Self-Sovereign Identity is a concept that follows the Law of User Control and Consent
Self-Sovereign Identity is also referred to as Self-Sovereign Identity
Self-Sovereign Identity is NOT an Administrative Identity
As with the definition itself, consider these principles a departure point to provoke a discussion about what’s truly important.
These principles attempt to ensure the user control that's at the heart of Self-Sovereign Identity. However, they also recognize that identity can be a double-edged sword — usable for both beneficial and maleficent purposes. Thus, an identity system must balance transparency, fairness, and support of the commons with protection for the individual.
A Self-Sovereign Identity simply makes public and accessible some limited aspects of the “I” that already exists.
They should always be able to refer to it, update it or even hide it. They must be able to choose celebrity or privacy as they prefer. This doesn’t mean that a user controls all of the claims on their identity: other users may make claims about a user, but they should not be central to the identity itself.
This does not mean that a user can necessarily modify all the claims associated with his identity, but it does mean they should be aware of them. It also does not mean that users have equal access to others’ data, only to their own.
The algorithms should be free, Open Source, well-known and as independent as possible of any particular architecture; anyone should be able to examine how they work.
This must not contradict a "right to be forgotten"; a user should be able to dispose of an identity if he wishes and claims should be modified or removed as appropriate over time.
To do this requires a firm separation between an identity and its claims: they can't be tied forever.
Identities must not be held by a singular third-party entity, even if it's a trusted entity that is expected to work in the best interest of the user. The problem is that entities can disappear — and on the Internet, most eventually do.
Regimes may change, users may move to different jurisdictions. Transportable identities ensure that the user remains in control of his identity no matter what, and can also improve an identity’s persistence over time.
Thanks to persistence and autonomy these widely available identities can then become continually available.
However, sharing of data must only occur with the consent of the user. Though other users such as an employer, a credit bureau, or a friend might present claims, the user must still offer consent for them to become valid. Note that this consent might not be interactive, but it must still be deliberate and well-understood.
For example, if only a minimum age is called for, then the exact age should not be disclosed, and if only an age is requested, then the more precise date of birth should not be disclosed.
This principle can be supported with selective disclosure, range proofs, and other zero-knowledge techniques, but non-correlatibility is still a very hard (perhaps impossible) task; the best we can do is to use minimalization to support privacy as best as possible.
To ensure this, identity authentication must occur through independent algorithms that are censorship-resistant and force-resilient and that are run in a decentralized manner.!! Other References of Interest
Somebody who is able to give a key back when it’s lost. Ideally, we SHOULD be able to choose which Identity Custodian to use and switch as often as wanted. Most if not all of the Self-Sovereign Identity systems do not currently allow.We also need different custodians for holding identity data and holding a key in escrow, to ensure segregation of responsibilities, and to reduce risk of exposure. However, there are several fundamental challenges with using custodians:
First is access to a user’s private key, which must be high-friction. It should not be possible for a rogue employee of an identity custodian to get access to your private key. But it must be possible, with your involvement, to recover the key. High friction and convenience do not go hand-in-hand.
How do you prove who you are… when you cannot prove who you are? The key recovery must handle the situation that you have forgotten the key entirely and have no possessions that can help. The third challenge is building a key recovery system in such a way that it is secure, cost-efficient and usable. No system will be 100% secure, but due to the importance of keeping private keys private, a high level of security is a must.