nChain Identity
Back to All
  • nChain Identity user documentation
  • πŸ“‘INTRODUCTION
    • Introduction to nChain Identity
    • Why choose nChain Identity?
      • DiD differentiators
    • How does nChain Identity work?
      • Data flows
      • Use cases and applications
    • Standards and regulations
  • πŸ“„nChain Identity Issuers
    • What is an issuer?
    • How to become an issuer?
    • Operating an issuer
    • What do issuers do?
    • Issuer API
      • Overview
      • Getting Started
      • Examples
        • Issue an email credential
        • Revoke a claimed email credential
      • API Documentation
        • Credential Offers
        • Agent
        • Claims
  • πŸ“‘NCHAIN IDENTITY VERIFIER
    • What is a Verifier?
    • Operating a verifier
    • How to become a verifier?
    • Verifier API
      • Overview
      • Getting Started
      • Examples
        • Verify an email credential
      • API Documentation
        • Verifiable Presentation
        • Verifying
        • Agent
        • SIOP
        • Templates
  • πŸ“„NCHAIN IDENTITY WALLET
    • What is the wallet for?
    • How to receive a Verifiable Credential?
    • How to share a Verifiable Credential?
  • πŸ“‘Privacy and Security
    • Privacy and Security Measures: NChain Identity Services
    • Revocation and data deletion
  • πŸ—ƒοΈSELF-SOVEREIGN IDENTITY KNOWLEDGE
    • Self-Sovereign Identity
    • Actors
    • Decentralized vs Self-Sovereign Identity
    • Key Principles of Self-Sovereign Identity
    • Self-Sovereign Identity – Use Cases
    • Digital Trust
    • Some of the critical components of Self Sovereign Identity
      • Trust over IP
    • Some of the critical components of Decentralise ID
      • A Blockchain Tailored for Decentralized Identity
      • Decentralise Identifiers (DiD)
      • Verifiable Credentials
      • Verifiable Presentations
  • πŸ“‘GLOSSARY
    • Glossary
  • πŸ“„FAQs / HELP
    • Help & FAQs
      • What is a digital identity?
      • What is nChain Identity, and how does it work?
      • How is blockchain used in nChain Identity?
      • Compatible Blockchains for nChain Identity.
      • How can my business sign up for nChain Identity?
      • How is nChain Identity different to other identity solutions in the market?
      • Can nChain Identity communicate with other identity solutions?
      • What is nChain Identity doing with my data, and does it act as a data processor or controller?
      • What measures does nChain Identity take to protect user data?
      • What support is available for nChain Identity?
      • Can nChain Identity be integrated into our existing systems?
      • How can I get started with nChain Identity?
      • What countries is nChain Identity available in?
Powered by GitBook
On this page
  1. SELF-SOVEREIGN IDENTITY KNOWLEDGE

Decentralized vs Self-Sovereign Identity

Difference between services and concepts

Decentralized and self-sovereign identities are closely related concepts, but they have some nuanced differences.

Self-Sovereign Identity
Decentralised Identity

A self-sovereign identity is a specific approach within a decentralized identity that emphasizes individual control and ownership over personal identity data. Self-sovereign identity can be seen as a more advanced and user-centric manifestation of decentralized identity, emphasising privacy and autonomy.

Decentralized identity refers to implementing the SSI concept that supports managing identity in a decentralized manner by distributing ownership and access control through the different actors in theβ€―data verification transaction.

It reduces reliance on centralized identity and provides access to relevant data according to each party's needs.

Decentralized identity has been tested through different designs and implementations; nChain makes every effort to align with specifications approved and developed by W3C and EIDAS frameworks.

PreviousActorsNextKey Principles of Self-Sovereign Identity

Last updated 2 months ago

πŸ—ƒοΈ