Decentralised Identity, otherwise known as Self-Sovereign Identity ("SSI") is an emerging technology that enables individuals and/or organizations to maintain direct control of data relating to them, with the ability to explicitly consent to where it is shared, used and processed.
Decentralised identity aims to create a trusted data economy, where it is possible to verify, check and trust exactly who you are interacting with, in both physical and digital domains.
Through this data model, it is possible to:
Reduce fraud, scams and phishing attempts online through digital identity proofs;
Increase efficiency of signing up for new services, accessing events or proving attributes about yourself;
Eliminate the need for hundreds of passwords;
Empower individual privacy and GDPR data subject rights by design;
Increase accountability in digital environments, minimising trolls and hate speech.
The Trust Triangle
Any distinct model of decentralised identity revolves around three specific actors: the issuer, the holder and the verifier. Together, these three actors constitute what is known as the Trust Triangle.
cheqd trust triangle basic
Let’s discuss these three in turn:
Who are Issuers?
An issuer is an entity that is able to issue trusted data in the form of Verifiable Credentials. Issuers can come in many shapes and sizes. In most typical SSI use cases, issuers tend to be large organisations such as governments, financial services, health services, insurers or education faculties.
However, an issuer could also quite easily be a friend, family member or even a local café. In fact, in the DeFi world, issuers could be those who you have interacted with online who attest to something about you.
All an issuer needs to be able to do is to attest a fact or attribute about someone else. The level of trust in that attestation is up for the verifier to decide.
Who are Holders?
A holder can be an individual, an organisation, a product or an object, which has a certain set of attributes that have been attested to by an issuer.
The holder is able to hold and manage these attributes, in the form of Verifiable Credentials, and directly consent to when, and with whom, these credentials are shared. This empowers the holder to be able to enact their GDPR Data Subject Rights by design and by default.
A holder is able to bundle their Verifiable Credentials into a Verifiable Presentation in order to prove attributes about itself to a third party. There are different types of Verifiable Credentials that a holder may hold; they may have different Signature schemes, some may afford greater privacy preserving benefits such as Zero Knowledge Proofs or Selective Disclosure.
The verifier is able to check that the data presented was issued by the correct, legitimate issuer and that the Verifiable Credential has not been tampered with. In most instances, the verifier may be able to check that the Verifiable Credential has not expired or been revoked.
Why is the Trust Triangle important?
The Trust Triangle enables a verifier to be able to trust data it receives from a holder without having to have any direct interaction or relationship with the issuer.