In right now’s panorama, the momentum behind Web3 is evident throughout varied industries. As we transfer into this new period, it is necessary to replace our instruments and strategies to match the altering setting. Throughout Web1, one of many key modifications concerned utilizing authentication strategies to confirm customers on particular web sites for the primary time.
Web2 launched identification suppliers, permitting customers to authenticate themselves utilizing their social accounts. Nevertheless, will this mannequin endure in a Web3 setting? Not fairly.
Enter Decentralized Identification, an indicator of Web3. This paradigm shift eliminates the reliance on central authorities for credential verification. As an alternative, customers have direct management over their credentials, deciding what info to share when proving their identification. This basic change empowers people, reworking the idea of digital identification within the Web3 period.
The World Extensive Internet Consortium (W3C) units the usual for these identities, offering detailed details about Decentralized Identifiers (DID), Verifiable Credentials (VC), and Verifiable Displays (VP). For additional insights, readers can consult with our earlier articles on Decentralized Identification:
This text goes past principle to discover the sensible aspect, demonstrating how Decentralized Identification will be seamlessly built-in into current initiatives for efficient use.
We’ll showcase the method with the next steps:
Making a did:ethr DID.
Querying its standing on the Identification Registry inside the community.
Producing a Verifiable Credential.
Lastly, revoking the DID.
By way of these sensible examples, readers will acquire a deeper understanding of implementing Decentralized Identification in real-world situations.
Getting began
In an effort to simply obtain the Decentralized Identification in your software you must be sure you have the next:
An Identification generator library for particular DID strategies, DID paperwork, Verifiable Credentials, Verifiable Displays, and on the identical time present the verification mechanism.
A registry that holds the Identities in a blockchain community.
A device that may generate the required key pairs for encryption to create the identifiers talked about earlier. This device also needs to allow interplay with the blockchain community talked about above.
For demonstrating this we are going to use the next tech stack:
SpruceID library for producing decentralized credentials.
The Ethereum Sepolia check community with ERC-1056 good contract which is able to characterize the Identification Registry within the community.
Hyperledger Web3J to work together with the Identification Registry good contract and generate the Elliptic Curve SECP-256k1 key pair. SpruceID to create the credentials.
Setting Up the Atmosphere
Generate a brand new Java mission. You’ll be able to accomplish this utilizing any well-liked IDE or generate it as a brand new HelloWorld software utilizing the Web3j-CLI. We advocate utilizing Gradle as a construct device for added duties, though Maven can also be appropriate.
Combine SpruceID:
This library is written in Rust. To make use of it in our Java software, we’ll should construct it regionally. For this use the next tutorial for Java on the documentation web site.Â
The steps are:
git clone https://github.com/spruceid/ssi –recurse-submodules
git clone https://github.com/spruceid/didkit
cd didkit/
cargo construct
From DIDKit root listing generate the Java Native Interfaces for to can work together from Java with SpruceID Rust library
make -C lib ../goal/didkit.jar
  6. From DIDKit root listing generate the entry level to the SpruceID Library which was       constructed on the native machine.
Â
Observe: Please consult with the mission’s documentation to construct the library on your platform, libdidkit.so on UNIX-like methods, didkit.dll on Home windows, libdidkit.dylib on MacOS.
make -C lib ../goal/launch/libdidkit.so
Add the generated libs from 5 and 6 to the classpath.
Combine Web3J:
If the Java software was created utilizing Web3J-CLI, the Web3J Gradle plugin is robotically included. If not, you may want so as to add it manually to the construct.gradle file, as described under:
plugins {
id(“org.web3j”) model “4.9.8”
}
Observe: SpruceID will run solely on Java 11, attributable to this Web3J is specified with model 4.9.8.
Combine with Ethereum check community:
Â
For this we are going to use the Ethereum Sepolia check community to deploy and work together with the good contract ERC-1056. As talked about above, we are going to use Web3J for the deployment and interplay with the good contract.Â
First Generate the contract wrapper:
Add the solidity file within the solidity folder underneath the fundamental module.
Run generateContractWrappers gradle job
Deploy the good contract to the Sepolia check community by executing the tutorial steps right here. Now every part is in place.Â
did:ethr
The did:ethr refers primarily to an Ethereum public tackle, which will be resolved to a DID doc utilizing a resolver entity. On this case, SpruceId supplies a resolveDID methodology that can be utilized for this objective.
For producing a brand new did:ethr we are going to execute the next code:
//the Sepolia community ID 11155111 in hex
String EVM_CHAIN_ID = 0xaa36a7
public String createEthrIdentity(Machine machine) throws Exception {
ECKeyPair ecKeyPair = Keys.createEcKeyPair();
String privateKey = Numeric.toHexStringWithPrefix(ecKeyPair.getPrivateKey());
String tackle = Numeric.prependHexPrefix(Keys.getAddress(ecKeyPair));
String did = “did:ethr:” + EVM_CHAIN_ID + “:” + tackle;
return did;
}
The code above demonstrates how the Keys class from the Web3J utility module is used to generate the SECP-256k1 key pair for the brand new tackle. As soon as created, the brand new DID is fashioned by combining the prefix with the brand new key.Â
Observe: EVM_CHAIN_ID specifies which community the resolver ought to verify to resolve the DID.Â
The ensuing DID ought to have the next format:
did:ethr:0xaa36a7:0x19e03255f667bdfd50a32722df860b1eeaf4d635
If we had generated the DID for Ethereum Mainnet, it will be:
did:ethr:0xaa36a7:0x19e03255f667bdfd50a32722df860b1eeaf4d635
Observe: Bear in mind to retailer the non-public key generated above for later use. You’ll need it when producing Verifiable credentials. As a greatest follow, encrypt it with an RSA key and retailer it in a non-public database till it’s wanted once more.
Test possession
Even when the DID was created off-chain utilizing Hyperledger Web3J, it capabilities on the community like every other SECP-256k1 tackle by default. Due to this fact, there isn’t any must take any further steps so as to add it to the Identification Registry. The registry robotically resolves all queries for newly generated did:ethr addresses as a result of they’re already related to their respective homeowners.
public String checkOwner(String did) throws Exception {
Web3j web3j = Web3j.construct(new HttpService(NETWORK_RPC));
FastRawTransactionManager transactionManager = new FastRawTransactionManager(web3j, Credentials.create(identification.getKeyUsed()), Numeric.toBigInt(DIDConstants.EVM_CHAIN_ID).longValue());
EthereumDIDRegistry registry = new EthereumDIDRegistry(REGISTRY_ADDRESS, web3j, transactionManager, new DefaultGasProvider());
String identityAddress = did.substring();
return registry.identityOwner(identityAddress).ship();
}
Within the above code, Hyperledger Web3J is querying the registry good contract to retrieve the proprietor of the present DID.Â
Observe: the identityAddress is obtained by eradicating the DID prefix (did:ethr:EVM_CHAIN_ID), which represents the beforehand generated public tackle. If the proprietor was not beforehand set, the tactic ought to return the saved tackle worth as identityAddress by default. Which means each account is the proprietor of its personal DID.
Generate Verifiable Credentials
As soon as the DID is generated and the proprietor’s non-public secret’s accessible, entry to the Decentralized Identification House turns into potential. Verifiable Credentials (VCs) function digital representations of bodily IDs within the Web3 area. For additional understanding of their use case, please consult with the articles talked about within the introduction part.
To generate VCs, we are going to make the most of SpruceID and Hyperledger Web3J together with the non-public key generated earlier.
public String issueVerifiableCredential(String did, KeyPair keys, DataObject information){
closing CredentialObject credential = new CredentialObject(did, did, information);
closing DIDKitOptions choices = new DIDKitOptions(PROOF_ASSERTION, identification.getVerificationMethod(), null, null);
closing String credentialJson = MAPPER.writeValueAsString(credential);
closing String optionsJson = MAPPER.writeValueAsString(choices);
String jwk = generatePrivateJwk(keys);
closing String verifiableCredential = DIDKit.issueCredential(credentialJson, optionsJson, jwk);
return verifiableCredential;
}
Within the above code, DIDKit is the JNI interface situated within the jar file that we added to the category path. It exposes the issueCredential methodology which receives the next arguments:
credentialJson = is the physique of the VC. Created from the CredentialObject, it consists of the specified information that should conform to the VC schema. Consult with the SpruceId instance for steerage.
optionsJson = this refers to the kind of assertions that Verifiable Credential might want to assist throughout verification requests;
jwk = is the Json Internet Key format of the did:ethr’s key pair. Methodology generatePrivateJwk ought to comprise the Web3J code which returns the non-public JWK, documentation right here.
As soon as SpruceID receives the issueCredential request it’ll begin to do the next:
Test if credentialJson respects the VC schema talked about in @context;
Resolve the did:ethr to be able to get the DID Doc to verify the JWK that was despatched. Relying on the check community 2 choices can happen:
If the SpruceId library resolve methodology is suitable with the community, the DID will likely be resolved.
If the library isn’t suitable, the resolver must be overridden with this customized resolver.Â
You’ll be able to obtain this by cloning the repository and executing the npm command to start out the resolver occasion. After occasion begins, redirect the SpruceId calls by overriding the DIDKit resolve actions to the brand new resolver.
  3. After finishing the primary two steps, the system returns the verifiable credential.
From right here, you need to use it in verification calls, issuing new Verifiable Displays, and extra.
Revoke DID
A DID is revoked when its DID Doc can now not be retrieved. For many DID strategies, this may be achieved by eradicating entry to it. Within the case of did:internet, the entry URL to the DID doc is revoked. However what about did:ethrs when there may be an Identification Registry on the community?
On this case, revocation of the DID will consist of fixing the proprietor tackle to 0x0. By doing this, we point out that solely the tackle 0x0 can use it. Nevertheless, as 0x0 isn’t a sound tackle that can be utilized, the DID is successfully revoked.
registry.changeOwner(identityAddress,”0x0″).ship();
Hyperledger Web3J connects Decentralized Identification (DID) methods with Ethereum Digital Machine networks, offering important assist for creating decentralized identities. Its interfaces make it simpler to work together with the EVM community and generate crucial JWK keys for identification creation processes, comparable to these utilized in Spruce ID.
Â