nChain Identity
Back to All
  • nChain Identity user documentation
  • 📑INTRODUCTION
    • Introduction to nChain Identity
    • Why choose nChain Identity?
      • DiD differentiators
    • How does nChain Identity work?
      • Data flows
      • Use cases and applications
    • Standards and regulations
  • 📄nChain Identity Issuers
    • What is an issuer?
    • How to become an issuer?
    • Operating an issuer
    • What do issuers do?
    • Issuer API
      • Overview
      • Getting Started
      • Examples
        • Issue an email credential
        • Revoke a claimed email credential
      • API Documentation
        • Credential Offers
        • Agent
        • Claims
  • 📑NCHAIN IDENTITY VERIFIER
    • What is a Verifier?
    • Operating a verifier
    • How to become a verifier?
    • Verifier API
      • Overview
      • Getting Started
      • Examples
        • Verify an email credential
      • API Documentation
        • Verifiable Presentation
        • Verifying
        • Agent
        • SIOP
        • Templates
  • 📄NCHAIN IDENTITY WALLET
    • What is the wallet for?
    • How to receive a Verifiable Credential?
    • How to share a Verifiable Credential?
  • 📑Privacy and Security
    • Privacy and Security Measures: NChain Identity Services
    • Revocation and data deletion
  • 🗃️SELF-SOVEREIGN IDENTITY KNOWLEDGE
    • Self-Sovereign Identity
    • Actors
    • Decentralized vs Self-Sovereign Identity
    • Key Principles of Self-Sovereign Identity
    • Self-Sovereign Identity – Use Cases
    • Digital Trust
    • Some of the critical components of Self Sovereign Identity
      • Trust over IP
    • Some of the critical components of Decentralise ID
      • A Blockchain Tailored for Decentralized Identity
      • Decentralise Identifiers (DiD)
      • Verifiable Credentials
      • Verifiable Presentations
  • 📑GLOSSARY
    • Glossary
  • 📄FAQs / HELP
    • Help & FAQs
      • What is a digital identity?
      • What is nChain Identity, and how does it work?
      • How is blockchain used in nChain Identity?
      • Compatible Blockchains for nChain Identity.
      • How can my business sign up for nChain Identity?
      • How is nChain Identity different to other identity solutions in the market?
      • Can nChain Identity communicate with other identity solutions?
      • What is nChain Identity doing with my data, and does it act as a data processor or controller?
      • What measures does nChain Identity take to protect user data?
      • What support is available for nChain Identity?
      • Can nChain Identity be integrated into our existing systems?
      • How can I get started with nChain Identity?
      • What countries is nChain Identity available in?
Powered by GitBook
On this page
  1. SELF-SOVEREIGN IDENTITY KNOWLEDGE

Some of the critical components of Self Sovereign Identity

  • Decentralized Identifiers (DIDs): DiDs are the foundational building blocks, providing each user with a unique, globally resolvable identifier. Users create and own them, eliminating the need for central authorities to issue and manage identities.

  • Verifiable Credentials (VCs): VCs are digitally signed statements that attest to specific attributes or claims about a user. Issuers create VCs; users hold and selectively disclose them to verifiers without revealing unnecessary information.

  • Distributed Ledger Technology (DLT): SSI often leverages distributed ledger technology (blockchain) to secure and decentralize the storage and verification processes. The blockchain ensures tamper-proof records of DIDs, VCs, and associated public keys. Users store their credentials in personal data stores, often called identity hubs. These hubs are under the user's control, enhancing privacy and allowing seamless access from various devices.

  • Interoperability Standards: SSI solutions adhere to interoperable standards such as DIDs and Verifiable Credentials defined by the World Wide Web Consortium (W3C). This ensures compatibility and widespread adoption across different platforms and applications.

  • Some advantages:

    • User Empowerment: Users have complete control and ownership of their identity, reducing the risk of identity theft and data breaches.

    • Privacy by Design: Selective disclosure and zero-knowledge proofs enable users to share only necessary information, enhancing privacy.

    • Interoperability: Standardized protocols facilitate seamless integration with various applications and services.

    • Security: Using decentralized ledgers and cryptographic techniques enhances the security and integrity of identity information.

PreviousDigital TrustNextTrust over IP
🗃️