Decentralized
Identities (DID)

Decentralized Identity (DID) represents an onchain identifier facilitating a secure and verifiable digital identity. This approach ensures that an individual’s identity remains self-owned and isn’t subject to control by a central authority. Instead, it is managed autonomously on decentralized platforms like blockchains. This innovative identity model enhances security, privacy, and user-controlled identity verification and data sharing.

Key Components:

Decentralized Identifiers: Unique, persistent, and cryptographically verifiable identifiers that do not require centralized issuers, such as governmental agencies or social media platforms. These are generated and controlled by the DID subject.

Verifiable Credentials: Digital attestations or claims made by trusted issuers regarding a specific subject associated with a Decentralized Identifier (DID). These credentials can be shared by the DID subject with others without revealing the original source of the claim, thus safeguarding the subject’s privacy and preserving the trustworthiness of the information.

Resolvable: data can be discovered by any DID-compatible platform, making them interoperable.

DID Documents: A set of data describing the DID subject, such as cryptographic public keys, that assist in the verification processes.

DID Resolvers: Systems that fetch DID documents based on the given DID.

The Problem

Data
Privacy

Traditional identity systems often permit unauthorized data access, whereas Fhenix maintains continuous data encryption. Users may also employ Zero-Knowledge (ZK) proofs and other advanced encryption techniques to prove specific attributes without exposing their underlying data. An example could include proving that one’s vote is valid without revealing personal details.

Data
Security

Traditional identity systems are frequently subject to data exploits. Fhenix’s encrypted computation safeguards privacy by ensuring data remains encrypted at all times, even during processing. This safeguards sensitive information from potential breaches and unauthorized access.

Regulatory
Compliance

Many regions and industries have stringent data protection laws that pose security and compliance costs on organizations. Fhenix makes it easy to comply with such regulations by providing the highest level of data protection.

Interoperability &
Data Portability

DIDs operate across various platforms and services. Encryption ensures that while this data is portable and interoperable, it remains confidential and can only be accessed by entities with the appropriate decryption capabilities.

Why Fhenix?

Data Privacy: FHE enables computations on encrypted data without ever decrypting it, ensuring complete privacy preservation. Unlike Trusted Execution Environments, where data is decrypted within a secure enclave, FHE keeps data encrypted at all stages, reducing exposure to unauthorized access or leaks.

Universal Computing & Diverse Applications: FHE stands out for its ability to execute virtually any computation on encrypted data, providing a universal solution for all possible DID requirements. This also means that FHE can be utilized across a broader range of applications, enabling more complex and privacy-preserving applications. In contrast, existing technologies like MPC and ZK are often designed for specific types of computations or applications.

No Trusted Third Parties: Both Trust Execution Environments and MPC technology may require trusted third parties or trust setup procedures. FHE operates without any need for trusted third parties, perfectly aligning with the decentralized ethos inherent to DIDs.

Simplified Infrastructure: MPC requires coordination amongst multiple parties, while Trust Execution Environments require extremely specialized hardware. In contrast, FHE greatly simplifies the infrastructure requirements for secure computations.

Non-Interactive: Many encryption schemas such as MPC are interactive, meaning they require coordination amongst parties. This introduces complexity and inefficiencies, whereas FHE’s non-interactive nature ensures computations are streamlined.

Enhanced Regulatory Compliance: With stringent data protection laws, FHE’s robust privacy-preserving feature can aid in data privacy and compliance, making it easier for DIDs to reach broader adoption.

Data Privacy

FHE enables computations on encrypted data without ever decrypting it, ensuring complete privacy preservation. Unlike Trusted Execution Environments, where data is decrypted within a secure enclave, FHE keeps data encrypted at all stages, reducing exposure to unauthorized access or leaks.

Universal Computing & Diverse Applications

FHE stands out for its ability to execute virtually any computation on encrypted data, providing a universal solution for all possible DID requirements. This also means that FHE can be utilized across a broader range of applications, enabling more complex and privacy-preserving applications. In contrast, existing technologies like MPC and ZK are often designed for specific types of computations or applications.

No Trusted Third Parties

Both Trust Execution Environments and MPC technology may require trusted third parties or trust setup procedures. FHE operates without any need for trusted third parties, perfectly aligning with the decentralized ethos inherent to DIDs.

Simplified Infrastructure

MPC requires coordination amongst multiple parties, while Trust Execution Environments require extremely specialized hardware. In contrast, FHE greatly simplifies the infrastructure requirements for secure computations.

Non-Interactive

Many encryption schemas such as MPC are interactive, meaning they require coordination amongst parties. This introduces complexity and inefficiencies, whereas FHE’s non-interactive nature ensures computations are streamlined.

Enhanced Regulatory Compliance

With stringent data protection laws, FHE’s robust privacy-preserving feature can aid in data privacy and compliance, making it easier for DIDs to reach broader adoption.