In at the moment’s panorama, the momentum behind Web3 is evident throughout numerous industries. As we transfer into this new period, it is vital to replace our instruments and strategies to match the altering surroundings. Throughout Web1, one of many key modifications concerned utilizing authentication strategies to confirm customers on particular web sites for the primary time.
Web2 launched identification suppliers, permitting customers to authenticate themselves utilizing their social accounts. Nevertheless, will this mannequin endure in a Web3 surroundings? Not fairly.
Enter Decentralized Identification, an indicator of Web3. This paradigm shift eliminates the reliance on central authorities for credential verification. As a substitute, customers have direct management over their credentials, deciding what info to share when proving their identification. This basic change empowers people, reworking the idea of digital identification within the Web3 period.
The World Large Net Consortium (W3C) units the usual for these identities, offering detailed details about Decentralized Identifiers (DID), Verifiable Credentials (VC), and Verifiable Displays (VP). For additional insights, readers can seek advice from our earlier articles on Decentralized Identification:
This text goes past idea to discover the sensible aspect, demonstrating how Decentralized Identification will be seamlessly built-in into present tasks for efficient use.
We’ll showcase the method with the next steps:
Making a did:ethr DID.
Querying its standing on the Identification Registry inside the community.
Producing a Verifiable Credential.
Lastly, revoking the DID.
By these sensible examples, readers will acquire a deeper understanding of implementing Decentralized Identification in real-world situations.
Getting began
To be able to simply obtain the Decentralized Identification in your utility you should ensure you have the next:
An Identification generator library for particular DID strategies, DID paperwork, Verifiable Credentials, Verifiable Displays, and on the identical time present the verification mechanism.
A registry that holds the Identities in a blockchain community.
A software that may generate the mandatory key pairs for encryption to create the identifiers talked about earlier. This software also needs to allow interplay with the blockchain community talked about above.
For demonstrating this we are going to use the next tech stack:
SpruceID library for producing decentralized credentials.
The Ethereum Sepolia take a look at community with ERC-1056 sensible contract which is able to characterize the Identification Registry within the community.
Hyperledger Web3J to work together with the Identification Registry sensible contract and generate the Elliptic Curve SECP-256k1 key pair. SpruceID to create the credentials.
Setting Up the Setting
Generate a brand new Java challenge. You may accomplish this utilizing any fashionable IDE or generate it as a brand new HelloWorld utility utilizing the Web3j-CLI. We advocate utilizing Gradle as a construct software for extra duties, though Maven can be appropriate.
Combine SpruceID:
This library is written in Rust. To make use of it in our Java utility, we’ll should construct it regionally. For this use the next tutorial for Java on the documentation website.Â
The steps are:
git clone https://github.com/spruceid/ssi –recurse-submodules
git clone https://github.com/spruceid/didkit
cd didkit/
cargo construct
From DIDKit root listing generate the Java Native Interfaces for to can work together from Java with SpruceID Rust library
make -C lib ../goal/didkit.jar
  6. From DIDKit root listing generate the entry level to the SpruceID Library which was       constructed on the native machine.
Â
Be aware: Please seek advice from the challenge’s documentation to construct the library on your platform, libdidkit.so on UNIX-like methods, didkit.dll on Home windows, libdidkit.dylib on MacOS.
make -C lib ../goal/launch/libdidkit.so
Add the generated libs from 5 and 6 to the classpath.
Combine Web3J:
If the Java utility was created utilizing Web3J-CLI, the Web3J Gradle plugin is robotically included. If not, you will want so as to add it manually to the construct.gradle file, as described under:
plugins {
id(“org.web3j”) model “4.9.8”
}
Be aware: SpruceID will run solely on Java 11, attributable to this Web3J is specified with model 4.9.8.
Combine with Ethereum take a look at community:
Â
For this we are going to use the Ethereum Sepolia take a look at community to deploy and work together with the sensible contract ERC-1056. As talked about above, we are going to use Web3J for the deployment and interplay with the sensible contract.Â
First Generate the contract wrapper:
Add the solidity file within the solidity folder underneath the essential module.
Run generateContractWrappers gradle activity
Deploy the sensible contract to the Sepolia take a look at community by executing the tutorial steps right here. Now every thing is in place.Â
did:ethr
The did:ethr refers primarily to an Ethereum public handle, which will be resolved to a DID doc utilizing a resolver entity. On this case, SpruceId supplies a resolveDID technique that can be utilized for this function.
For producing a brand new did:ethr we are going to execute the next code:
//the Sepolia community ID 11155111 in hex
String EVM_CHAIN_ID = 0xaa36a7
public String createEthrIdentity(System system) throws Exception {
ECKeyPair ecKeyPair = Keys.createEcKeyPair();
String privateKey = Numeric.toHexStringWithPrefix(ecKeyPair.getPrivateKey());
String handle = Numeric.prependHexPrefix(Keys.getAddress(ecKeyPair));
String did = “did:ethr:” + EVM_CHAIN_ID + “:” + handle;
return did;
}
The code above demonstrates how the Keys class from the Web3J utility module is used to generate the SECP-256k1 key pair for the brand new handle. As soon as created, the brand new DID is fashioned by combining the prefix with the brand new key.Â
Be aware: EVM_CHAIN_ID specifies which community the resolver ought to examine to resolve the DID.Â
The ensuing DID ought to have the next format:
did:ethr:0xaa36a7:0x19e03255f667bdfd50a32722df860b1eeaf4d635
If we had generated the DID for Ethereum Mainnet, it could be:
did:ethr:0xaa36a7:0x19e03255f667bdfd50a32722df860b1eeaf4d635
Be aware: Bear in mind to retailer the non-public key generated above for later use. You’ll need it when producing Verifiable credentials. As a greatest observe, encrypt it with an RSA key and retailer it in a non-public database till it’s wanted once more.
Verify possession
Even when the DID was created off-chain utilizing Hyperledger Web3J, it capabilities on the community like some other SECP-256k1 handle by default. Due to this fact, there is no such thing as a have to take any extra steps so as to add it to the Identification Registry. The registry robotically resolves all queries for newly generated did:ethr addresses as a result of they’re already related to their respective homeowners.
public String checkOwner(String did) throws Exception {
Web3j web3j = Web3j.construct(new HttpService(NETWORK_RPC));
FastRawTransactionManager transactionManager = new FastRawTransactionManager(web3j, Credentials.create(identification.getKeyUsed()), Numeric.toBigInt(DIDConstants.EVM_CHAIN_ID).longValue());
EthereumDIDRegistry registry = new EthereumDIDRegistry(REGISTRY_ADDRESS, web3j, transactionManager, new DefaultGasProvider());
String identityAddress = did.substring();
return registry.identityOwner(identityAddress).ship();
}
Within the above code, Hyperledger Web3J is querying the registry sensible contract to retrieve the proprietor of the present DID.Â
Be aware: the identityAddress is obtained by eradicating the DID prefix (did:ethr:EVM_CHAIN_ID), which represents the beforehand generated public handle. If the proprietor was not beforehand set, the strategy ought to return the saved handle worth as identityAddress by default. Which means each account is the proprietor of its personal DID.
Generate Verifiable Credentials
As soon as the DID is generated and the proprietor’s non-public key’s obtainable, entry to the Decentralized Identification House turns into potential. Verifiable Credentials (VCs) function digital representations of bodily IDs within the Web3 house. For additional understanding of their use case, please seek advice from the articles talked about within the introduction part.
To generate VCs, we are going to make the most of SpruceID and Hyperledger Web3J together with the non-public key generated earlier.
public String issueVerifiableCredential(String did, KeyPair keys, DataObject knowledge){
last CredentialObject credential = new CredentialObject(did, did, knowledge);
last DIDKitOptions choices = new DIDKitOptions(PROOF_ASSERTION, identification.getVerificationMethod(), null, null);
last String credentialJson = MAPPER.writeValueAsString(credential);
last String optionsJson = MAPPER.writeValueAsString(choices);
String jwk = generatePrivateJwk(keys);
last String verifiableCredential = DIDKit.issueCredential(credentialJson, optionsJson, jwk);
return verifiableCredential;
}
Within the above code, DIDKit is the JNI interface positioned within the jar file that we added to the category path. It exposes the issueCredential technique which receives the next arguments:
credentialJson = is the physique of the VC. Created from the CredentialObject, it contains the specified knowledge that should conform to the VC schema. Consult with the SpruceId instance for steering.
optionsJson = this refers to the kind of assertions that Verifiable Credential might want to help throughout verification requests;
jwk = is the Json Net Key format of the did:ethr’s key pair. Technique generatePrivateJwk ought to comprise the Web3J code which returns the non-public JWK, documentation right here.
As soon as SpruceID receives the issueCredential request it is going to begin to do the next:
Verify if credentialJson respects the VC schema talked about in @context;
Resolve the did:ethr in an effort to get the DID Doc to examine the JWK that was despatched. Relying on the take a look at community 2 choices can happen:
If the SpruceId library resolve technique is suitable with the community, the DID will probably be resolved.
If the library shouldn’t be suitable, the resolver must be overridden with this customized resolver.Â
You may obtain this by cloning the repository and executing the npm command to start out the resolver occasion. After occasion begins, redirect the SpruceId calls by overriding the DIDKit resolve actions to the brand new resolver.
  3. After finishing the primary two steps, the system returns the verifiable credential.
From right here, you should utilize it in verification calls, issuing new Verifiable Displays, and extra.
Revoke DID
A DID is revoked when its DID Doc can now not be retrieved. For many DID strategies, this may be achieved by eradicating entry to it. Within the case of did:net, the entry URL to the DID doc is revoked. However what about did:ethrs when there may be an Identification Registry on the community?
On this case, revocation of the DID will consist of fixing the proprietor handle to 0x0. By doing this, we point out that solely the handle 0x0 can use it. Nevertheless, as 0x0 shouldn’t be a sound handle that can be utilized, the DID is successfully revoked.
registry.changeOwner(identityAddress,”0x0″).ship();
Hyperledger Web3J connects Decentralized Identification (DID) methods with Ethereum Digital Machine networks, offering important help for creating decentralized identities. Its interfaces make it simpler to work together with the EVM community and generate mandatory JWK keys for identification creation processes, similar to these utilized in Spruce ID.
Â