4.4.1 Core Architecture of the System
Three-Layer Components Building an "Anonymous Trusted Identit
The decentralized identity system of Anonymous Imperium forms a complete closed loop of "confirmation of rights - verification - privacy protection" through three interrelated core components, which not only ensures the authenticity and credibility of the identity, but also prevents excessive exposure of identity information.
Identity Identifier (DID): A Decentralized "Digital ID Number"Technical characteristics: Each user's identity identifier (in the format of did:ais:<encrypted string>) is generated by an asymmetric encryption algorithm, and is completely decoupled from the user's real identity (name, ID number, phone number, etc.), and does not rely on any centralized institution (such as an Internet platform or operator) for allocation and management.Generation and management: Through the Anonymous Imperium wallet client, users independently generate the public key and private key corresponding to the identity identifier. The private key is only stored in the user's local device (such as a hardware wallet and terminal encrypted storage), and no one (including the Anonymous Imperium team) can obtain or tamper with it.Core value: The identity identifier is globally unique and unforgeable, and has no direct connection with the user's asset address, application account and other information, avoiding "privacy loss across platforms caused by the leakage of a single identity". For example, users can use the same identity identifier on the zk-Social social platform and Oasis DEX without worrying about the identity information of the two scenarios being linked and tracked.
Verifiable Credential (VC): An Authoritative "Digital Qualification Certificate"A verifiable credential is structured data issued by an authoritative institution (such as the DID Global Digital Identity Alliance, immigration bureaus of various countries, and professional certification institutions) to prove one or more qualifications of a user (such as "over 18 years old", "possessing lawyer qualification", and "no bad credit record"). Its core features are "authoritative endorsement, on-chain verifiability, and privacy controllable".Issuance and storage: When issuing a credential, the issuing institution encrypts the content with its own digital signature, and then uploads the "encrypted hash value" of the credential to the chain for evidence storage (only the hash is recorded on the main chain, not the complete credential). The complete credential is independently stored by the user in a local device or the DePIN decentralized storage network.Core value: The credential is endorsed by an authoritative institution to ensure the authenticity of the information; at the same time, the user independently keeps the complete credential, avoiding "abuse or leakage of qualification information by centralized platforms".
Zero-Knowledge Proof (ZKP): The Key Technology for "Proving Validity Without Revealing Details"Zero-Knowledge Proof is the core link connecting "identity identifier" and "verifiable credential", solving the industry pain point of "how to prove that you have a certain qualification without revealing the details of the qualification".Verification logic: When a user needs to prove their qualifications to a service provider (such as an application platform or a financial institution), there is no need to present the complete verifiable credential. They only need to generate an encrypted proof of "valid credential" (the proof size is about 100 bytes, and the verification time is about 120ms) through Zero-Knowledge Proof technology. The service provider can quickly verify the authenticity of the proof through the credential hash value stored on the chain.Typical scenario: When a user applies for a cross-border electronic visa of a certain country, they need to prove that they are "over 18 years old and have no bad records". Through Zero-Knowledge Proof, they only submit an encrypted proof of "possessing these two qualifications" to the immigration system. The immigration bureau cannot obtain the user's specific date of birth, place of household registration, past behavior details and other privacy information, but can confirm that the user meets the visa application conditions.Core value: On the premise of ensuring "verifiable qualification", it maximizes the protection of user privacy and completely breaks the traditional identity verification dilemma of "proof means disclosure".
最后更新于