Decentralized Identifiers (DIDs)
A Decentralized Identifier (DID) is a new type of identifier that enables verifiable, self-sovereign digital identity. DIDs are fully under the control of the DID subject, independent from any centralized registry, identity provider, or certificate authority.What is a DID?
A DID is a unique identifier that:- You create yourself (no central authority needed)
- You own and control completely
- Is cryptographically verifiable
- Works across different systems and platforms
- Persists independently of any organization
Think of a DID like your email address, but you own it completely, it’s cryptographically secure, and no company can take it away from you.
DID Structure
DIDs follow a standard format defined by W3C:Sphyre’s DID Method: did:alyra
Sphyre uses the did:alyra method with post-quantum cryptography:
- Scheme:
did- Identifies this as a DID - Method:
alyra- Sphyre’s DID method - Identifier: Base64-encoded public key from your wallet
How DIDs Work
DID Creation
When you create a wallet in Sphyre:1
Generate Seed Phrase
A 12-word BIP39 seed phrase is generated
2
Derive Key Pair
Ed25519 key pair is derived from the seed phrase
3
Create DID
Public key is encoded in base64 to form the DID
4
Register (Optional)
DID can be registered in Sphyre’s registry for discovery
DID Resolution
To verify or use a DID, it must be “resolved” to get the associated public key and metadata:DID Document
When a DID is resolved, it returns a DID Document containing:Key Sections
Verification Method
Verification Method
Public keys associated with the DID, used for cryptographic verification
Authentication
Authentication
Keys that can be used to authenticate as the DID subject
Assertion Method
Assertion Method
Keys that can be used to create verifiable credentials
Service Endpoints
Service Endpoints
Network locations where services related to the DID can be accessed
DID Operations
Authentication with DIDs
DIDs enable passwordless authentication:Signing Credentials
Issuers use their DID to sign verifiable credentials:Post-Quantum Security
Sphyre’s DIDs use post-quantum cryptography to protect against future quantum computers:Kyber
Key EncapsulationQuantum-resistant key exchange for secure communication
Dilithium
Digital SignaturesQuantum-resistant signatures for credentials and authentication
Why Post-Quantum?
DID Methods Comparison
| DID Method | Storage | Security | Recovery | Use Case |
|---|---|---|---|---|
| did:alyra (Sphyre) | IPFS + Blockchain | Post-quantum | Seed phrase | General SSI |
| did:key | Self-contained | Ed25519 | None | Temporary |
| did:ethr | Ethereum | ECDSA | Smart contract | Web3 |
| did:web | Web server | Varies | Domain control | Corporate |
| did:ion | Bitcoin + IPFS | ECDSA | Seed phrase | Decentralized |
DID Lifecycle
Key Rotation
If your private key is compromised:1
Generate New Key Pair
Create a new Ed25519 key pair
2
Update DID Document
Add new key to verification methods, remove old key
3
Notify Contacts
Inform issuers and verifiers of the key rotation
4
Re-request Credentials
Old credentials may need to be reissued to new DID
DIDs in Sphyre Ecosystem
User Wallet (Sphyre ALV)
DID Creation
Generate DID from seed phrase during onboarding
DID Display
Show DID in profile with copy functionality
DID Authentication
Use DID for passwordless login to services
DID Recovery
Restore DID from backed-up seed phrase
Issuer Dashboard
Issuer DID
Organizations have DIDs for signing credentials
Trust Registry
Verify issuer DIDs against authorized list
Verifier Portal
DID Verification
Verify holder’s DID when validating presentations
Issuer Trust
Check if credential issuer’s DID is trusted
Privacy Considerations
Correlation Resistance
Solutions:- Pairwise DIDs: Different DID for each relationship
- Disposable DIDs: Temporary DIDs for one-time interactions
- DID Rotation: Periodically create new DIDs
Selective Disclosure
DIDs enable selective disclosure through:Multiple Credentials
Separate credentials for different claims
Zero-Knowledge Proofs
Prove facts without revealing DID-linked data
Best Practices
Key Management
Key Management
- Store seed phrase offline and encrypted
- Use hardware wallets for high-value DIDs
- Enable biometric authentication
- Never share private keys
Backup & Recovery
Backup & Recovery
- Write down seed phrase on paper
- Store multiple copies in secure locations
- Test recovery process before relying on it
- Consider multi-signature schemes for critical DIDs
DID Usage
DID Usage
- Use different DIDs for different contexts when privacy matters
- Don’t post DIDs publicly unless necessary
- Regularly rotate keys for high-security applications
- Monitor for unauthorized use of your DID
DID Resolution Example
Resolving a Sphyre DID:Resources
W3C DID Core Spec
Official DID specification
DID Method Registry
List of all DID methods
NIST PQC Standards
Post-quantum cryptography info
DIF Universal Resolver
Test DID resolution
Next Steps
1
Create Your DID
Follow the quickstart guide to create your first DID
2
Learn About VCs
Understand Verifiable Credentials
3
Explore ZKP
Learn about Zero-Knowledge Proofs
4
Build with DIDs
Check out developer guides for DID integration