{"id":5115,"date":"2024-11-20T22:32:11","date_gmt":"2024-11-20T21:32:11","guid":{"rendered":"https:\/\/wsj-crypto.com\/?p=5115"},"modified":"2024-11-20T22:32:11","modified_gmt":"2024-11-20T21:32:11","slug":"uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase","status":"publish","type":"post","link":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/","title":{"rendered":"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum&#8217;s Next Phase"},"content":{"rendered":"<p><\/p>\n<div>\n<p><strong>12 September 2024<\/strong><\/p>\n<p><a href=\"https:\/\/github.com\/ethereum-oasis-op\/L2\/tree\/main\"><span style=\"font-weight: 400;\">Ethereum Open Community Projects L2 Standards Working Group<\/span><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Vitalik Buterin outlined three essential transitions for Ethereum: scaling via L2 rollups to minimize expenses, improving wallet security through smart contract wallets for enhanced safety and user experience, and progressing privacy with privacy-conserving mechanisms. This article examines how the integration of W3C Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs) can tackle some of these issues by refining the handling of identities, keys, and addresses, utilizing existing decentralized identity systems to facilitate Ethereum&#8217;s transitions effectively towards a more L2-oriented landscape.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As pointed out by Vitalik Buterin in a series of 2023 publications, particularly his <\/span><a href=\"https:\/\/vitalik.eth.limo\/general\/2023\/06\/09\/three_transitions.html\"><span style=\"font-weight: 400;\">Three Transitions article<\/span><\/a><span style=\"font-weight: 400;\">, Ethereum is evolving from a nascent experimental technology into a robust tech stack that could deliver an open, global, and permissionless experience to everyday users. Nonetheless, he asserts that there are three primary technical transitions that the stack must achieve, largely concurrently:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>L2 Scaling Transition<\/b><span style=\"font-weight: 400;\">: This entails shifting the ecosystem to rollups in order to mitigate the exorbitant transaction fees on Ethereum, which have soared to $3.75 or even $82.48 during market surges.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Wallet Security Transition<\/b><span style=\"font-weight: 400;\">: Adapting to smart contract wallets (account abstraction) is crucial for better user ease and security when managing funds and non-financial assets, moving away from centralized exchanges and standalone non-custodial wallets.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Privacy Transition<\/b><span style=\"font-weight: 400;\">: Guaranteeing privacy-preserving fund transfers and developing additional privacy-preserving mechanisms such as social recovery and identity systems is vital to prevent users from turning to centralized solutions that provide little or no privacy.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Vitalik underscores that these transitions are important and arduous due to the substantial coordination needed to execute them. In particular, he addressed the ramifications of these transitions on the relationship between users and addresses, payment systems, and key management strategies. The connection between users and their addresses, as well as key rotation\/recovery, represent a significant concern both technically and from a user experience standpoint \u2013 user experience (UX) ultimately dictates success or failure, regardless of the quality of the underlying technology.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this article, we will explore these latter concerns and examine how solutions drawn from another ecosystem, specifically one centered on decentralized identity\u2014often termed self-sovereign identity\u2014can greatly assist with the transitions without reinventing the wheel unnecessarily.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The problem statement regarding Ethereum\u2019s technical transitions can be encapsulated as follows, according to <\/span><a href=\"https:\/\/vitalik.eth.limo\/general\/2023\/06\/09\/three_transitions.html\"><span style=\"font-weight: 400;\">Vitalik<\/span><\/a><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Complex Payments<\/b><span style=\"font-weight: 400;\">: The transitions complicate straightforward actions like making payments, requiring more information than merely an address because the user must assess which funds to utilize, where to send them, and specific payment instructions often necessitating identity information.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Smart Contract Wallets<\/b><span style=\"font-weight: 400;\">: Smart Contract wallets introduce technical challenges that must be resolved, such as ensuring wallets can monitor ETH sent by smart contract code, including tracking across various networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Privacy Challenges<\/b><span style=\"font-weight: 400;\">: Privacy-preserving transactions, when introduced, create new hurdles, requiring a \u201cspending public key\u201d and encrypted details for the recipient to receive the payment and determine how to retrieve it.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Identity Changes<\/b><span style=\"font-weight: 400;\">: The notion of an \u201caddress\u201d will evolve, potentially necessitating a mix of multiple addresses, encryption keys, and additional data for user interaction.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Thus, these points provoke the inquiry of how best to manage identity, addresses, and their keys collectively, ensuring that the user is not confused and their asset security is maintained.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In light of the aforementioned problem statement, the concept of an \u201caddress\u201d within the Ethereum ecosystem is transforming, with the traditional idea of an address as a solitary cryptographic identifier becoming outdated. Instead, \u201cinstructions for how to engage with me\u201d will necessitate a combination of addresses across multiple Layer 2 (L2) platforms, stealth meta-addresses, encryption keys, and other relevant data. In his article, Vitalik suggests that one possible method would involve utilizing Ethereum Name Service (ENS) records to encompass all identity details. Sending an ENS name such as \u201calice.eth\u201d would permit the recipient access to all required interaction specifics, inclusive of payment and privacy-preserving techniques. Nevertheless, this method has its limitations, such as over-attaching identity to a single name and the inability to have trustless counterfactual names, which are crucial for sending tokens to new users without any past blockchain interaction. Moreover, the ENS system operates as a rent-seeking construct. Consequently, it is inherently inequitable and fails to secure ongoing ownership of one&#8217;s identity, which is an untenable scenario. An alternate solution involves keystore contracts that retain all identity information. These contracts can accommodate counterfactual scenarios and are detached from a specific name, offering greater flexibility and privacy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This brings us to the topic of keys managing \u201caddresses\u201d. In particular, key rotation and key recovery in a multi-address Ethereum ecosystem. Key rotation has become an essential feature with smart contract wallets and account abstraction, as the governing address of a smart contract wallet might shift due to key rotation or recovery, necessitating a new governing address. Regardless of key rotation or recovery, the conventional approach would require executing on-chain procedures on each address independently. This is impractical due to gas expenses, counterfactual addresses, and privacy issues. As previously noted, Vitalik advocates for the use of keystore contracts that exist in a singular location and refer to verification logic across different addresses. This would facilitate the creation of proof for the current spending key concerning transactions. This demands a recovery architecture that distinguishes verification logic from asset holdings, streamlining the recovery procedure by requiring merely a cross-network proof for recovery.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In this context, Decentralized Identifiers can utilize keystore contracts to enable modular verification logic for contract accounts, which validates zk proofs via a specific validation module and incorporates a system<\/span><a href=\"https:\/\/ethresear.ch\/t\/enabling-standardized-on-chain-executions-through-modular-accounts\/20127\/3\"><span style=\"font-weight: 400;\"> to normalize onchain executions<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Incorporating privacy enhancements, such as encrypted references and zk proofs, adds to the intricacy. Nevertheless, it presents potential alignments with keystore contracts for persistent addresses, as the permanent address could be \u201cconcealed\u201d within a zk proof.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">What implications does this have for smart contract wallets? Historically, wallets were crafted to safeguard assets by securing the private key linked with on-chain assets. If a change of key was necessary, the previous one could be safely disclosed without any danger. However, in a zero-knowledge environment, wallets need to safeguard data in addition to assets. The instance of <\/span><a href=\"https:\/\/zupass.org\/\"><span style=\"font-weight: 400;\">Zupass, a ZK-SNARK-driven identity framework<\/span><\/a><span style=\"font-weight: 400;\"> exemplifies that users can retain data locally and disclose it only when required. Nonetheless, the loss of the encryption key for the data leads to forfeiting access to all encrypted information. Thus, managing encryption keys is becoming progressively vital. Vitalik recommends that employing multiple devices or secret sharing among (key) \u201cguardians\u201d could alleviate the risk associated with losing encryption keys. Yet, this method is unsuitable for asset retrieval due to the potential for collusion among \u201cguardians.\u201d Ultimately, the notion of an address as a user\u2019s on-chain identifier must evolve, thus necessitating wallets to manage both asset recovery and encryption key recovery, preventing users from being overwhelmed with convoluted recovery methods, which translates to inadequate UX. For instance, <\/span><a href=\"https:\/\/eips.ethereum.org\/EIPS\/eip-4361\"><span style=\"font-weight: 400;\">Sign In With Ethereum<\/span><\/a><span style=\"font-weight: 400;\"> depends on the onchain address and the user\u2019s private key overseeing that key to create the authentication message. However, there is no concept of a one-to-many relationship in this approach, and no recognition of a smart contract wallet serving as the primary delegate of the user. Consequently, the verifying entity, also referred to as the relying party, cannot evaluate the extent of the required authorization(s) for the user when logging in, which is essential depending on the functionalities that the verifying entity offers to the user address.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Three Transitions are not merely technical upgrades; they signify profound transformations in how users interact with Ethereum-based stacks, particularly concerning identity, key management, and addresses, thus evolving the Ethereum ecosystem from its present state into a more user-friendly and accessible platform that emphasizes scalability, security, and usability. Hence, it is natural to inquire: Are there tools and frameworks currently accessible that could be leveraged by the community, particularly regarding identity, key management, and privacy to facilitate the transitions? The answer is a resounding yes. Specifically, the ecosystem that has developed around the concept of decentralized identity and its associated standards, frameworks, and numerous reference implementations has generated tools that are readily usable within the Ethereum stack.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What is the Decentralized Identity Ecosystem?<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">The decentralized identity ecosystem concentrates on empowering individuals with control over their digital identities without dependence on centralized authorities. It utilizes blockchain technology and cryptographic principles to guarantee privacy, security, and user-focused identity management. At the center of this ecosystem are two fundamental concepts: Decentralized Identifiers (DIDs) and Verifiable Credentials (VCs).<\/span><\/p>\n<p><a href=\"https:\/\/github.com\/w3c\/did-core\"><b>Decentralized Identifiers (DIDs):<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">DIDs are an innovative category of identifier that facilitates verifiable, self-sovereign digital identities. They are unique, globally resolvable identifiers linked to a subject, such as an individual, organization, or device. DIDs are inherently decentralized, meaning they do not depend on a central registry or authority for their creation or administration. Rather, they are generated and managed by the users or entities acting on their behalf. Typically, DIDs incorporate public-key cryptography to ensure secure interactions and enable the subject to demonstrate ownership and control of their identity while performing specific authorized actions such as assertions, authentication, authorization, and encryption.<\/span><\/p>\n<p><a href=\"https:\/\/github.com\/w3c\/vc-data-model\"><b>Verifiable Credentials (VCs):<\/b><\/a><\/p>\n<p><span style=\"font-weight: 400;\">Verifiable Credentials are digital credentials that include assertions about a subject\u2019s identity, attributes, or qualifications, issued by trusted entities known as issuers. VCs are tamper-evident and cryptographically signed to guarantee their integrity and authenticity. Significantly, VCs are portable and can be presented by the subject to verifiers, such as service providers or relying parties, without requiring those verifiers to contact the issuer directly. This allows for seamless and privacy-preserving identity verification across various domains and contexts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Several key contributors and organizations are driving the development and acceptance of decentralized identity technologies:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/identity.foundation\/\"><b>Decentralized Identity Foundation (DIF)<\/b><span style=\"font-weight: 400;\">:<\/span><\/a><span style=\"font-weight: 400;\"> DIF is a consortium of organizations working together to establish standards and protocols for decentralized identity systems. It promotes interoperability and innovation in the field.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.w3.org\/\"><b>World Wide Web Consortium (W3C):<\/b> <\/a><span style=\"font-weight: 400;\">W3C hosts the Credentials Community Group, which nurtures work on verifiable credentials and related technologies, alongside the <\/span><a href=\"https:\/\/www.w3.org\/groups\/wg\/did\/\"><span style=\"font-weight: 400;\">Decentralized Identifier<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/www.w3.org\/groups\/wg\/vc\/\"><span style=\"font-weight: 400;\">Verifiable Credentials<\/span><\/a><span style=\"font-weight: 400;\"> Working Groups, which are refining updates to the respective specifications.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.hyperledger.org\/projects\/hyperledger-indy\"><b>Hyperledger Indy:<\/b><\/a><span style=\"font-weight: 400;\"> Hyperledger Indy is an open-source initiative under the Linux Foundation. Its focus is on providing tools and libraries for constructing decentralized identity systems.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/sovrin.org\/\"><b>Sovrin Foundation<\/b><\/a><b>:<\/b><span style=\"font-weight: 400;\"> The Sovrin Foundation manages the Sovrin Network, a public permissioned blockchain engineered for decentralized identity governance.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Microsoft, IBM, and other technology firms<\/b><span style=\"font-weight: 400;\">: Numerous major technology firms are actively participating in the development of decentralized identity solutions, contributing to standardization efforts, and creating reference implementations.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Standards are vital in ensuring interoperability and compatibility within the decentralized identity ecosystem. Some significant standards and reference implementations include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\">&#8220;`html<br \/>\n<a href=\"https:\/\/github.com\/w3c\/did-core\"><b>Decentralized Identifier (DID) Specification<\/b><\/a><b>:<\/b><span style=\"font-weight: 400;\"> Establishes the syntax and semantics of DIDs, outlining techniques for their creation, resolution, and administration.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/github.com\/w3c\/vc-data-model\"><b>Verifiable Credentials Data Model:<\/b><\/a><span style=\"font-weight: 400;\"> Defines the structure and format of verifiable credentials, which includes JSON-LD contexts for representing assertions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/identity.foundation\/didcomm-messaging\/spec\/\"><b>DIDComm Messaging Protocol:<\/b><\/a><span style=\"font-weight: 400;\"> Facilitates secure, private communication between DIDs, utilizing end-to-end encryption and cryptographic authentication.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>SSI (Self-Sovereign Identity) Protocols: <\/b><span style=\"font-weight: 400;\">A variety of protocols and frameworks, including <\/span><a href=\"https:\/\/decentralized-id.com\/projects\/decentralized-identity-foundation\/did-authentication\/\"><span style=\"font-weight: 400;\">DID Auth<\/span><\/a><span style=\"font-weight: 400;\">, <\/span><a href=\"https:\/\/identity.foundation\/presentation-exchange\/\"><span style=\"font-weight: 400;\">Presentation Exchange<\/span><\/a><span style=\"font-weight: 400;\">, and<\/span><a href=\"https:\/\/w3c-ccg.github.io\/vc-api\/\"><span style=\"font-weight: 400;\"> VC API<\/span><\/a><span style=\"font-weight: 400;\">, enable secure interactions and transactions within the self-sovereign identity framework.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.hyperledger.org\/projects\/aries\"><b>Hyperledger Aries<\/b><\/a><b>:<\/b><span style=\"font-weight: 400;\"> A framework that offers a suite of interoperable components for constructing decentralized identity solutions, encompassing agents, wallets, and protocols.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/www.polygonid.com\/\"><span style=\"font-weight: 400;\">Privado ID<\/span><\/a> <b>previously Polygon ID:<\/b><span style=\"font-weight: 400;\"> A suite of tools designed for developers to forge secure and trustworthy relationships between users and applications in Web3. It emphasizes decentralized identity, granting users control over their data. The toolkit is founded on the open-source <\/span><a href=\"https:\/\/iden3.io\/\"><span style=\"font-weight: 400;\">iden3<\/span><\/a><span style=\"font-weight: 400;\"> protocol.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><a href=\"https:\/\/quarkid.org\/\"><span style=\"font-weight: 400;\">QuarkID<\/span><\/a><span style=\"font-weight: 400;\">: An open-source DID solution currently deployed on ZKsync Era with digital credentials issued by the City of Buenos Aires.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Below, we outline how a decentralized identity structure can be effectively utilized to address the cross-network challenges regarding identity, address, and key management previously outlined.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Utilizing Decentralized Identifiers (DIDs)<\/span><\/h2>\n<p><b>Issue<\/b><span style=\"font-weight: 400;\">: Managing a user&#8217;s identity across an array of Ethereum networks is intricate.<\/span><\/p>\n<p><b>DID Solution for Identities<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DIDs offer globally unique identifiers that can be resolved (to their DID Document) and verifiable through cryptographic means across any blockchain network.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Each DID is linked to a DID Document that encompasses details about the relationship of a DID to a collection of cryptographic keys, the actions these keys can perform such as verification, authentication, authorization, assertion, and encryption, as well as service endpoints like API endpoints to addresses managed by the keys outlined in the DID Document.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The association of DIDs with their respective DID Documents or cryptographic representations can be recorded on any blockchain network, guaranteeing tamper-proof and enduring identity records.<\/span><\/li>\n<\/ul>\n<p><b>DID Documents for Address Management<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><b>Issue<\/b><span style=\"font-weight: 400;\">: Users maintain different addresses on the Ethereum mainnet, testnets, and Layer 2 solutions, including counterfactual addresses.<\/span><\/p>\n<p><b>DID Document solution<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">A DID document includes a verificationMethod data property allowing a DID owner or controller to define symmetric and asymmetric cryptographic keys for any preferred curve like secp256k1 used by Ethereum stacks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The verificationMethod for a key additionally allows the user to define an ID for the verification method. Typically, this is the DID with a fragment as prescribed by the DID specification. This fragment facilitates two crucial aspects: firstly, it allows the specification of a network identifier, for example, \u201c1\u201d if the key pertains to an Ethereum key, and other numbers if that key is not part of an Ethereum network. Moreover, the fragment can be expanded to indicate if the key is associated with a counterfactual address or a smart contract wallet. For instance, \u201cdid:ion:1234xxxxddd4444-#1-counter\u201d signifies that the public key pertains to a counterfactual Ethereum address. Additionally, if there is a need to distinctly identify an address on Polygon PoS vs Arbitrum One, the \u201c1\u201d could be substituted with the chainId of the intended network, e.g., 137 for Polygon PoS.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Lastly, a smart contract wallet may have its own DID and be managed by the DIDs of the wallet&#8217;s owners, where each owner indicates one or more controlling keys for the wallet as described in their DID document. This point enables two significant enhancements for smart contract wallets \u2013 key rotation, also known as key recovery, and an unlimited number of controlling keys without the need to disclose those controlling keys.<\/span><\/li>\n<\/ul>\n<p><b>DID Documents for Key Management including Social Recovery<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><b>DID Solution for Identities<\/b><span style=\"font-weight: 400;\">:<\/span><\/p>\n<p><b>Issue<\/b><span style=\"font-weight: 400;\">: Key recovery and key rotation for Ethereum addresses, particularly smart contract wallets, pose complexities and lack user-friendliness.<\/span><\/p>\n<p><b>DID Document solution:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When a public key linked to a DID needs to be rotated for security or recovery reasons, a user can easily modify a DID Document and replace the outdated public key with a new one in the verificationMethod using another controlling key. This can be a key that the user directly manages, or if control has been delegated, by another user managing a DID designated as controller.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consequently, this can also be realized for a Smart Contract wallet. Each controller can independently update the key in the verificationMethod related to their DID. This suffices as the user can generate a cryptographic commitment confirming that the update was executed correctly, which can be presented to and validated by the smart contract wallet.<\/span><\/li>\n<\/ul>\n<p><b>Privacy (Zero-Knowledge) Aspect of DIDs and DID Documents<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">DID Documents can be represented as zero-knowledge<br \/>\n&#8220;`<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Proofs achieved by initially merkelizing their JSON-LD document, followed by authenticating Merkle Proofs of associations between DID-to-key and DID-to-functional-capability (illustrated through one or several cryptographic keys).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Utilizing zk-SNARKs, specifically, allows for swift verification of cryptographic key assertions on Ethereum networks.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">For instance, the zero-knowledge circuit for a legitimate key rotation modification of a DID document would execute two tasks: a) confirm that the updating key exists within the DID document and serves as a controlling key by validating a Merkle proof of its inclusion in the DID document and b) authenticate the digital signature of the controlling key over the root hash of the previous DID document. The public inputs to the proof would consist of the Merkle Root of the newly merkelized DID Document and the root hash of the previous DID document, while the private inputs would include the Merkle proof and the digital signature. The smart contract would solely need to validate the proof, ascertain that the old root hash was recorded, and subsequently replace the old root hash with the new one.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This presents the benefit that no details are disclosed about which addresses oversee the smart contract wallet. Each smart contract wallet transaction could maintain complete anonymity if all transactions presented to the smart contract include a recursive zero-knowledge proof validating that a) the public key associated with the address executing the transaction is a controlling key of the DID that owns the smart contract and b) that a zero-knowledge proof confirming that the transaction was validated by the appropriate quorum of signatures from the smart contract wallet proprietors was successfully verified by a verifier in the circuit.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Utilizing Verifiable Credentials (VCs)<\/span><\/h2>\n<p><b>Challenge<\/b><span style=\"font-weight: 400;\">: The entity conducting a key operation such as key rotation or providing a digital signature for a financial transaction needs to demonstrate that it is a legitimate entity compliant with all relevant regulations for a jurisdiction under compliance supervision.<\/span><\/p>\n<p><b>VC Approach for Compliant Key Operations:<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">W3C VCs allow for declarations to be made about the subject of the credential such as \u201cAlice is a legal business in Brazil\u201d, or, \u201cThis business is a recognized entity in the US and a registered Broker-Dealer\u201d, or, \u201cThe legally recognized US entity A is a registered Broker-Dealer and is duly authorized to act on behalf of the legally recognized US entity B\u201d.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Due to the standardized format and publicly available reference files that specify the VC standard and distinct VC types, each VC can easily be converted into a zk proof given a standard, publicly accessible zk circuit. Disclosing only the lawful identity of the VC issuer as the trust anchor, such as a KYC provider.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">These zk proofs, specifically ZK-SNARKs, can accompany any transaction and be validated in a smart contract such as a smart contract wallet or a DeFi protocol.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">This facilitates compliant transactions within Ethereum stacks without exposing any sensitive identity or pertinent compliance information.<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Beneficial Implementations for Ethereum Networks<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There exists a multitude of implementations of the <\/span><a href=\"https:\/\/www.w3.org\/TR\/did-spec-registries\/\"><span style=\"font-weight: 400;\">W3C DID specification<\/span><\/a><span style=\"font-weight: 400;\">. While numerous DID methods may not possess the necessary scalability or the ability to be easily anchored on a blockchain, several DID methods align well with the Ethereum ecosystem \u2013 being permissionless, blockchain-anchored, scalable, and low-cost. All these DID methods are founded on <\/span><a href=\"https:\/\/identity.foundation\/sidetree\/spec\/#:~:text=The%20Sidetree%20protocol%20defines%20a,Decentralized%20Identifier's%20DID%20Document%20state.\"><span style=\"font-weight: 400;\">the Sidetree Protocol<\/span><\/a><span style=\"font-weight: 400;\">. The Sidetree Protocol is a \u201cLayer 2\u201d DID protocol that can be executed atop any event anchoring system, including <\/span><a href=\"https:\/\/github.com\/decentralized-identity\/element\"><span style=\"font-weight: 400;\">Ethereum<\/span><\/a><span style=\"font-weight: 400;\">, and adheres to W3C guidelines. The Sidetree protocol does not necessitate centralized entities, unique protocol tokens, trustworthy intermediaries, or secondary consensus processes. In particular, the Sidetree protocol delineates a fundamental set of DID PKI state change operations, organized as delta-based Conflict-Free Replicated Data Types (i.e. Create, Update, Recover, or Deactivate), that alter a Decentralized Identifier\u2019s DID Document state.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thus, by utilizing an Ethereum-based application of Sidetree, the Ethereum ecosystem can guarantee that each user possesses a self-sovereign identity that is both private and interoperable across various L2s and applications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We are convinced that integrating W3C DIDs and VCs into Ethereum\u2019s architecture is vital for navigating the forthcoming transitions. They equip the essential instruments for managing identities, keys, and address security and privacy, and are congruent with the decentralized essence of blockchain technology.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Regrettably, the Ethereum ecosystem and the decentralized identity (DID) ecosystem have not significantly intersected, despite both sharing a commitment to decentralization. The Ethereum ecosystem has predominantly focused on enhancing and scaling its blockchain technology, while the DID ecosystem has prioritized establishing standards and protocols for managing digital identities. Consequently, opportunities for synergy between these two realms have been scarce.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We perceive the Three Transitions as a chance to transform this situation and initiate closer collaboration between the Decentralized Identity and Ethereum ecosystems.<\/span><\/p>\n<p><b>Appreciations<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Heartfelt thanks to Eugenio Reggianini (<\/span><a href=\"http:\/\/entethalliance.org\/cdn-cgi\/l\/email-protection#25574042424c444b4c4b4c5740654248444c490b464a48\"><span style=\"font-weight: 400;\"><span class=\"__cf_email__\" data-cfemail=\"9fedfaf8f8f6fef1f6f1f6edfadff8f2fef6f3b1fcf0f2\">[email\u00a0protected]<\/span><\/span><\/a><span style=\"font-weight: 400;\">) for reviewing the manuscript and contributing significant content.<\/span><\/p>\n<\/div>\n<p><br \/>\n<br \/><a href=\"https:\/\/entethalliance.org\/w3cs-did-and-vc-technology-can-help-with-ethereums-three-transitions\/\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>12 September 2024 Ethereum Open Community Projects L2 Standards Working Group Vitalik Buterin outlined three essential transitions for Ethereum: scaling via L2 rollups to minimize expenses, improving wallet security through smart contract wallets for enhanced safety and user experience, and progressing privacy with privacy-conserving mechanisms. This article examines how the integration of W3C Decentralized Identifiers<\/p>\n","protected":false},"author":3,"featured_media":4783,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23],"tags":[85],"class_list":{"0":"post-5115","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-ethereum","8":"tag-return-a-list-of-comma-separated-tags-from-this-title-bringing-ecosystems-together-how-w3c-dids-and-vcs-can-help-with-ethereums-three-transitions"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum&#039;s Next Phase - WSJ-Crypto<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/\" \/>\n<meta property=\"og:locale\" content=\"it_IT\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum&#039;s Next Phase - WSJ-Crypto\" \/>\n<meta property=\"og:description\" content=\"12 September 2024 Ethereum Open Community Projects L2 Standards Working Group Vitalik Buterin outlined three essential transitions for Ethereum: scaling via L2 rollups to minimize expenses, improving wallet security through smart contract wallets for enhanced safety and user experience, and progressing privacy with privacy-conserving mechanisms. This article examines how the integration of W3C Decentralized Identifiers\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/\" \/>\n<meta property=\"og:site_name\" content=\"WSJ-Crypto\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-20T21:32:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png\" \/>\n\t<meta property=\"og:image:width\" content=\"360\" \/>\n\t<meta property=\"og:image:height\" content=\"140\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"wsjcrypto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Scritto da\" \/>\n\t<meta name=\"twitter:data1\" content=\"wsjcrypto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tempo di lettura stimato\" \/>\n\t<meta name=\"twitter:data2\" content=\"17 minuti\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/\",\"url\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/\",\"name\":\"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum's Next Phase - WSJ-Crypto\",\"isPartOf\":{\"@id\":\"https:\/\/wsj-crypto.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png\",\"datePublished\":\"2024-11-20T21:32:11+00:00\",\"author\":{\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\"},\"breadcrumb\":{\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#breadcrumb\"},\"inLanguage\":\"it-IT\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#primaryimage\",\"url\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png\",\"contentUrl\":\"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png\",\"width\":360,\"height\":140},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wsj-crypto.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum&#8217;s Next Phase\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wsj-crypto.com\/#website\",\"url\":\"https:\/\/wsj-crypto.com\/\",\"name\":\"WSJ-Crypto\",\"description\":\"Just Another Crypto News Website\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wsj-crypto.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"it-IT\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7\",\"name\":\"wsjcrypto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"it-IT\",\"@id\":\"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g\",\"caption\":\"wsjcrypto\"},\"url\":\"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum's Next Phase - WSJ-Crypto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/","og_locale":"it_IT","og_type":"article","og_title":"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum's Next Phase - WSJ-Crypto","og_description":"12 September 2024 Ethereum Open Community Projects L2 Standards Working Group Vitalik Buterin outlined three essential transitions for Ethereum: scaling via L2 rollups to minimize expenses, improving wallet security through smart contract wallets for enhanced safety and user experience, and progressing privacy with privacy-conserving mechanisms. This article examines how the integration of W3C Decentralized Identifiers","og_url":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/","og_site_name":"WSJ-Crypto","article_published_time":"2024-11-20T21:32:11+00:00","og_image":[{"width":360,"height":140,"url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png","type":"image\/png"}],"author":"wsjcrypto","twitter_card":"summary_large_image","twitter_misc":{"Scritto da":"wsjcrypto","Tempo di lettura stimato":"17 minuti"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/","url":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/","name":"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum's Next Phase - WSJ-Crypto","isPartOf":{"@id":"https:\/\/wsj-crypto.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#primaryimage"},"image":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#primaryimage"},"thumbnailUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png","datePublished":"2024-11-20T21:32:11+00:00","author":{"@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7"},"breadcrumb":{"@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#breadcrumb"},"inLanguage":"it-IT","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/"]}]},{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#primaryimage","url":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png","contentUrl":"https:\/\/wsj-crypto.com\/wp-content\/uploads\/2024\/11\/EEALogo360x140.png","width":360,"height":140},{"@type":"BreadcrumbList","@id":"https:\/\/wsj-crypto.com\/index.php\/2024\/11\/20\/uniting-ecosystems-the-role-of-w3c-dids-and-vcs-in-shaping-ethereums-next-phase\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wsj-crypto.com\/"},{"@type":"ListItem","position":2,"name":"Uniting Ecosystems: The Role of W3C DIDs and VCs in Shaping Ethereum&#8217;s Next Phase"}]},{"@type":"WebSite","@id":"https:\/\/wsj-crypto.com\/#website","url":"https:\/\/wsj-crypto.com\/","name":"WSJ-Crypto","description":"Just Another Crypto News Website","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wsj-crypto.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"it-IT"},{"@type":"Person","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/88a93723b30416db1a352d5a0096c4a7","name":"wsjcrypto","image":{"@type":"ImageObject","inLanguage":"it-IT","@id":"https:\/\/wsj-crypto.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/86fe8af82ea089646d6639ca2f87e0243d8688d957bd8e3ec22ec3c457cc16d4?s=96&d=mm&r=g","caption":"wsjcrypto"},"url":"https:\/\/wsj-crypto.com\/index.php\/author\/wsjcrypto\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/5115","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/comments?post=5115"}],"version-history":[{"count":2,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/5115\/revisions"}],"predecessor-version":[{"id":5119,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/posts\/5115\/revisions\/5119"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media\/4783"}],"wp:attachment":[{"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/media?parent=5115"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/categories?post=5115"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wsj-crypto.com\/index.php\/wp-json\/wp\/v2\/tags?post=5115"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}