Definitions
User Vault (User Vault)
A User Vault is where personal information is securely stored. It contains the user’s verified and encrypted data, such as documents collected during the document verification or generated verifiable credentials. The User Vault is distributed as the data it contains is fragmented and uploaded across several storage nodes within the network.
Threshold Encryption (TH Encryption)
Threshold encryption is a cryptographic technique that allows a group of participants to jointly decrypt a message, without revealing the message to any individual participant. The decryption requires cooperation and agreement from a specified minimum number of participants, known as the threshold.
Proxy ReEncryption or Transform encryption (PRE)
Proxy re-encryption (PRE) is a cryptographic technique that allows a third party (the proxy) to transform ciphertext encrypted under one public key into ciphertext encrypted under another public key, without learning the underlying plaintext. This enables secure data sharing where the original data owner doesn't need to be online or share their private key with recipients.
Web Identifier (WebID)
WebID (Web Identifier) is a standard way of representing a person or organization on the web, using a unique URI (Uniform Resource Identifier) that serves as a persistent identifier for the entity. The WebID specification defines a decentralized and distributed identity system that allows users to create, manage, and share their own identity online, while also being able to control the use of their personal data.
Decentralized Identifiers (DID)
DIDs (Decentralized Identifiers) are a new type of globally unique identifier that enables verifiable digital identity without reliance on a centralized authority. They are self-owned, persistent, and cryptographically verifiable, linking subjects (people, organizations, things) to their decentralized key management systems and other identity-related data.
Universally Unique Identifier (UUID)
A UUID is a 128-bit identifier that is designed to be globally unique, meaning that no two UUIDs are expected to be the same. It is used in computer systems and software applications as a way to uniquely identify entities such as files, devices, users, and transactions.
Decentralised Storage Secret Management (DSSM)
Secret management systems typically provide a centralized way to securely store, manage, and distribute secrets. They may include features such as encryption, access control, auditing, and automatic rotation of secrets to enhance security. These systems are often integrated with other security tools and processes to provide a comprehensive security solution.
Know Your Customer (KYC)
KYC stands for "Know Your Customer," which refers to the process of verifying the identity of a customer or client as a part of due diligence and anti-money laundering procedures. KYC is a regulatory requirement in many industries, particularly in banking, finance, and e-commerce, where there is a risk of fraud, money laundering, or terrorist financing.
Verifiable credentials (VC)
A veriviable credential is a digital record that contains information about a person's identity, qualifications, certifications, or other relevant attributes. It is designed to be a secure, tamper-evident way to share personal information with others, it is based on decentralized identity principles and is designed to be shared directly between individuals, organizations, and other entities.
Selective disclosure (SD)
Selective disclosure allows you to reveal only specific parts of a verifiable credential while maintaining its verifiability without relying on a trusted third party.
Verifiable presentation (VP)
In SSI, a Verifiable Presentation is a collection of one or more Verifiable Credentials presented by a holder to a verifier, proving certain claims.
Zero Knowlege Proofs (ZKP)
Zero-Knowledge Proofs (ZKPs) are a cryptographic method where one party (the prover) can convince another party (the verifier) that a statement is true, without revealing any information beyond the truth of the statement itself.