This session is hosted by Jukka Yliuntinen, Giesecke+Devrient.
Presentation: Verifiable Digital Credentials: Comparison of Characteristics, Capabilities and Standardization of Emerging Formats and Issuance Protocols
Speaker: Andre Kudra, esatus
In 2022, several standard development organizations and open-source groups made great progress defining protocol specifications and code for the issuance of digital credentials. In this presentation, the presenter provides an introduction to some of the emerging credential formats and issuance protocols, with a comparison of their features, capabilities and tradeoffs.
Presentation: An Analysis of Global Decentralized Identifier Data
Speaker: Zaïda Rivai from Danube Tech,
Decentralized Identifiers (DIDs) offer a unique solution for digital identity verification, allowing individuals to have complete control over their own identity and eliminating the need for a centralized registry or authority. In this session, we will explore the insights that can be gained through the analysis of global DID data. At Danube Tech GmbH, we have developed version trackers that monitor various DID methods, such as did:indy, did:ebsi, did:ion and others, collecting and storing data on DID transactions in our database for analysis. During this session, we will present the results of our latest analyses, including trends in DID transactions over time, distributions across different verification methods, and errors found in DIDs and DID documents. This information can be valuable for businesses looking to understand and utilize DIDs in their operations, as well as for individuals seeking to use DIDs for their own digital identity management.
Workshop: Mapping of eIDAS 2.0 and the Trust Over IP model
Speaker: Antti Kettunen, TietoEvry, and Samuel Gomez, Gataca
The European Union’s efforts in digital identity development are one of the most prominent drivers of decentralized identity evolution and adoption. However, as the EU has already established trust mechanisms (e.g., QTSPs, QES, etc.), its approach to trust establishment might differ slightly from other decentralized identity frameworks.
The upcoming eIDAS regulations will have a significant impact on any digital identity initiative. Understanding how eIDAS aligns with other decentralized identity frameworks, and what interfaces to consider when planning interoperability between different ecosystems employing different frameworks is crucial.
One example of a decentralized identity framework is the Trust over IP (ToIP) model, developed by the TrustOverIP Foundation (hosted by Linux Foundation). The ToIP model is a layered dual-stack model that describes decentralized identity systems, including reference architectures and specifications that support the implementation of the layers.
In this workshop, we will first review the ToIP model and how decentralized identity frameworks are used to build digital trust. We will then explore where the EU Digital Identity would interface with other identity architectures.
After the overviews, we aim to map the frameworks from technical and governance perspectives. We will interpret the roles and trust components and find out where the frameworks are similar and where they are different, and what kind of impact these similarities and differences could have on implementations.