rubix did v1 · 2020. 11. 5. · rubix did uses real world dfs based on content-based...
TRANSCRIPT
![Page 1: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/1.jpg)
RUBIX DID – Own Your Identity
![Page 2: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/2.jpg)
Self-Signed Identity
Existence — Users have independent existence.
Control — Users control their identities.
Access — Users have access to their own data & control who else can access them
Portability — Information and services about identity are transportable
Consent — Users must agree to the use of their identity.
Minimization — Users can disclose only selected information
![Page 3: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/3.jpg)
Register self-owned identities
Create• Create Unique IDentity (UID) and derive shares using Non-
Linear Secret Sharing (NLSS)
Map• Map any digital information to UID
Prove• Prove ownership of UID by proving ownership of secret
share (ZK proofs)
![Page 4: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/4.jpg)
Verifiable Claims
GET SIGNED BY VERIFIERS BY SUBMITTING VERIFIABLE
PRESENTATIONS
CAN GET MULTIPLE VERIFICATIONS FOR SAME VERIFIABLE CREDENTIALS
USES NLSS BASED CHALLENGE – RESPONSE TO ACHIEVE SELECTIVE DISCLOSURE
VERIFIABLE CREDENTIALS IN JSON/XML FORM
![Page 5: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/5.jpg)
![Page 6: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/6.jpg)
![Page 7: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/7.jpg)
Privacy and Security Features
ULTRA-SCALABLE - < 100ΜS FOR VERIFICATION (MILLIONS OF ASYNCHRONOUSLY PARALLEL
VERIFICATIONS)
PRIVACY & FAIRNESS – SELECTIVE DISCLOSURE WITH TAMPER-PROOF ,
IRREFUTABLE SIGNATURES
KEY RECOVERY BY NLSS SCHEMA KEY DERIVATION & RECOVERY USING BIOMETRICS FOR ADDED SECURITY
![Page 8: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/8.jpg)
RUBIX DID vs Existing models (Everynym, Blockcerts, Microsoft ION...)
RUBIX DID
• Complete layer-1 solution (on-chain scaling)
• Content based addressing (integrity over credentials)
• Instant finality and confirmation
• Independent verification of each transaction
• Millions of parallel updates per second
EXISITING MODELS
• Layer-2 solution built on Bitcoin and/or Ethereum
• Location based addressing (integrity over location of credentials)
• Confirmation dependent on when the transaction is added by layer 1 network
• Transactions are pooled to reduce cost
• Constrained by parent chain scaling
![Page 9: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/9.jpg)
Crucial Security Flaws in Current Models
DID solutions like blockcerts create certificates in json format and push the json file to layer 1 blockchain
The json file sometimes holds URL's of data/credentials of the certificates as value. For example a certificate could be
{
Date issued: 29 Jan 2020
Name : John Doe
Details : www.someurl.com/files/json/125442
}
This data hashed and pushed into blockchain , only protects the integrity of URL www.someurl.com/files/json/125442 . The data inside the URL can be modified, hence does not stand true to its immutability claims
![Page 10: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/10.jpg)
RubiX DID – Data Integrity With On-Chain Scaling
Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data.
Rubix DID credentials build on json structure uses CBA databases to hold integrity over data instead of the location of data. For instance,
{Date : 29 Jan 2020Name : John DoeDetails : QmVBdbYa6GXXtG2JVK2NDkNKsbLeWzDPUdpsLoA5yYvJHu}
The multihash QmVBdbYa6GXXtG2JVK2NDkNKsbLeWzDPUdpsLoA5yYvJHu is the hash of the content, created using distributed CBA database, any change in data will result in hash mismatch.
![Page 11: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/11.jpg)
Interoperability and Open Standards
Built in accordance with DID Standards•W3C Verifiable Claims•W3C Linked Data
Signatures•IMS Open Badges
RFC3339 based Expiration property
(JWT tokens)
Compliance with GDPR , CCPA regulations
API for desktop and web app integration
![Page 12: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/12.jpg)
C O N F I D E N T I A L 12
XSense DID for PII Verification
![Page 13: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/13.jpg)
C O N F I D E N T I A L 13
Privacy: Selective Disclosure
![Page 14: RUBIX DID v1 · 2020. 11. 5. · Rubix DID uses Real world DFS based on Content-Based Addressing(CBA), preserves complete integrity over signed data. Rubix DID credentials build on](https://reader033.vdocuments.us/reader033/viewer/2022060916/60a96f4c55c237353804ed3a/html5/thumbnails/14.jpg)
C O N F I D E N T I A L 14
Internal Trust With DID