ECDH-1PU is a key derivation process that offers sender authenticity, as well as significant performance gains over existing ECDH-ES aproaches.

Submitted by SecureKeys Baha Shaaban, edited by DIF’s Chris Kelly

In short, ECDH-1PU is a key derivation process that allows for sender authenticity and enables a “Perfect Forward Secrecy” mechanism…


The Decentralized Identity Foundation announced recently a new mechanism for rewarding and funding work in the common interest of its membership, the DIF Grants Program. The Steering Committee ratified an addendum defining these collaborations between a specific DIF working group and a grant sponsor, and this shiny new tool sits…


Having shown in our last piece how interoperability “profiles” are designed, we now tackle some key technical problem areas ripe for this kind of profile-first interoperability work across stacks.

In our last essay, we explored the means and ends of interoperability targets and roadmapping across stacks and markets. “Interoperability,” like…


Medium-term interoperability challenges

[Written in consultation with the Interoperability Working Group chairs]

In our last essay, we explored the means and ends of interoperability targets and roadmapping across stacks and markets. “Interoperability,” like “standardization,” can be a general-purpose tool or an umbrella of concepts, but rarely works from the top-down…


Conformance Testing for Measurable Goals

[Written in consultation with the Interoperability Working Group chairs]

A recurring topic in the Interoperability Working Group is that of defining short-, medium- and long-term goals or “targets” for interoperability. The topic comes up again every few months, and each time it does, the chairs…


A simple starting point for cross-stack Wallet-Credential Interactions

WACI = Wallet And Credential Interactions

WACI was introduced at the annual IIW32 Workshop, where it was received quite warmly as a step forward for open specification. …


The DIF Steering Committee has approved the first major release of the Sidetree Protocol specification, “v1” so to speak. Here is a snapshot of the four companies and four implementations that stretched and built the specification.

Scalable, Flexible Infrastructure for Decentralized Identity

This week, the DIF Steering Committee officially approved the first major release of the…


Competitors working together in the open

Having gone over the subtleties and complexities of open-source software and open standards in general, we will now drill down into how exactly DIF advances both, in the form of a “Frequently Asked Questions” (FAQ) document. Topics covered include:

  • What “standardization” means to DIF…


Come for the summaries, stay for the clip reel, bookmark for the links!

DIF held its semiannual “Face-to-Face” community’ event this week, and man what an event it was! For obvious reasons, it was virtual for the second time, and for the first time, it spanned both Zoom and the…


This marks the first donation of a Rust “crate” (package) to the group

Over the years, the Identifiers and Discovery WG at the DIF has received many donations that form a vital resource for developers of DID-based systems: recently, a flotilla of complementary secret recovery mechanisms, a command-line tool for…

Decentralized Identity Foundation

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store