disclosure agreements in a data marketplace or data space
  2. How a digital wallet can be used to sign off every data exchange, whether directly between the data source, data using service, or via a digital wallet.
  3. Full auditability of any data exchange via signed agreements
  4. How the individual has full visibility, including data provenance enabled via DEXA (Data Exchange Agreement) protocols.

This solution is the result of multiple NGI-Trust projects, among others:

  1. NGI-Trust ONTOCHAIN: https://ontochain.ngi.eu/content/ps-sda
  2. NGI eSSIF-Lab: https://essif-lab.eu/automated-data-agreements-to-simplify-ssi-work-flows-by-igrant-io/

Name(s) of speakers

Mr. Lal Chandran (iGrant.io)
Mr. Fredrik Linden (MyData Sweden)

Contact (phone & email)

Phone: +46725298991
Email: [email protected]

Name of Company/Project

iGrant.io (Sweden)
MyData (Sweden)

Content (upload an outline or ppt or something to give us some sense of what we need).

This session uses a laptop with a demo running in our cloud, a digital wallet, a Data Source and a Data Using Service.

[Demo Proposal] DID Science; global DID data analyses

Name of Demo

DID Science; global DID data analyses

Demo Details (for titling)

  • A presentation of analyses on global DID data.
  • Graphs and figures on the distribution of several DIDs over time
  • Overview of different errors occurring in DIDs
  • Distribution of different verification method key types

Name(s) of speakers

Zaida Rivai
(Markus Sabadello)

Contact

[email protected]

Name of Company/Project

Danube Tech GmbH (Austria)

Content (upload an outline or ppt or something to let us have some sense of what we need).

This session uses a powerpoint presentation only. There is no browser needed.

Identified Communications: Alice calls Bob but is it really Bob?

eSSIF-Lab project SSIComms: Adding SSI to internet communications

Demoing the SSIComms app: an internet communications application with an SSI wallet, capable of receiving and showing W3C Verifiable Credentials during internet communication sessions

Alex Blom

[email protected]/+31654235167

bloqzone

Scenarios

  1. Receiving an IDIN credential from a bank
  2. Identification during a call
  3. Verify the Verifier
  4. Integration with the Visma Mandate Portal

Need user access

Can you pls provide me user access so I can add our submission and create a PR?

Demo night proposal: Godiddy.com - Universal DID operations (eSSIF-Lab)

Name of Demo

Godiddy.com - Universal DID operations (eSSIF-Lab)

Demo Details (for titling)

Godiddy.com is a product by Danube Tech that makes it easy for developers and solution providers to work with DIDs. It is based on the well-known DIF open-source projects Universal Resolver and Universal Registrar, and adds various advanced DID-related functionality on top of those. This work was funded initially by the eSSIF-Lab Business Open Call 1.

Name(s) of speakers

Markus Sabadello

Contact (phone & email)

+43 664 3154848
[email protected]

Name of Company/Project

Danube Tech / Godiddy.com

Content (upload an outline or ppt or something to let us have some sense of what we need).

See here for a longer video demonstration/discussion: https://www.youtube.com/watch?v=Wk5jGJyjBEo

Verifiable Credential Issuer Playground

Name of Demo

Verifiable Credential Issuer Playground

Demo Details (for titling)

A demonstration of Verifiable Credential issuance, open wallet selection, and storage in a digital wallet.

Name(s) of speakers

Manu Sporny

Contact (phone & email)

phone: Not willing to provide in a public setting -- RWoT leadership has my phone number
email: [email protected]

Name of Company/Project

Digital Bazaar

Content (upload an outline or ppt or something to let us have some sense of what we need).

Best Practices for Seed-Based Self-Sovereign Wallets

Name of Demo

Best Practices for Seed-Based Self-Sovereign Wallets

Demo Details (for titling)

Demo of various airgap wallets from the cryptocurrency community that leverage Blockchain Commons specifications, that can offer some lessons for the identity community.

Name(s) of speakers

Christopher Allen, Shannon Appelcline

Contact (phone & email)

cell/sms/signal +1-510-908-1066
[email protected]

Name of Company/Project

Blockchain Commons & Airgap Community

Content (upload an outline or ppt or something to let us have some sense of what we need).

[Demo Proposal] Trusted Crypto Asset

Name of Demo

Trusted Crypto Asset framework - NYMLAB srl

Demo Details (for titling)

Trusted Crypto Asset framework is developed by NYMLAB team and presents a way for issuers and holders to create/use a regulated asset in the context of a permissioned public decentralised network, leveraging on SSI protocols. We define a “Trusted Crypto Asset” as a particular asset class that intends to anticipate and satisfy regulatory requirements regarding the asset issuers, the network where they are minted and their holders.

Name(s) of speakers

Belsy Yuen

Contact (phone & email)

[email protected]

Name of Company/Project

NYMLAB srl / Trusted Crypto Asset

Content (upload an outline or ppt or something to let us have some sense of what we need).

We will be using a slide deck. Here is a link to a version of the demo we recently gave at one of our Discord community meetings.

Submitting advance reading papers

The advance reading primer says, "When you've written your paper, please upload it to the advance-readings directory. Please follow the instructions of the template to include your paper both in the topic and alphabetical contents."

When I click through to the advance readings directory, there is nothing called "template" with instructions on "how to". The readme has more instructions, but not a "how to" of how to do those things.

For folks new to Github, like me, a very specific how to with step-by-step instructions would be helpful. Thanks.

PR#11 now has merging conflicts

When I created PR#11, everything was ok - it said it could be merged.
When I look now, there are conflicts (in the README file, where Oliver Terbu appears to have added his contribution).
My Git-capabilities are not that evolved that I know how to resolve those.
Can anyone help out?

Update repo name from netherlands to the hague

Since all other rwot's have been a city rather than a country we decided it best to stick to this pattern.

Chris also asked me to remind you about changing to rwot11 first then to rwot11-the-hague because of how Github handles redirects.

Need policy on discounts/promo codes topic papers by multiple authors

We've had submissions of topic papers by multiple people in the past, and we gave multiple discount codes. However, in all of these cases, the papers were comprehensive and all the authors significantly contributed.

However, we've never had a formal policy about this, however, the submission of eSSIF-Lab: Towards a European SSI ecosystem pushes us to address it. First, for the authors of this specific paper, and in general for the future.

My proposal is that list of authors must be explicit and should have no more than 3 authors; that the submission needs closure (no rolling PRs) to include all the authors before any promo codes are offered, and that an RWOT Board Member can exceptions for significant collaborations.

Comments?

Implications of out-of-band binding

What are the implications of out-of-band binding? https://github.com/awoie/rwot11-the-hague/blob/83cbfbaf87901e0f8a03de70e98b4f3be6ea6de5/draft-documents/verfiable-credentials-holder-binding.md?plain=1#L398

Since no more details are yet in, I am assuming that this would provide repudiability to either party, since not the entire chain is auditable by third-parties, i.e., the exchange is somehow stateful and requires additional logic from either the holder or the verifier if such information could be used by third-party auditors.

Since some bindings are replayable and some are not, I think it would be worth highlighting the difference.
The difference is similar to that between authenticated encryption and digital signatures.

Gaia-X Notarisation API

Name of Demo: Gaia-X Notarisation API

Demo Details (for titling)

  • Show Notarisation API workflow and technology
  • Explain Gaia-X Federation Services
  • Demo eIDAS-bridge integration
  • Demo interaction with personal credential manager

Name(s) of speakers

Konstantin Tsabolov
Carsten Stöcker

Contact (phone & email)

[email protected]

Name of Company/Project

Spherity, Gaia-X Federation Service (GXFS) Example.

Content (upload an outline or ppt or something to let us have some sense of what we need).

The purpose of the Notarisation API is to attest given master data and transform it to W3C compliant digital Verifiable Credential representation.

These made tamper-proof digital claims about certain attributes are central to gain the desired trust in any provided self-descriptions of assets and participants in the distributed GAIA-X ecosystem.

Examples of verification and digital attestation are:

  • transform classic certificates of any 3rd party certifier to digital verifiable credential formats with desired signatures
  • GAIA-X participants and associated master data (e.g., address, name, tax identification number etc.)
  • ownership of the given organization DID – relates it to the real verified organization
  • business owner (e.g., by eID) to bridge SSI with eIDAS regulations
  • Organizations acting as trust anchor. E.g., Governments, Gaia-X AISBL, etc.

The Notarisation API composes of an eIDAS bridge, notarisation API roles and process flows well as an integration of AIP 1.0 and 2.0.

The demo will also show the GXFS implementation of the Personal Credential Manager (Human Edge Wallet).

Primer for Demo Night

@shannona would you have some availability to put together a brief primer on Demo night? Did you attend the one in Prague?

I think the key info we need to convey are:

  • How to apply for demo night (Submit Github Issue)
  • How we select demo's. @ChristopherA can you add some context here?
  • Number of demo slots available (Did we decide on this?)
  • How demo night works on the day. E.g. everyone watching same set of demo. Aim to build shared understanding amongst RWOT attendees.

Let me know if you need any more info on this.

Demo proposal: SSI-NFC smartcard login and access control

SSI-NFC: tap to ID, verify, access

Demo Details (for titling)

This is a demonstration of using NFC smartcards that contain a DID key pair for password-less login or for physical access control. This project has been partly funded by the NGI Essif-lab program.

Name(s) of speakers

Caspar Roelofs

Contact (phone & email)

T: +31612986705
E: [email protected]

Name of Company/Project

Gimly ID

Content (upload an outline or ppt or something to let us have some sense of what we need).

It will be a live demo, using the mobile Gimly ID wallet, a physical SSI-NFC card, and a webapp on a laptop. All will be mirrored to a large screen. Find our short video demo's here.

[Demo Proposal] Visual Hash - Applying image hashing technology to verifiable credentials

Name of Demo

Visual Hash - Applying image hashing technology to verifiable credentials

Demo Details (for titling)

image

Visual hash is an image authentication technology that combines image hashing and machine learning techniques.
This technology has been designed to work nicely in combination with Verifiable credentials . It solves the problem of adding images in Verifiable credentials in a privacy-preserving, offline and inclusive way.

Name(s) of speakers

Víctor Martínez Jurado
Andrew Slack

Contact (phone & email)

[email protected]
[email protected]

Name of Company/Project

SICPA

Content (upload an outline or ppt or something to let us have some sense of what we need).

We will be using a slide deck + a real demo with physical samples and a demo app (iPhone)

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.