RWOT Papers
This is categorized list of papers produced by the Rebooting the Web of Trust design workshops is complete through RWOT-XII in Cologne (2023). To date we have produced 68 papers across 11 workshops.
Attestation
A statement of some fact (or some opinion) about some entity.
Authentication
The act of verifying an identity.
- 8/20/19: Using OpenID Connect Self-Issued to Achieve DID Auth
- 7/31/18: Introduction to DID Auth
Blockcerts
An open standard for blockchain credentials.
- 11/19/19: Blockcerts v3 Proposal
- 6/20/18: Open Badges are Verifiable Credentials
Blockchain
An immutable decentralized ledger maintained by consensus rules.
- 6/5/18: When GDPR becomes real, and Blockchain is no longer Fairy Dust
- 2/17/18: A Decentralized Approach to Blockcerts Credential Revocation
Capabilities
An authorization methodology where permissions are attached to an entity as a list of what objects that entity can access and in what way.
- 1/12/18: Linked Data Capabilities
- 10/13/17: Identity Hubs Capabilities Perspective
Commons & Cooperation
Working together for the common good.
- 11/19/19: Decentralized Identity as a Meta-platform: How Cooperation Beats Aggregation
- 5/3/18: Exploring Sustainable Technology Commons using Appreciative Inquiry
Credentials
A set of one or more claims about the same entity. Also see VERIFIABLE CREDENTIALS.
- 5/22/23: A Credential Profile Comparison Matrix to Facilitate Technical and Non-technical Decision Making
- 2/17/18: A Decentralized Approach to Blockcerts Credential Revocation
DAD: Decentralized Autonomic Data
Self-regulating or self-managing data that does not reside with a single party.
- 1/17/19: A DID for Everything
- 4/26/18: Decentralized Autonomic Data (DAD) and the three R's of Key Management
Data Vaults
Protected stores of online data, including Identity Hubs and more.
- 10/24/19: Encrypted Data Vaults
- 8/5/18: Identity Hub Attestation Flows and Components
- 10/13/17: Identity Hubs Capabilities Perspective
- 4/13/17: Hubs
Decentralized Consensus Systems
A method for achieving agreement without a centralized authority.
- 2/21/17: The DCS Theorem
DID: Decentralized Identifiers
A portable, globally unique identifier associated with some entity that does not require a centralized authority for registration.
- 10/31/22: Taking out the CRUD: Five Fabulous DID Attacks
- 8/20/19: Using OpenID Connect Self-Issued to Achieve DID Auth
- 4/4/19: RWOT8 DID Specification Refinement
- 2/13/19: IPLD as a General Pattern for DID Documents and Verifable Claims
- 1/17/19: A DID for Everything
- 11/30/18: Peer to Peer Degrees of Trust
- 7/31/18: Introduction to DID Auth
- 3/27/18: Decentralized Identifiers 1.0 Update
- 10/21/16: Decentralized Identifiers (DIDs) 1.0: Data Model and Syntaxes for DIDs
- 8/24/16: Requirements for DIDs (Decentralized Identifiers)
DID Methods
A regularized methodology for creating, reading, updating, and revoking a DID.
-
2/5/24: Beyond did:web
- 11/19/19: A Rubric for Decentralization of DID Methods
- 4/9/19: Peer DID Method Specification Report
- 1/16/19: BTCR v0.1 Decisions
- 4/13/18: BTCR DID Resolver Specification
- 10/1/17: Veres One DID Method 1.0
Digital Rights
The codification of authorization to use digital media.
- 3/3/17: Smart Consent Protocol
Digital Verification
The act of proving the accuracy of something, often verifying a digital signature.
GDPR
General Data Protection Regulation. European laws that protect the data and privacy of individuals.
Identifier
A proxy for identity that is used as a label to refer to the entity being represented. For example, a name or UID. See Also: DID.
Identity
A somewhat nebulous term, defined in different ways by different people. Broadly: who or what an entity is.
- 3/19/20: Five Mental Models of Identity
- 8/23/16: Identity Crisis: Clear Identity through Correlation
Identity, Decentralized
Identity that is not controlled by a central server. Also, “Self-Sovereign Identity”.
- 1/29/24: The Ecosystem Coordinator’s Role in SSI Ecosystem Management
- 4/3/23: On-chain Identity Proof Verification Design Patterns: An Evaluation of Different Strategies to Inject Digital Identity into Decentralized Applications
- 11/19/19: Decentralized Identity as a Meta-platform: How Cooperation Beats Aggregation
- 4/12/19: How SSI Will Survive Capitalism
- 12/5/18: How to Convince Dad* of the Importance of Self-Sovereign Identity
- 7/24/18: SSI: A Roadmap for Adoption
Keys
A cryptographic secret used to encrypt or decrypt data. See Also: Key Recovery, PKI, Wallets.
- 4/26/18: Decentralized Autonomic Data (DAD) and the three R's of Key Management []{#key-recovery}
Key Recovery
A methodology for recovery a private key that has been lost.
Markdown
The formatting used on GitHub (and by programmers).
Privacy
Means for protecting information and minimizing its disclosure.
- 9/18/18: Engineering Privacy for Verified Credentials: In Which We Describe Data Minimization, Selective Disclosure, and Progressive Trust []{#pki}
PKI
Public-Key Infrastructure. A methodology to ensure the creation, storage, distribution, and revocation of public keys. See Also: Keys.
- 12/23/15: Decentralized Public Key Infrastructure
Reputation
A system for measuring the behavior of entities.
- 10/30/19: Reputation Interpretation
- 9/12/17: Design Considerations for Decentralized Reputation Systems
- 2/17/17: Portable Reputation Toolkit Use Cases
Self-Sovereign Identity
*Identity controlled by the user. See “The Path to Self-Sovereign Identity” for its origination. See papers under Identity, Decentralized
Signature
A means for verifying the authenticity of a message or transaction by signing it with a private key.
- 8/18/17: LD Signature Format Alignment
- 10/18/16: Smarter Signatures: Experiments in Verifications
- 12/23/15: Smart Signatures
Social Networks
An online service that supports the creation of relationships between individuals and the sharing of information among these entities.
Software
RWOT events have sometimes produced software prototypes.
- 8/26/19: Satyrn: A Markdown-based JavaScript Sandbox
- 8/18/17: LD Signature Format Alignment
Theory
Thoughtful postulations that suppose how things work.
- 2/21/17: The DCS Theorem
Threat Models
Ways that things could go wrong.
Use Cases
Explorations of situations where the Web of Trust could be used.
- 7/8/20: Driving Adoption with Focus on Basic Human Needs: Safety and Security
- 2/13/19: Use Cases and Proposed Solutions for Verifable Offline Credentials
- 12/5/18: How to Convince Dad* of the Importance of Self-Sovereign Identity
- 7/13/18: Amira 1.0.0
- 9/18/17: Re-Imagining What Users Really Want
- 4/14/17: Joram 1.0.0
- 9/6/16: Powering the Physician-Patient Relationship with HIE of One Blockchain Health IT
- 8/12/16: Protecting Digital Identities in Developing Countries
- 12/23/15: Opportunities Created by the Web of Trust for Controlling and Leveraging Personal Data
Verifiable Credentials
A tamper-evident set of claims about the same entity.
- 5/22/23: A Credential Profile Comparison Matrix to Facilitate Technical and Non-technical Decision Making
- 2/15/23: Composing Credentials via LinkedClaims and Cryptographic Binding
- 2/3/23: Identifier Binding: defining the Core of Holder Binding
- 12/19/22: Verifiable Issuers & Verifiers
- 12/15/22: Linking Credentials with Data Exchange Agreements through Secured Inclusive Interfaces
- 11/19/19: Alice Attempts to Abuse a Verifiable Credential
- 11/19/19: Blockcerts v3 Proposal
- 7/8/20: Driving Adoption with Focus on Basic Human Needs: Safety and Security
- 7/22/19: Digital Credential Wallets
- 2/13/19: IPLD as a General Pattern for DID Documents and Verifiable Claims
- 2/13/19: Use Cases and Proposed Solutions for Verifable Offline Credentials
- 9/18/18: Engineering Privacy for Verified Credentials: In Which We Describe Data Minimization, Selective Disclosure, and Progressive Trust
- 6/20/18: Open Badges are Verifiable Credentials
Verifiers & Verification
The act of proving the accuracy of something.
- 12/19/22: Verifiable Issuers & Verifiers
- 11/26/18: Resource Integrity Proofs
Wallets
A digital means to store private keys and their associated public keys.
- 7/22/19: Digital Credential Wallets
Web of Trust
A method for assessing trust based on peer-to-peer processes.
- 11/30/18: Peer to Peer Degrees of Trust
- 2/2/17: Embedding Human Wisdom in Our Digital Tomorrow
- 12/23/15: Rebranding the Web of Trust
- 12/23/15: Creating the New World of Trust