Table of Contents - X Suppl. 45 (12/2025) - ITU-T X.1403 – Supplement on rationale and initial approach of a decentralized identity system (DIS) based on verifiable data
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Supplement 4 Abbreviations and acronyms 5 Conventions 6 Introduction 7 Implementation and components of decentralized identity system 7.1 Identity assurance triangle in verification process 7.2 Decentralized identifier 7.3 Verifiable credential and verifiable presentation 7.4 Verifiable data registry, identity verification and identity assurance 8 Practical use cases 8.1 Use case 1: Managed birth certificate verification 8.2 Use case 2: Website navigation and tax payment 8.3 Use case 3: University degree/electronic transcript/micro-credential verification 8.4 Use case 4: Medical prescription verification 8.5 Use case 5: Mobile driver's license verification 8.6 Use case 6: Verifiable health credential verification 8.7 Use case 7: Age verification 8.8 Use case 8: Identity verification in KYC (know your customer) and AML (anti-money laundry) process 8.9 Use case 9: Privacy preserving employment application using university certificates 9 Usability considerations 10 Potential application of decentralized identity system Appendix I – Example of possible implementation plan and timelines for decentralized identity system I.1 Preliminary steps (approximately three months) I.2 System development (approximately 15 months) I.3 Testing, deployment, and feedback (approximately five months) I.4 Broad adoption Appendix II – Literature review II.1 Existing systems II.2 Approach II.3 Related technologies Page II.4 Standards and regulations Appendix III – Example of data format for verifiable credential of mobile driver's license in Jason III.1 Example of verifiable credential for mobile driver's licence Appendix IV – Properties of decentralized identifiers IV.1 Non-re-assignable IV.2 Resolvable IV.3 Cryptographically verifiable IV.4 Decentralized Bibliography
|