Decentralized Identifiers (DIDs)
A Decentralized Identifier (DID) is a new type of identifier that enables verifiable, self-sovereign digital identity. DIDs are fully under the control of the DID subject, independent from any centralized registry, identity provider, or certificate authority.What is a DID?
A DID is a unique identifier that:- You create yourself (no central authority needed)
- You own and control completely
- Is cryptographically verifiable
- Works across different systems and platforms
- Persists independently of any organization
Think of a DID like your email address, but you own it completely, it’s cryptographically secure, and no company can take it away from you.
DID Structure
DIDs follow a standard format defined by W3C:Sphyre’s DID Method: did:alyra
Sphyre uses the did:alyra method with post-quantum cryptography:
- Scheme:
did- Identifies this as a DID - Method:
alyra- Sphyre’s DID method - Identifier: Base64-encoded public key from your wallet
How DIDs Work
DID Creation
When you create a wallet in Sphyre:DID Resolution
To verify or use a DID, it must be “resolved” to get the associated public key and metadata:DID Document
When a DID is resolved, it returns a DID Document containing:Key Sections
Verification Method
Verification Method
Public keys associated with the DID, used for cryptographic verification
Authentication
Authentication
Keys that can be used to authenticate as the DID subject
Assertion Method
Assertion Method
Keys that can be used to create verifiable credentials
Service Endpoints
Service Endpoints
Network locations where services related to the DID can be accessed
DID Operations
Authentication with DIDs
DIDs enable passwordless authentication:Signing Credentials
Issuers use their DID to sign verifiable credentials:Post-Quantum Security
Sphyre’s DIDs use post-quantum cryptography to protect against future quantum computers:Kyber
Key EncapsulationQuantum-resistant key exchange for secure communication
Dilithium
Digital SignaturesQuantum-resistant signatures for credentials and authentication
Why Post-Quantum?
DID Methods Comparison
| DID Method | Storage | Security | Recovery | Use Case |
|---|---|---|---|---|
| did:alyra (Sphyre) | IPFS + Blockchain | Post-quantum | Seed phrase | General SSI |
| did:key | Self-contained | Ed25519 | None | Temporary |
| did:ethr | Ethereum | ECDSA | Smart contract | Web3 |
| did:web | Web server | Varies | Domain control | Corporate |
| did:ion | Bitcoin + IPFS | ECDSA | Seed phrase | Decentralized |
DID Lifecycle
Key Rotation
If your private key is compromised:DIDs in Sphyre Ecosystem
User Wallet (Sphyre ALV)
DID Creation
Generate DID from seed phrase during onboarding
DID Display
Show DID in profile with copy functionality
DID Authentication
Use DID for passwordless login to services
DID Recovery
Restore DID from backed-up seed phrase
Issuer Dashboard
Issuer DID
Organizations have DIDs for signing credentials
Trust Registry
Verify issuer DIDs against authorized list
Verifier Portal
DID Verification
Verify holder’s DID when validating presentations
Issuer Trust
Check if credential issuer’s DID is trusted
Privacy Considerations
Correlation Resistance
Solutions:- Pairwise DIDs: Different DID for each relationship
- Disposable DIDs: Temporary DIDs for one-time interactions
- DID Rotation: Periodically create new DIDs
Selective Disclosure
DIDs enable selective disclosure through:Multiple Credentials
Separate credentials for different claims
Zero-Knowledge Proofs
Prove facts without revealing DID-linked data
Best Practices
Key Management
Key Management
- Store seed phrase offline and encrypted
- Use hardware wallets for high-value DIDs
- Enable biometric authentication
- Never share private keys
Backup & Recovery
Backup & Recovery
- Write down seed phrase on paper
- Store multiple copies in secure locations
- Test recovery process before relying on it
- Consider multi-signature schemes for critical DIDs
DID Usage
DID Usage
- Use different DIDs for different contexts when privacy matters
- Don’t post DIDs publicly unless necessary
- Regularly rotate keys for high-security applications
- Monitor for unauthorized use of your DID
DID Resolution Example
Resolving a Sphyre DID:Resources
W3C DID Core Spec
Official DID specification
DID Method Registry
List of all DID methods
NIST PQC Standards
Post-quantum cryptography info
DIF Universal Resolver
Test DID resolution
Next Steps
Create Your DID
Follow the quickstart guide to create your first DID
Learn About VCs
Understand Verifiable Credentials
Explore ZKP
Learn about Zero-Knowledge Proofs
Build with DIDs
Check out developer guides for DID integration