0% found this document useful (0 votes)
132 views27 pages

The European Union Blockchain Observatory & Forum The European Union Blockchain Observatory and Forum

This document discusses how blockchain technology can be used to implement decentralized digital identities. It defines digital identity and outlines problems with the current centralized system. Decentralized identities put the user in control of their identity and credentials. The report also examines how decentralized identities could work in the EU regulatory context and provides recommendations.

Uploaded by

Franciele Moura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views27 pages

The European Union Blockchain Observatory & Forum The European Union Blockchain Observatory and Forum

This document discusses how blockchain technology can be used to implement decentralized digital identities. It defines digital identity and outlines problems with the current centralized system. Decentralized identities put the user in control of their identity and credentials. The report also examines how decentralized identities could work in the EU regulatory context and provides recommendations.

Uploaded by

Franciele Moura
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 27

BLOCKCHAIN

BLOCKCHAIN
Thematic Report Blockchain and digital identity

FOR
AND DIGITAL
GOVERNMENT
IDENTIT Y
AND PUBLIC
SERVICES

a
a thematic
thematic report
report prepared
prepared by
by
THE
THE EUROPEAN
EUROPEAN UNION
UNION BLOCKCHAIN
BLOCKCHAIN
OBSERVATORY
OBSERVATORY & FORUM
AND FORUM

An initiative of the
1 An initiative of the
Thematic Report Blockchain and digital identity

About this report


The European Union Blockchain Observatory & Forum has set as one of its objectives
the analysis of and reporting on a wide range of important blockchain themes, driven
by the priorities of the European Commission and based on input from its Working
Groups and other stakeholders. As part of this it will publish a series of thematic
reports on selected blockchain-related topics. The objective of these thematic reports
is to provide a concise, easily readable overview and exploration of each theme
suitable for the general public. The input of a number of different stakeholders and
sources is considered for each report. For this paper, these include:

• Members of the Observatory & Forum’s Working Groups.


• “Government services and digital identity“ by Dr Allan Third, Dr Kevin Quick,
Mrs Michelle Bachler and Prof. John Domingue – an academic research paper
prepared by the Knowledge Media Institute of the Open University, an academic
partner of the EU Blockchain Observatory & Forum.
• Input from participants at the “Blockchain and e-identity“ workshop held in
Brussels on 7 November 2018.
• Input from the Secretariat of the EU Blockchain Observatory & Forum (which
includes members of the DG CONNECT of the European Commission and
members of ConsenSys).

CREDITS DISCLAIMER
This report has been produced by ConsenSys The information and views set out in this
AG on behalf of the European Union publication are those of the author(s) and do
Blockchain Observatory & Forum. not necessarily reflect the official opinion of
the European Commission. The Commission
Written by: Tom Lyons, Ludovic Courcelas, does not guarantee the accuracy of the data
Ken Timsit included in this study. Neither the Commission
Thematic Report Series Editor: Tom Lyons nor any person acting on the Commission’s
Workshop moderator: Susan Poole behalf may be held responsible for the use
Report design: Benjamin Calméjane which may be made of the information
contained therein.
v1.0 - Published on 2 May 2019.

2
Thematic Report Blockchain and digital identity

ACKNOWLEDGEMENTS NOTE
The authors would like to expressly While we have done our best to incorporate the
acknowledge the following for their direct comments and suggestions of our contributors
contributions and feedback to this paper: where appropriate and feasible, all mistakes
and omissions are the sole responsibility of the
Observatory Working Group Members: authors of this paper.
• Ivona Skultétyová
• Philipp Sandner
• Daniël Du Seuil
• Konstantinos Votis
• Jolanda ter Maten
• Javier Sebastian Cermeño
• David Suomalainen
• Leïla Nassiri-Jamet

Reviewers:
• Pelle Braendgaard
• Julian Hosp
• Jamie Burke
• Christian Lundkvist
• Oscar Burgos

Identity Workshop Panelists:


• Oliver Terbu
• Rouven Heck
• Carlos Pastor
• Luca Boldrin
• Patrick Curry
• Ronny Bjones
• Kai Wagner
• Elizabeth Renieris
• Catherine Mulligan
• Hitesh Tewari
• William Skannerup

3
Thematic Report Blockchain and digital identity

Contents

5 Executive summary

8 Introduction: Digital identity and its discontents


What is wrong with digital identity today?

What is decentralised identity, and how can it help?


8
10

12 Towards a decentralised identity framework


How do we define digital identity?

Decentralised identities – putting the user at the centre


12
12
Self-sovereign identity – giving the user full control 14
What do we need to implement decentralised identity? 14
Blockchain and decentralised identity 16

17 Decentralised identity in action


Scenario: Electric car subsidy
Scenario: Diplomas online
17
17
Case Study: Konfido 18

19 Decentralised identity and the European regulatory


landscape
Identity and the GDPR 19
eIDAS: A pan-European national identity standard 19
eIDAS and blockchain 21

22 Recommendations

23
Appendix

4
Thematic Report Blockchain and digital identity

Executive summary
There are few things more central to a functioning society and economy
than identity. Without a way to identify each other and our possessions
we would hardly be able to build large nations or create global markets.
Unfortunately, there are persistent – and increasingly serious –
problems with the way digital identity works. For historical and other
reasons, the digital identity experience today is fragmented, with few
standards or interoperability, and it is insecure, as the almost daily reports
of hacks and data breaches reminds us. For individuals, but also for
businesses and governments, the status quo is becoming less and less
tenable.

Many see the problem in the haphazard evolution and “centralised”


nature of the current digital identity framework. Centralised here does
not mean that there is one, central source for digital identities, but rather
that digital identities are almost always provided by some third-party
authority (often a private company) for a specific purpose of its own. The
identity information is “centralised” within that entity.

Thanks to a combination of technological advances, including the
increasing sophistication of smartphones, advances in cryptography
and the advent of the blockchain, it is now possible to build new
identity frameworks based on the concept of decentralised identities
– potentially including an interesting subset of decentralised identity
known as self-sovereign identity (SSI). Explaining what these concepts
are, and how they might work in the European context, is the subject we
address in this paper.

We start by defining exactly what identity is in an online context, showing
that our digital identity is not a single thing, but rather the sum total of
all the attributes that exist about us in the digital realm – a constantly
growing and evolving collection of data points.

Under the current digital identity framework, these data are generally
under the control of entities external to the individual they refer to.
In the decentralised identity paradigm, the idea is to put the user
at the centre of the framework and so remove the need for these
third parties. In this world, the user “creates” his or her own identity,
generally by creating his or her own unique identifier (or a number
of them), and then attaching identity information to that identifier.
By associating verifiable credentials from recognised authorities, for

5
Thematic Report Blockchain and digital identity

EXECUTIVE SUMMARY

instance governments, users can in effect create the digital equivalents


of physical world credentials like national IDs and driving licences.
Since these are digital, they will, however, be more flexible and easier to
manage than their physical counterparts.

By setting up a system in which the user controls not just the identity but
also the data associated with it, we can create what are known as self-
sovereign identities (SSI). In an SSI approach, the user has both a means
of generating and controlling unique identifiers as well as some facility
to store identity data. Users are then free to make use of whatever
identity data they like. These could be verifiable credentials, but could
also be data from a social media account, a history of transactions on an
e-commerce site, or attestations from friends or colleagues. There really is
no limit.

This ability to collect and make use of identity from a broad set of
sources can help users create rich and varied sets of digital identities for
themselves. It also allows them much finer control than they have today
over what personal information they share in which contexts. It could
even open the door to new business models, potentially allowing users to
monetise their personal data should they wish to do so.

While these are intriguing ideas, making them work will be a daunting
technological challenge. We take a high-level look at what would
be necessary to implement a decentralised identity framework.
This includes mechanisms to allow individuals to create their own
identities, often referred as Decentralised Identifiers (DIDs), as well as
means to store personal data, for example in personal data lockers or
identity hubs. We will also need digital “wallets” or other user agents to
allow people to manage and use their identities.

While blockchain is not required for decentralised identity, it can be
a powerful solution for different aspects of the decentralised identify
framework. This includes supporting the creation and registering of
DIDs, notarising credentials, providing a decentralised infrastructure
for access control and data use consent, and potentially linking
credentials to smart contracts to, for example, trigger automatic
payments. To illustrate how this might work, we describe a number of
“scenarios” as well as present a case study of how blockchain may be used
in digital identity.

We then take a look at the European regulatory landscape as it pertains
to digital identity. Perhaps the most important regulation dealing

6
Thematic Report Blockchain and digital identity

EXECUTIVE SUMMARY

with identity in the EU is the electronic IDentification, Authentication


and Trust Services regulation (eIDAS). This regulation will have a deep
impact on the decentralised identity framework, above all as it pertains to
government-issued identity credentials, and so we take a closer look at it.

We also examine how eIDAS touches identity on the blockchain. As fully
digital ledgers, blockchains are by definition electronic documents under
eIDAS. That means that blockchains, or more properly the data, including
smart contracts, contained in them, cannot be denied legal force, at least
not solely because of their electronic nature. Blockchains, we find, might
also be useful for timestamping in an eIDAS-conform way, and we ask if
perhaps blockchain-based transactions can be considered to be digitally
signed under eIDAS (and if so, under what level of signature).

Our exploration ends with a few thoughts on what policy makers might
do to foster the decentralised identity landscape in Europe. Chief among
these is to clarify the open regulatory questions, in particular around
the standing of blockchain-based signatures and timestamps under
eIDAS. We also think the EU could help bootstrap the decentralised
digital identity framework though educating government agencies and
encouraging them to get involved in building it out, for example as issuers
of verifiable credentials.

That Europe is looking seriously at decentralised identity and SSI, through
for example the work on the European Blockchain Services Infrastructure,
is, we think, a good sign that these concepts are taking hold in the Union.
That bodes well for a more usable, secure and fair digital identity future.

7
Thematic Report Blockchain and digital identity

Introduction: Digital identity and


its discontents

WHAT IS WRONG WITH DIGITAL IDENTITY TODAY?


There are few things more central to a functioning society and economy
than identity. Without a way to identify each other and our possessions
we would hardly be able to build large nations or create global markets.

Yet the larger and more complex a society or market is, the more difficult
identity becomes. In the physical world, we have developed various ways
to deal with this, usually involving some kind of “proof” of identity claims,
from wax seals and letters of introduction in pre-industrial times to the
passports, driving licences and diplomas we are familiar with today.

To create a digital economy, we need to have similar kinds of proofs, or


“credentials”, in the digital world. These too have been developed over
the years, starting with simple digital representations of our physical,
paper-based documents and moving on to more sophisticated means of
digital identification like digital certificates, e-signatures, private/public
key cryptography and hashing – methods that can help uniquely identify
a piece of digital data (for example a digital document) and “prove”
ownership of it.

Despite these useful building blocks, there are persistent – and


increasingly serious – problems with the way digital identity works today.
Most of these problems are not related to technology, but to processes.

One problem is that the current digital identity landscape is extremely


fragmented. Surfing the web requires users to juggle all the different
identities associated with their usernames or other aliases, most of
which are not strongly related to their real identities. This experience is
not fluid nor, unless there is a partnership between them, is there any
standard way to use the data generated by one platform on another. In
an ideal world, users could directly add the latest music videos viewed
on YouTube to their Spotify playlists without using an outside service, by
connecting only once, all the while maintaining control of their data. We
are far from such an ideal.

8
Thematic Report Blockchain and digital identity

INTRODUCTION: DIGITAL IDENTITY AND ITS DISCONTENTS

Another serious problem is that identity-related data is not secure. We


have become accustomed to the almost daily notices of data breaches
revealing sensitive user data en masse to hackers and criminals, to the
ease with which scammers can create fraudulent identities and use them
to commit theft, including stealing identities from others, and to the
complete lack of control we have over our personal data – data that we,
knowingly or unknowingly, create when we are online, and which can be
and is used to profile us, earn money on us, and potentially influence our
opinions.

Nor is it only individuals who struggle with the shortcomings of the


current digital identity regime. Businesses are faced with massive cost
and complexity, not to mention regulatory and other risks, in both
trying to secure and protect user data and in verifying the identities of
the counterparties they deal with online, whether they be customers,
suppliers, partners or competitors.

Governments too have reason to wish for improvements in the way


digital identity is handled. Whether to correctly identify citizens in order
to provide them with government-issued credentials (who is a citizen,
who not), to correctly disburse benefits, to make possible electronic
voting, or to combat crimes like terrorist financing or money laundering,
governments rely heavily on digital identities. They will want these to
be reliable. As custodians of the well-being of their citizens, businesses,
markets and economies, they also have an interest in ensuring society has
access to a viable, easy-to-use digital identity framework.

A third problem is that under the current identity regime there is


often a weak link between digital and “offline” identities. That makes
it relatively easy to create false identities. For businesses, this weak link
creates fertile ground for the phenomena of false views, false “likes”, and
false comments, which can help in the perpetration of fraud and lead
to lost revenue. For society, this weak link facilitates the creation and
dissemination of evils like “fake news”, and so poses a potential threat to
the smooth running of democracy.

9
Thematic Report Blockchain and digital identity

INTRODUCTION: DIGITAL IDENTITY AND ITS DISCONTENTS

WHAT IS DECENTRALISED IDENTITY, AND HOW CAN IT


HELP?
There are many reasons for this current state of affairs. Some of these are
technical, having to do for instance with the anonymous nature of digital
communications or the ease with which digital data can be duplicated or
falsified.

Most of these technical problems can and are being solved, however. For
many observers, the main problem with digital identity today is that it is
to a great extent “centralised”.

This does not mean that there is one, central source for digital identities,
but rather that digital identities are almost always provided by some
third-party authority (often a private company) for a specific purpose of its
own. This may be because providing identity is its business, as is the case
for example with certificate authorities, or because it is necessary in order
to provide an online service, as is the case with a bank or a social media
company. Whatever the specific situation, in the current paradigm user
identity information is “centralised” on the servers of the issuing entity.

Thanks to a combination of advances in hardware, including the


increasing sophistication of smartphones, as well as advances in
cryptography and the advent of the blockchain, it is now possible to build
new identity frameworks based on the concept of decentralised identities
– potentially including an interesting subset of decentralised identity
known as self-sovereign identity (SSI).

In a nutshell, decentralised identities are digital identities that are created


by an individual and remain under his or her control. By attaching trusted
information (credentials) from authoritative sources to these identities,
the individual can create trust in the claims he or she makes about his or
her identity, while still maintaining that control.

How that might work in a European context, both technically and from
a regulatory point of view, is the subject of the rest of this paper. We also
look at the subject through the lens of blockchain technology, showing
how blockchain might be employed in a future decentralised identity
framework, as well as how decentralised identity can be an enabler of
important blockchain use cases.

10
Thematic Report Blockchain and digital identity

INTRODUCTION: DIGITAL IDENTITY AND ITS DISCONTENTS

As is to be expected with a new technology, there are many different


philosophies and approaches to decentralised identity. Instead of picking
one, we have tried to paint a broad, easily understandable picture based –
as best as we could ascertain them – on the basic principles that underlie
most approaches. In doing so it is possible that we have oversimplified
in places, or, worse, not done justice to all viewpoints. This is of course
unintentional.

It is an interesting time for the digital identity industry, a moment when


many strands seem to be coming together to create something new.
We believe that, in an increasingly complex world in which people
increasingly mistrust data, viable, decentralised digital identities may be
not just a novel technological development, but also an important one.

11
Thematic Report Blockchain and digital identity

Towards a decentralised identity


framework

HOW DO WE DEFINE DIGITAL passport or driving licences, and these are


certainly important too.

IDENTITY? There are other social identifiers, like our family


relationships, our circle of friends, our tastes in
Before we can discuss decentralised identity, food and clothing, or our hobbies. The history
it is helpful to be clear about what we mean of our transactions – what we have bought and
by digital identity.1 The question is not as sold, and how much we paid or received – is
straightforward as it seems. an important part of our identity too. So is the
history of where we go and what we do during
Consider the fact that, while we all like to think the day, as well as the record of what other
we know who we are, when others identify us, people think of us (that is, our reputation).
they do not have access to our core sense of
ourselves. Instead, they need to rely on various The list could go on and on. The key things to
kinds of information that is either supplied to remember are that digital identity is atomic in
them or that they are able to discover – our nature: based on discrete bits of information
name, for instance, or what our face looks like, related to us. And that it can be cumulative: an
or what others say about us. identity attribute can and often is a collection
of other attributes.
In the digital identity world, a discrete piece
of information attached to someone’s or When we think of digital identity we therefore
something’s identity is referred to as an need to see it not as a single thing. It is rather
“identity attribute”. There is a practically the sum total of all the attributes that exist
limitless potential number of such attributes. about us in the digital realm, a constantly
growing and evolving collection of data points.
There are for instance intrinsic “biometric”
identity attributes, like our gender, what we
look like, our fingerprints, our voice patterns,
the way we use a keyboard or walk through a
DECENTRALISED IDENTITIES –
room. There are also important social identity
attributes, like our name, date of birth, current
PUTTING THE USER AT THE CENTRE
address or marital status. Many of us, when
In the centralised identity paradigm we
thinking about identity, think in terms of
discussed above, a person’s identity is provided
“official” identity attributes given to us by our
by some outside entity. In the decentralised
governments, like our national ID number or
identity paradigm we now want to explore,
the goal is to put the user at the centre of the
1  For the purposes of this paper, when we are talking about identity, we mean
identity in a digital context. The question of what our identity is as human beings, framework and so remove the need for third
what it means and what constitutes it is beyond the scope of this discussion.

12
Thematic Report Blockchain and digital identity

TOWARDS A DECENTRALISED IDENTITY FRAMEWORK

parties to issue and administer identity.


Verifiable credentials play a key role in a
This can be achieved by putting as much decentralised identity framework. In essence,
of the identity infrastructure as possible they are like digital versions of the physical
in the user’s hands and otherwise relying credentials we carry around with us, such as
on trustworthy decentralised methods, for our passports or driving licences, though with
example cryptographic algorithms that can additional properties made possible by their
produce mathematical proofs of the veracity of digital nature.
information without the need for a third-party
authority. There are many advantages to using
decentralised identities and verifiable
In the decentralised identity world, users create credentials. Not only does it give the user much
their own digital identities. This usually starts more control over his or her identity, it also
with a user creating his or her own unique makes online identity much easier to use.
identifier or identifiers, and then attaching
information to that identifier in a way that Once issued, a decentralised credential can be
makes it possible to prove it is genuine. easily employed on multiple websites. Gone
will be the days of constantly signing up for
Once this is done, the user can collect accounts and re-entering the same information
credentials from trusted authorities and over and over again. And if the credential
produce them as needed. changes, for instance if the user moves house,
this change too need only be registered once.
A typical use would be for a user to collect
credentials from the government, for example Decentralised identities should also, at least
that he or she is a citizen, or has a certain in theory, be safer than centralised ones,
national ID number or lives at a certain address. if only for the simple reason that the user
When it comes time to make a claim, for keeps the identity with him or herself. The flip
example that he or she has the right to vote side of course is that the user also assumes
in an election or is old enough to purchase responsibility for the identity data. For many,
alcohol, the user can then simply present the the tradeoff will be worth it.
appropriate credential.
Decentralised identity is not only something to
Thanks to various cryptographic techniques, appeal to end users, however. It could also be a
like digital signatures, it is possible to obtain boon to businesses, which would no longer be
strong proof that the credential is genuine solely responsible for the identity infrastructure.
(that is, actually issued by the named authority This can reduce both cost and risk.
and not tampered with since) and that the
person who presents it is indeed the person That said, while the decentralised identity
being referred to. approach as described so far puts the user at
the centre of the identity framework, it is still to
Many people today use the term verifiable a large extent reliant on data provided by third
credentials (VCs) to refer to digital credentials parties.
that come with such cryptographic proofs.

13
Thematic Report Blockchain and digital identity

TOWARDS A DECENTRALISED IDENTITY FRAMEWORK

Digital driving licences and voter registration or an attestation for anyone else (though
cards still have to be issued by a central these will naturally carry different levels of
authority. Like their physical counterparts, they trustworthiness depending on the nature of
remain under that authority’s ultimate control the source).
(the state can issue a driving licence, and can
also revoke it). In SSI, users have much finer control over
how much data they share and with whom.
For many use cases involving decentralised This makes it easy to create different digital
identity, relying on authorities to issue verified identities for different contexts, based on
credentials that can be associated with a different sets of credentials or identity
user-generated identifier would not only be attributes. You may have one digital identity
acceptable, it would be desirable. Today’s for your healthcare provider, one for your
technology, however, lets us do more. professional networking site, and one for your
social media site. Each of these would present
a different “you” to the online world, and in a
SELF-SOVEREIGN IDENTITY – way that you determine.

GIVING THE USER FULL CONTROL SSI could also make it possible for individuals
to monetise their personal data, for example
It is possible to take decentralised identity a by renting it to AI training algorithms or selling
step further by giving users control not just of it to advertisers if they so choose. SSI can also
their identifiers but also of the data associated make it easier to provide consent to third
with them. This is at the heart of what is known parties to use personal data and, importantly,
as self-sovereign identity (SSI). to revoke that consent.

In an SSI approach, the user has both a means Last but not least, because it’s a completely
of generating and controlling unique identifiers user-managed and controlled identity, SSI
as well as some facility to store identity data. can not be taken away from a person by any
This could be verifiable credentials as described authority. For many, this is its most appealing
above. But it could also be data from a social characteristic.
media account, a history of transactions on an
e-commerce site, or attestations from friends
or colleagues. There really is no limit to the kind WHAT DO WE NEED TO IMPLEMENT
of identity information that might be collected
and put to use. DECENTRALISED IDENTITY?
This in turn can open up a number of There are different ways to implement
interesting new possibilities. decentralised identity. All approaches, however,
will have to solve a similar set of problems,
For instance, it can greatly expand the number most of which have to do with finding ways of
and kinds of sources of identity data that can ensuring trust in information without recourse
be collected. In the SSI world, anyone with a to some authority.
decentralised identity can issue a credential

14
Thematic Report Blockchain and digital identity

TOWARDS A DECENTRALISED IDENTITY FRAMEWORK

user’s choice. Such private identity stores


To get an idea of how this can work in a are variously referred to as identity hubs
decentralised identity context, we can think in or personal data lockers. When solely
terms of the following basic capabilities. under the control of the user, identities
are considered self-sovereign. This in turn
• A unique identifier: To make a means the user can both fully control
decentralised identity framework access to the data and not worry about
possible you need to have some basic, access being revoked. Having data under
unique identifier that can be used in a the user’s control also makes it more
decentralised way. These are often referred interoperable, allowing the user to employ
to as decentralised identifiers (DIDs). data on multiple platforms and for different
Unlike most identifiers provided by the purposes, and protecting the user from
authority issuing the identity, DIDs are being locked into one platform.
created by the user (which could be a • Appropriate security measures: In
person, an organisation or even a machine). centralised identity systems the entity
This identifier has a public part and an providing the identity is generally
associated secret part, which is under responsible for the security of the identity
the control of the person or entity that data. In a decentralised identity framework,
created the DID, and can be used to prove security becomes the responsibility of the
“ownership” of that DID. This is important, user, who may decide to implement his or
among other things, because it creates a her own security measures or outsource the
strong link between the identifier and the task to some service like a digital bank vault
underlying data. Important here is also or a password-manager like app. While this
the fact that a person or entity can create puts an added burden and responsibility
as many DIDs as needed for whatever on the user, it also gives the user freedom
purpose. to employ whatever security measures he
• The actual content or data: In a or she deems fit. Decentralised identity also
decentralised identity framework we makes life harder for hackers, forcing them
will need to transfer data in a way that is to attack data stores individually, a costly
understandable and usable by any system. and not necessarily lucrative undertaking.
This standardisation effort could take the (Large, centralised systems with millions
form of verifiable credentials, where an of user accounts are far more appealing
issuer produces and signs a credential for targets.)
a user that is later able to present it to a • An interface: To implement decentralised
verifier. JSON and some of its specialised identity, users will need a means to create
versions is currently the most widely used and then use their DIDs. These can take
standard for identity-related data. the form of digital “wallets”, typically on a
• The ability to store data: Storage is one user’s phone, or other kinds of user agents.
of the core functions in relation to identity As with all other aspects of decentralised
data. In a decentralised framework, identity, the essential element here is that
credentials are usually stored directly on the wallet, and access to it, is under the
the user’s device (e.g. smartphone, laptop) user’s sole control.
or securely held by third parties of the

15
Thematic Report Blockchain and digital identity

TOWARDS A DECENTRALISED IDENTITY FRAMEWORK

BLOCKCHAIN AND DECENTRALISED student with both a timestamp of when


the diploma was issued as well as a way

IDENTITY to prove at any time in the future that the


diploma being presented is the one that
was registered at that time.
While blockchain is not required for • Access rights and consent. Blockchains
decentralised identity, it can be a powerful can be used as a shared ledger to record
solution for different aspects of the the access rights to information. For
decentralised identify framework. It provides a example, a user can agree to share certain
ready-made infrastructure for managing data information with a social media platform
in a decentralised but trustworthy way. This can but only for a limited amount of time. This
help mitigate the use of trusted third parties consent can be recorded as a transaction
or provide censorship resistance in certain on the blockchain along with its expiry
circumstances. date. The social media company would
then have to delete the information at the
We can imagine several potential uses for expiry date and put proof of that deletion
blockchain in SSI contexts, including: on the blockchain.
• Facilitating smart contract execution.
• Creation of DIDs. Blockchain addresses In a fully integrated scheme, having links
make for great DIDs. These are unique, between credentials and the blockchain
generated by the user him- or herself can allow easy smart contract interactions
and already leverage public/private key such as triggering on-chain payments.
cryptography.
• Using the blockchain as a DID registry.
Blockchains could also be used as DID
registries, which are databases where you
store information about who is related to
specific IDs and how to access information
about them (server end-points).
• Notarising credentials. By putting their
hashes on the blockchain, we can “notarise”
credentials. This doesn’t mean storing the
credentials on the blockchain, which is
generally not recommended and likely runs
afoul of regulations like the GDPR. Instead
it acts as a timestamp and electronic
seal. This both provides proof of when the
credential was created, as well as “seals”
that credential by making any tampering of
the credential evident to outside observers.
For example, a university might send the
hash of a diploma to the blockchain at
the time of graduation. This provides the

16
Thematic Report Blockchain and digital identity

Decentralised identity in action


In this section, we illustrate the potential credentials needed to answer the challenge.
and current uses of decentralised identity in In this case the presentation is an aggregation
solutions that leverage blockchain technology. of verifiable credentials about the individual
plus the electric car company’s credential tied
to that individual. In addition, the individual’s
SCENARIO: ELECTRIC CAR SUBSIDY on-chain payment address (similar to bank
information) is attached for later payment. This
In this example,1 a user who buys an electric information is sent to the government agency,
car from an electric car company wants to which can then be confident in the veracity of
take advantage of a government subsidy the information and also can check internally
programme for electric vehicles. The challenge to be sure the individual has not already
is to prove to the government agency handling received a subsidy.
subsidies that the user has actually purchased
an electric car and when. If all checks out, the agency issues a credential
that the individual is eligible and a payment is
Before anything else, the individual approaches triggered directly by a smart contract.
the car company, which is the credential issuer
for the purchase, and requests it to issue a
verifiable credential associated with a DID
identifying the purchaser and which confirms
SCENARIO: DIPLOMAS ONLINE2
the purchase. This is signed by the car company Educational credentials like diplomas are very
and transferred to the storage chosen by the important for our careers. They are also among
individual. the longer lasting of credentials, expected to
be usable for a lifetime. In the physical world
The individual then logs into the government producing a diploma means contacting
website and informs it that he or she wants the issuing entity and going through a long
to prove they have bought this car. The and often expensive process of proving your
government agency then sends a challenge to identity, requesting an official copy of the
the user agent (wallet) asking for proof that the diploma, and then waiting for it to be sent.
individual is entitled.
Issuing a diploma online as a verifiable
The user then receives a notification in his or credential can greatly streamline this process,
her wallet asking if he or she wants to share as a digital copy of the diploma can be signed
this information with the agency. In this case with a private key generated by the issuing
the individual agrees. entity (e.g. university) and then presented
by the user when needed (e.g. during a
The wallet then creates a verifiable recruitment process).
presentation – an aggregation of verifiable
The blockchain can be used as a shared registry
1  Note that this is a prospective scenario invented for this paper. It showcases
what could exist five to ten years from now. 2  Adapted from the W3C use case as described here.

17
Thematic Report Blockchain and digital identity

DECENTRALISED IDENTITY IN ACTION

that holds a record of valid keys used by stored actions of the Blockchain network using
universities. If the university changes its keys, it an explorer. All the users can search for the
will register the change on the ledger, allowing actions, but only the sender and the receiver
verifiers to process the diploma at any point in of the action can decrypt the logs with their
time. This holds true even if the issuing entity private keys and read them.
is no longer in existence as the record will still
exist on-chain. In this example, we have used blockchain
for digital identity in the sense of having
users prove things about themselves. In this
CASE STUDY: KONFIDO particular case, only the NCPs whose public/
private key pairs match with the ones stored in
For a slightly more technical view, we take an the blockchain are able to decrypt and see the
example of this in action by looking at a current content of the audit logs.
implementation.

Konfido is a project to create a secure and


trusted paradigm for eHealth services in
the EU, funded under the Horizon2020
programme.3

In Konfido there is a need for a privacy-


preserving, cross-border exchange of health
data. The challenge is to store the actions
during a cross-border healthcare data
exchange in an immutable and privacy-
preserving way so that only involved
stakeholders can search and retrieve the stored
actions. To this end, blockchain is used due to
its property to store logs of actions in a tamper-
proof way.

In a typical transaction a doctor in Country A,


say Spain, requests the Patient Summary of
a Patient residing in Country B, say Denmark.
The Patient Summary is returned back to the
doctor. This action is then logged, and the
audit log is filtered, transformed and stored
in a blockchain federated network of nodes
encrypted with a symmetric key.

Senders and receivers can search for the

3  https://konfido-project.eu/

18
Thematic Report Blockchain and digital identity

Decentralised identity and the


European regulatory landscape
While technical developments and standards limitation and storage limitation. It will also
are obviously important to implementing a have to deal with many of the rights that data
new digital identity framework, as with so subjects have under the GDPR, among them
many other aspects of technology, the legal the well-known right to erasure (right to be
and regulatory issues will be as important. This forgotten), right of access and rights related to
is certainly the case in the identity space, which the automated processing of data. The GDPR
touches on so many key aspects of our personal also lays down clear responsibilities for data
and economic lives. controllers and processors that will certainly
need to be taken into account as well.
While identity touches the legal and
regulatory landscape in many areas, on the
EU level there are two regulatory regimes EIDAS: A PAN-EUROPEAN NATIONAL
that are particularly important: the General
Data Protection Regulation (GDPR) and the IDENTITY STANDARD
electronic IDentification, Authentication and
trust Services regulation (eIDAS). Perhaps the most important regulation dealing
with identity in the EU is the EU Regulation
910/2014 of 23 July 2014 on electronic
IDENTITY AND THE GDPR identification, an EU regulation and a set of
standards for electronic identification and
As we have described in a separate paper,1 the trust services for electronic transactions in the
General Data Protection Regulation (GDPR) European Single Market. Better known as the
lays down rules relating to the protection of electronic IDentification, Authentication and
natural persons with regard to the processing trust Services regulation (eIDAS), this regulation
of personal data and rules relating to the free will have a deep impact on the decentralised
movement of personal data. identity framework, above all as it pertains to
government-issued identity credentials, and so
Since almost by definition identity information is worth a closer look.
is personal data, GDPR is highly relevant for
the subject of digital identity. Any large-scale The eIDAS regulation was born out of the
identity framework will therefore have to take Electronic Signatures Directive of 1999, which
account of its provisions. it supersedes. That directive, which was
intended to provide a legal framework for the
Depending on how it is designed, there are recognition of digital signatures across the
many areas of potential tension. An identity European Union, was meant to facilitate cross-
framework will need to work within such border electronic transactions through the use
GDPR principles as data minimisation, purpose of electronic signatures throughout the Union.

1  Blockchain and the GDPR, EU Blockchain Observatory and Forum.

19
Thematic Report Blockchain and digital identity

DECENTRALISED IDENTITY AND THE EUROPEAN REGULATORY LANDSCAPE

Unfortunately, for various reasons – including To implement this, eIDAS establishes a number
the fact that, as a directive and not a regulation, of core principles binding on Member States,
it left discretion over implementation into local including the principle that Member States
law in the hands of Member States, leading to will cooperate on eIDs and trust services and
a fractured, non-interoperable set of standards that citizens of one Member State can use their
– it fell short of its ambitions.2 As a binding digital IDs obtained in one country in another
regulation, eIDAS is mandatory for Member country, including to obtain government
States and so will be applied uniformly. services.

The purpose of eIDAS is to support the digital As long as they provide the same functionality,
single market by providing a predictable then Member States are free to introduce
legal framework to e-signatures, improving whatever means they see fit for national eIDs.
on previous legislation, and what it refers to To ensure interoperability, each Member State
as trust services. These are ancillary services operates an eIDAS node, which allows for the
crucial to digital transactions that have not trusted transfer of this ID Information.
been standardised on an EU level in the past.
The eIDAS package includes: The regulation also sets the framework for
providing other kinds of trusted information
• eID: A way for businesses and consumers to by requiring Member States to set up lists of
prove their identity electronically. qualified trust service providers (TSPs) that
• eTimestamp: Electronic proof that a set of can provide such services as verification of
data existed at a specific time. eSignatures and eSeals and the issuing of
• eSignature: Expression in an electronic certificates.
format of a person’s agreement to the
content of a document. eIDAS recognises This setup is intended to make things easier
three levels of eSIgnatures: Simple, for EU citizens and businesses in various digital
Advanced and Qualified. realms. It will make it much easier for EU
• eSeal: Guarantees both the origin and the citizens from one Member State when they
integrity of a document. move to another Member State, as they can
• Qualified Web Authentication Certificate: use their already existing national ID. It will
Ensures websites are trustworthy and make it easier for businesses to transact with
reliable. each other digitally by, for example, creating
• Electronic Registered Delivery Service: trust in electronic documents and electronic
Protects against the risk of loss, theft, signatures on contracts. And it will add trust
damage or alterations when sending to the digital market in general by making it
documentation. easier to identify people, organisations and
• Legal recognition of electronic documents, and for these identifications to
documents: Assurance that an electronic have legal force.
document can not be rejected by the court
for the reason that it is electronic.

2  See “Learning from History: The Origins of eIDAS”, by Marshall Nam, Docu-
sign Blog, 9 June, 2016.

20
Thematic Report Blockchain and digital identity

DECENTRALISED IDENTITY AND THE EUROPEAN REGULATORY LANDSCAPE

EIDAS AND BLOCKCHAIN


eIDAS touches blockchain at different levels.
As fully digital ledgers, blockchains are by
definition electronic documents under
eIDAS. That means, among other things,
that blockchains, or more properly the data,
including smart contracts, contained therein,
cannot be denied legal force solely because of
their electronic nature.

Blockchains might also be useful for


timestamping in an eIDAS-conforming way.
Today only trust service providers have the
ability to issue timestamps that have legal
force. Yet blockchains can provide a high level
of trust in a timestamped piece of information.
They could therefore be a way to create eIDAS-
conforming timestamps in a decentralised way
without needing a trust service provider.

Something similar happens with eSignatures


and eSeals. Transactions in a blockchain
are generally immutable once triggered. So
the question is, can these transactions be
considered to be signed under eIDAS, which
is most likely the case, and if so, under what
level of signature? As with the timestamp, it
might be possible to consider a transaction
on a blockchain to have the highest level of
eSignature, that of a Qualified Signature, also
in a decentralised way without the use of a
trusted service provider to verify it.

21
Thematic Report Blockchain and digital identity

Recommendations

As we have seen, digital identity is a key pre- keys and addresses, and the degree to which
requisite for the digital single market and certain kinds of obfuscation methods might
hence should be a priority of policy makers. take this data outside the scope of GDPR (by
We have advocated for a decentralised making it sufficiently “anonymised”).
identity framework in Europe. In our opinion,
a decentralised identity framework in Europe 4. Clarify other potential regulatory issues.
could be supported in the following ways. We ask for legal clarification on the reuse of
issued credentials outside of their original
1. Support the role of government as an issuer regulatory environments, such as for example
of verifiable credentials. credentials subject to the Fifth AML Directive
Clearly the government can and will play (AMLD5), the Revised Payment Services
an important role as an issuer of verifiable Directive (PSD2), and eIDAS to enable
credentials. The EU could support the use of horizontal comparability of credentials.
such credentials by educating and encouraging
government agencies on decentralised identity 5. Continue the work of exploring a European
and their role as issuers. The potential benefits Self-Sovereign Identity framework as
for citizens and companies are huge, both part of the European Blockchain Services
in terms of saving costs and speeding up Infrastructure (EBSI).
processes. As the EU develops blockchain standards
under the EBSI, it should look to ensure that
2. Clarify the relation of blockchains to eIDAS. they are cognisant of and interoperable with
As discussed above, it is possible that DIDs and VCs.
blockchain timestamping and signatures
used could be considered as comform with 6. Support the broad use of digital identity in
eIDAS even without trusted service providers. cities.
The EU could support a decentralised identity Smaller cities could be an excellent testing
framework by clarifying these points. We feel ground for decentralised identity frameworks.
it would position eIDAS as a powerful support The EU could support local authorities via
for decentralised identity in Europe, aiming at funding and expertise to build city-wide
having eIDAS-compliant implementations of infrastructures for their residents and so test
SSI up to the highest level of assurance. them in a live setting.

3. Clarify open issues around decentralised


identity and the GDPR.
We ask for clarification on the implementation
requirements for GDPR compliance of various
kinds of data implicated in the SSI context,
such as DIDs, DID documents, revocation
registries (of various implementations), public

22
Thematic Report Blockchain and digital identity

Appendix — Who is helping


shape the decentralised identity
landscape?
If the above sounds complex, it is because it is. But technologically
decentralised and self-sovereign identities are now more feasible than
ever. To get from feasible to actual implementation is, however, a long
road, and will among other things require agreement on technical
standards and processes.

Right now there are many organisations, both public and private, working
on such standards and so helping to build the conceptual foundation for
a decentralised identity framework. In this section we bring the reader’s
attention to some of these organisations, most of which are good sources
of more information for those readers who want to delve into the details.

• World Wide Web Consortium (W3C).1 The W3C is the main


international standards organisation for the world wide web. It
is working on decentralised identifiers and verifiable credentials
through two working groups dedicated to these subjects.
• Decentralised Identity Foundation (DIF).2 DIF is a broad industry
consortium with over 60 members founded by Microsoft, ConsenSys/
uPort, Evernym and others. Its mission is to ensure the interoperability
of identity platforms across blockchain networks.
• International Organisation for Standardisation (ISO).3 ISO is
working on identity standards through ISO TC 307 (Blockchain and
DLT)4 and ISO SC 27 (IT security techniques).5
• CEN/CENELEC. CEN, the European Committee for Standardisation,
and CENELEC, the European Committee for Electrotechnical
Standardisation, are two of the three bodies (along with ETSI) that
have been “officially recognised by the European Union and by the
European Free Trade Association (EFTA) as being responsible for
developing and defining voluntary standards at European level.”6
CEN/CENELEC have addressed identity, among other things in a white

1  https://www.w3.org/
2  https://identity.foundation/
3  https://www.iso.org/home.html
4  https://www.iso.org/committee/6266604.html
5  https://www.iso.org/committee/45306.html
6  https://www.cen.eu/about/Pages/default.aspx

23
Thematic Report Blockchain and digital identity

APPENDIX — WHO IS HELPING SHAPE THE DECENTRALISED IDENTITY LANDSCAPE

paper on recommendations for blockchain standards in Europe.7


• Open-ID Foundation.8 The OpenID Foundation is a non-profit
international standardisation organisation of individuals and
companies committed to enabling, promoting and protecting
OpenID technologies. Its Open-ID Connect standard is used by many
applications, using JavaScript Object Notation (JSON) as a data
format.
• Internet Engineering Task Force (IETF).9 The IETF is an open
standards organisation, developing and promoting voluntary Internet
standards, especially the standards that comprise the Internet
protocol suite TCP/IP.
• International Association of Trusted Blockchain Associations
(INATBA).10 INATBA, a new organisation launched in April 2019, brings
together industry, startups and SMEs, policy makers, international
organisations, regulators, civil society and standard-setting bodies to
support blockchain and Distributed Ledger Technology (DLT) to be
mainstreamed and scaled-up across multiple sectors. It’s expected to
play a major role in shaping how blockchain and identity will work in
Europe.
• Hyperledger Indy.11 Hyperledger Indy is a distributed ledger, purpose-
built for decentralized identity. It has developed specifications,
terminology, and design patterns for decentralized identity along
with an implementation of these concepts

7  https://www.blockchaineconomia.es/wp-content/uploads/2018/11/Libro%20blanco%20estandarización%20Bck.pdf
8  https://openid.net/foundation/
9  https://www.ietf.org/?gclid=EAIaIQobChMIoLvxjPSz4QIV1xXTCh3rIwhfEAAYASAAEgIjEfD_BwE
10  https://inatba.org/
11  https://www.hyperledger.org/projects/hyperledger-indy

24
Thematic Report Blockchain and digital identity

Appendix — Blockchain
Terminology

What is a blockchain?
Blockchain is one of the major technological breakthroughs of
the past decade. A technology that allows large groups of people
and organisations to reach agreement on and permanently record
information without a central authority, it has been recognised as an
important tool for building a fair, inclusive, secure and democratic digital
economy. This has significant implications for how we think about many
of our economic, social and political institutions.

How does it work?


At its core, blockchain is a shared, peer-to-peer database. While there are
currently several different kinds of blockchains in existence, they share
certain functional characteristics. They generally include a means for
nodes on the network to communicate directly with each other. They
have a mechanism for nodes on the network to propose the addition of
information to the database, usually in the form of some transaction, and
a consensus mechanism by which the network can validate what is the
agreed-upon version of the database.

Blockchain gets its name from the fact that data is stored in groups
known as blocks, and that each validated block is cryptographically
sealed to the previous block, forming an ever-growing chain of data.
Instead of being stored in a central location, all the nodes in the network
share an identical copy of the blockchain, continuously updating it as
new valid blocks are added.

What is it used for?


Blockchain is a technology that can be used to decentralise and
automate processes in a large number of contexts. The attributes of
blockchain allow for large numbers of individuals or entities, whether
collaborators or competitors, to come to a consensus on information and
immutably store it. For this reason, blockchain has been described as a
“trust machine“.

25
Thematic Report Blockchain and digital identity

APPENDIX — BLOCKCHAIN TERMINOLOGY

The potential use cases for blockchain are vast. People are looking
at blockchain technology to disrupt most industries, including from
automotive, banking, education, energy and e-government to healthcare,
insurance, law, music, art, real estate and travel. While blockchain is
definitely not the solution for every problem, smart contract automation
and disintermediation enable reduced costs, lower risks of errors and
fraud and drastically improved speed and experience in many processes.

Glossary
The vocabulary used in the context of blockchains is quite specific and
can be hard to understand. Here are the essential concepts you should
know in order to navigate this breakthrough technology:

• Node: A node is a computer running specific software which allows


that computer to process and communicate pieces of information
to other nodes. In blockchains, each node stores a copy of the
ledger and information is relayed from peer node to peer node until
transmitted to all nodes in the network.
• Signature: Signing a message or a transaction consists in encrypting
data using a pair of asymmetric keys. Asymmetric cryptography
allows someone to interchangeably use one key for encrypting and
the other key for decrypting. Data is encrypted using the private key
and can be decrypted by third-party actors using the public key to
verify the message was sent by the holder of the private key.
• Transaction: Transactions are the most granular piece of information
that can be shared among a blockchain network. They are generated
by users and include information such as the value of the transfer,
address of the receiver and data payload. Before sending a transaction
to the network, a user signs its contents by using a cryptographic
private key. By controlling the validity of signatures, nodes can figure
out who is the sender of a transaction and ensure that the transaction
content has not been manipulated while being transmitted over the
network.
• Hash: A hash is the result of a function that transforms data into a
unique, fixed-length digest that cannot be reversed to produce the
input. It can be viewed as the digital version of a fingerprint, for any
type of data.
• Block: A block is the data structure used in blockchains to group
transactions. In addition to transactions, blocks include other
elements such as the hash of the previous block and a timestamp.
• Smart contract: Smart contracts are pieces of code stored on the
blockchain that will self-execute once deployed, thus leveraging
the trust and security of the blockchain network. They allow users

26
Thematic Report Blockchain and digital identity

APPENDIX — BLOCKCHAIN TERMINOLOGY

to automate business logic and therefore enhance or completely


redesign business processes and services.
• Token: Tokens are a type of digital asset that can be tracked or
transferred on a blockchain. Tokens are often used as a digital
representation of assets like commodities, stocks and even physical
products. Tokens are also used to incentivise actors in maintaining
and securing blockchain networks.
• Consensus algorithm: Consensus algorithms ensure convergence
towards a single, immutable version of the ledger. They allow actors
on the network to agree on the content recorded on the blockchain,
taking into consideration the fact that some actors can be faulty or
malicious. This can be achieved by various means depending on the
specific needs. The most famous consensus algorithms include proof-
of-work, proof-of-stake and proof-of-authority.
• Validator nodes: Validator nodes are specific nodes in a network that
are responsible for constituting blocks and broadcasting these blocks
with the network. To create a valid new block they have to follow the
exact rules specified by the consensus algorithm.

Learn more about blockchain by watching a recording of our Ask me


Anything session.

27

You might also like