Cipher ID

CIPHER ID provides a self-sovereign system of data authorization and ownership confirmation, thereby granting true control to users. The entire process of ID generation, storage, updation, and other critical operations are fully automated and decentralized in nature, thereby allowing the users operating within the ecosystem to have full control and ownership of any data that may be associated with them. Discrete IDs linked across various ecosystems can have multiple delegates and attributes. In the form of verifiable credentials, entities can make and verify claims in terms of data ownership, access rights, and validation. Since any entity that is part of the network can do this, this makes the CIPHER ID framework a strong contender to build an account mechanism with a high degree of disintermediation.

A few characteristics of CIPHER ID:

  • Decentralization

  • Self-sovereignty and management

  • Privacy protection

  • Security

  • Ease of use

Cipher establishes a decentralized trust model and a distributed trust delivery system through CIPHER ID and a mechanism that uses verifiable claims. It uses the zero-knowledge proof protocol to assure the privacy protection of verifiable claims. Through CIPHER ID, Cipher will also incorporate various authentication service agencies, and establish multi-source authentication to achieve a more complete picture of the respective entity's identity. Trust Anchor Signing server CNS‚Äč

Verifiable credentials allow for the entities that are a part of the trust network to make claims related to their identity within the scope of the network, which can then be verified for their validity by other entities using a decentralized trust mechanism. More details on verifiable credentials and the trust mechanism are available in the next section.

In addition to building a trust network that relies on certain central entities, different entities can also build strong trust relationships amongst themselves. Such a credibility based network is generated through mutual authentication between entities. The higher the number of successful authentications, the higher the credibility of a particular entity. High credibility rating would make the entities more reliable and trustworthy, and authentication from a high credibility entity will equate to higher credibility for the said entity.

CIPHER ID also comes with CipherCredit, a feature that takes on-chain data and behaviour, runs it through an algorithm to determine the reliability and generates credentials.

Salient Features

Some of the main features of the CIPHER ID framework are listed below.

Account Mechanism

An account mechanism that links to wallet addresses and is supported across the Cipher, Ethereum, and Binance Smart Chain ecosystem on the application layer.

Cross-chain Identity Aggregation

Linking to the respective contracts deployed on the Ethereum, Cipher and BSC chains to facilitate interoperability in the form of off-chain services such as an Oracle. Also, cross-chain communication between the CIPHER ID contracts deployed on Cipher Protocol and the target chain respectively.

Multi-asset Support

Support for assets from multiple chains (Bitcoin, Ethereum, Cipher, etc.)

Credit Score

A reputation score assigned to addresses based on transactional data such as asset ownership, transaction history with smart contracts, etc.

Self-sovereign identity

In the context of CIPHER ID, the term entity refers to the following:

  • Individuals - Individual users of CIPHER ID

  • Legal entities - Institutions, organizations, enterprises, etc.

  • Objects - Mobile phones, automobiles, IoT devices, etc.

  • Content - Research, creative content, etc.

It is important to note that the term identity strictly refers to an entity's identity within the Cipher trust network.

A CIPHER ID is basically an identifier within the scope of the system. All the entities that are part of the network shall have a Cipher Identifier (CIPHER ID) that identifies and manages it's identity.

Users can register their CIPHER IDs using Cipher's CipherWallet.

On the Cipher blockchain, an entity can correspond to multiple individual IDs, and there need not exist any kind of relationship between the said multiple IDs.

The CIPHER Auth and Signing server services will be deployed on the Cipher mainnet.

A signing server is a back end service that links CIPHER ID from end user to the account system inside an application.

Workaround for Traditional Systems

It is normal for traditional businesses to have partially, or fully centralized systems. Thus, keeping such scenarios and use cases in mind, CipherProxy has developed a workaround for centralized systems to integrate and use CIPHER ID.

The ID can be handed back to the user by changing the owner property of an CIPHER ID from the application to the end user. While conceptually, the CIPHER ID is delegated from the user to the application server host. The terms for this shall be prepared in advance, and the user would then authorize this 'delegation' by accepting the terms.

Technically speaking, the delegated CIPHER ID is able to perform the following tasks:

  • Perform actions such as registration and login within the system on behalf of the user,

    and publishing results to the Cipher mainnet.

  • Enable the users to take over full control and ownership of their CIPHER ID if they wish to do so.

Integration Tools

The CIPHER ID framework can be readily integrated to other systems. All the features and services are available in the form of public APIs and SDKs.