Decentralized IDentity

DID & its significance

DID (Decentralized identity) is a trust framework in which identifiers such as usernames can be replaced with IDs that are self-owned, independent, and enable data exchange using blockchain technology, providing privacy and secure transactions. Our lives are increasingly linked to apps, devices and services, and we’re often subject to data breaches and privacy loss. Hence, a standards-based decentralized identity system can provide greater privacy and control over your data.

Rubix Decentralized Identity (DID) project is an open standard enabling users to create self-owned identities, and use blockchain networks for getting decentralized tamper proof verifiable claims. The claims are 100% on-chain and publicly verifiable.

Key features of Rubix DID

  1. Identities are self-created and self-owned allowing more control for user over his data i.e., no Certificate Authority (CA) is required for generating identity key pairs.

  2. Information is immutable, once it is issued by using cryptographic proofs and object-oriented Distributed File System (DFS).

  3. Real world DFS based on content-based addressing, preserves complete integrity over signed data.

  4. Parallel scalable ledger allows asynchronous claims and verification.

  5. Instant confirmation and finality.

  6. Data confidentiality is preserved by encrypting the signed certificate using patented Non-Linear Secret Sharing (NLSS) method.

  7. Selective disclosure property helps user to choose partial revealing of data for verification.

  8. The information cannot be decrypted without the consent of the issuer and/or the certificate holder.

  9. In Compliance with globally accepted standards like :
    a. IMS Open Badges
    b.W3C Verifiable Claims
    c.W3C Linked Data Signatures

  10. Follows digital preservation rules like GDPR, CCPA.

  11. All transactions are on-chain, while also being cost effective.

  12. Light weight infrastructure with support for multi architectural designs.

The Library / SDK consists of a Function which when called on creates the Decentralized ID or DID for short. In addition to creation of DID, a folder named Rubix will be created in home of the system, which contains DATA folder that hosts the DID.png, PublicShare.png and PrivateShare.png The Input parameter that the createDID method takes is a .png file with dimensions 256x256

SDK to use Rubix Decentralized Identity (DID)


Download here

Please use the following line which will import the method createDID to your current working code file:

import static com.rubix.DIDCreation.DIDcreate.*;

Input format of the Java method is shown below:

 - ​​createDID(data,imageFile.getInputStream());

The variable data can be any String. Eg: phone number based auth can use user phone number as data. The variable imageFile is of type MultipartFile which is a library that can be used to take .png files as input.

The output of the called method createDID will a JSONObject in the format given below:

 "Status" : "",
 "DID" : ""

Value of status is either “Success” or “Failed”.

How is a DID created ?

Every node joining the Rubix network must create a DID. There is an option for creation of DID after node setup. A CURL request is called when the user selects this option.

The creation process is a logic that combines a 256x256 image and a system generated hash value. The image chosen here is a standard image used for all DID creations across the network. The hash value on the other hand, is the hashed value of the peerID of the node, which is in turn generated during node setup by IPFS protocol. The combination of both is a hash value which is then used as a DID for the node.

The DID is further split into two parts, namely Public Share and Private Share. These parts are used during various athentication and data transfer scenarios. More about this can be found on the above links.

Use Cases

A DID-oriented blockchain can be used for applications that are currently running on a centralised authentication mechanism. For example, a traditional food delivery app can be transitioned into a DID-oriented authentication system to provide for more user data privacy and security.

Inner working of createDID method

  • When the createDID method is called along with the input parameter which is your .png file of 256x256
  • This image is converted into binary.
  • An input parameter String is given which can be any string as the user wishes,
  • it can be any detail provided by the user such as name,address,phone number etc.
  • This input string is hashed, then this hash is again hashed multiple times.
  • This hash is embedded with the image binary.
  • This embedded image file is then split to provide DID.png, PrivateShare.png, PublicShare.png and your corresponding DID, using our patented NLSS algorithm

Additional points to be noted by the developer

Other possibilities

The creation logic could be improved or made more effecient and still provide a similar level of functionality.

Crypto, public chains will transform the access management enormously for the better. In Rubix, every node/user gets #DID automatically assigned,can build verifiable claims around it,build DNS, build alternatives to #SAML & much more

— Rubix (@rubixchain) January 22, 2022

If you have questions or feedback, please DM us at @rubixchain.