Fact-checked by Grok 2 weeks ago

Decentralized identifier

Decentralized Identifiers (DIDs) are a type of globally that enables verifiable, decentralized decoupled from centralized registries or authorities. Defined in a format beginning with "did:", followed by a method name and a method-specific string, DIDs associate with a DID document containing cryptographic material such as public keys, authentication methods, and service endpoints. The (W3C) published the DID Core specification as a Recommendation on July 19, 2022, establishing it as an open web standard for creating and resolving these identifiers across distributed systems like blockchains. DIDs facilitate self-sovereign identity (SSI) by allowing individuals or entities to control their identifiers and associated verifiable credentials without intermediaries, enhancing privacy through selective disclosure and cryptographic proofs. Key properties include persistence, resolvability with high availability, and cryptographic verifiability of ownership or control, making them suitable for applications in digital wallets, decentralized finance, and cross-platform authentication. Various DID methods exist, each leveraging different underlying technologies—such as distributed ledgers or peer-to-peer networks—to ensure decentralization and tamper-resistance. Adoption has grown in ecosystems like the XRP Ledger and IOTA, where DIDs support secure, user-centric identity verification for tasks ranging from access control to credential issuance. While primarily technical, DIDs address longstanding issues in centralized identity systems, such as single points of failure and data breaches, by distributing control and verification mechanisms.

Definition and Principles

Core Components and Syntax

A Decentralized Identifier (DID) adheres to a specific syntax defined as did:<method-name>:<method-specific-id>, where the "did:" is fixed, <method-name> consists of one or more lowercase letters (a-z) or digits (0-9), and <method-specific-id> is a method-defined string of allowed characters ensuring uniqueness within the method. This format, specified in the W3C DID Core Recommendation, enables global resolvability without reliance on centralized registries, with the method name indicating the or for generation and resolution, such as example in did:example:123456789abcdefghi. DID URLs extend this basic syntax to incorporate standard URI components for resource addressing, following the Augmented Backus-Naur Form (ABNF) DIDURL = "did" path-abempty [ "?" query ] [ "#" fragment ], allowing optional paths (e.g., /resource), queries (e.g., ?version=1), and fragments (e.g., #key-1) to reference specific elements within a resolved DID document. For instance, did:example:123#keys-1 uses a fragment to denote a verification method. The primary core component associated with a DID is the DID document, a JSON-serializable that describes the DID subject and includes mechanisms for verification, such as cryptographic keys and service endpoints. It typically employs for , with an @context property set to "https://www.w3.org/ns/did/v1" to define the vocabulary. The document's core properties form a minimal set for functionality:
PropertyRequiredDescription
idYesThe DID string itself, serving as the document's identifier (e.g., "did:example:123456789abcdefghi").
verificationMethodNoAn array of objects defining cryptographic methods, each with id (a DID ), type (e.g., "Ed25519VerificationKey2020"), controller (a DID controlling the method), and material like publicKeyMultibase or publicKeyJwk.
authenticationNoAn array of strings or objects referencing methods for entity (e.g., ["#keys-1"] or full method objects).
Additional optional properties include service for endpoint descriptions (e.g., {"id": "#hub", "type": "HubService", "serviceEndpoint": "https://hub.example.com"}) and relationships like assertionMethod or keyAgreement for specialized verification uses. An example minimal DID document is:
json
{
  "@context": "https://www.w3.org/ns/did/v1",
  "id": "did:example:123456789abcdefghi",
  "authentication": ["#keys-1"],
  "verificationMethod": [{
    "id": "did:example:123456789abcdefghi#keys-1",
    "type": "Ed25519VerificationKey2020",
    "controller": "did:example:123456789abcdefghi",
    "publicKeyMultibase": "zH3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
  }]
}
This structure supports tamper-evident operations, with the DID controller—typically the DID subject—managing updates via method-specific processes.

Relation to Self-Sovereign Identity

Decentralized identifiers (DIDs) serve as a core technical enabler for (SSI), a paradigm that emphasizes user control over without reliance on centralized intermediaries. In SSI systems, individuals generate and manage their own identifiers, which DIDs facilitate by operating independently of any single authority, resolving to DID documents containing public keys, methods, and service endpoints. This structure allows users to prove attributes via cryptographic proofs while retaining over disclosure and revocation. The (W3C) specifies DIDs as identifiers designed for verifiable, decentralized , explicitly supporting SSI use cases where entities control their own identity infrastructure. For instance, DIDs integrate with (VCs), another SSI pillar, by providing the subject's identifier in credential structures, enabling issuers to link claims to a user's DID without storing centrally. This contrasts with models, where providers like governments or corporations hold authoritative control, as DIDs distribute resolution across multiple verifiable data registries, reducing single points of failure and enhancing privacy through selective disclosure. While DIDs are necessary for SSI—enabling the decentralized anchoring and verification required for user-centric control—not all DID implementations inherently achieve full self-sovereignty, as sovereignty also demands complementary mechanisms like private key management and consent-based . The Decentralized Identity Foundation notes that SSI presupposes decentralized identifiers but extends beyond them to encompass governance models prioritizing individual agency over institutional custody. Standardization efforts, such as the W3C DID Core Recommendation finalized on July 19, 2022, underscore this linkage by focusing on for SSI ecosystems, including blockchain-anchored methods that persist identifiers immutably.

Historical Development

Origins in Decentralized Systems

The concept of decentralized identifiers arose in the mid- as technologies, starting with Bitcoin's 2008 whitepaper and Ethereum's 2015 launch, demonstrated the feasibility of distributed ledgers for secure, tamper-resistant data management without intermediaries. These systems highlighted the limitations of centralized identifiers, such as domain names or email addresses, which rely on registrars vulnerable to , single points of failure, and privacy erosion, prompting exploration of cryptographically verifiable alternatives anchored in decentralized networks. Early efforts focused on using s for identifier resolution, leveraging their immutability to store public keys and metadata, thereby enabling self-sovereign control over digital identities. Preliminary proposals for decentralized identifiers emerged in 2014 within the W3C Web Payments Community Group, where Manu Sporny and Dave Longley discussed identifiers linked to cryptographic key pairs in systems, building on Jeremie Miller's earlier Telehash project for decentralized communication protocols. By 2015, the XDI.org Registry Working Group, seeking to replace its centralized infrastructure, began developing -based registries, including experiments with Bitcoin's OP_RETURN opcode for embedding identifier data. These initiatives addressed the need for persistent, resolvable identifiers independent of any single , drawing from extensible resource identifiers (XRI) standards but adapting them to distributed systems like blockchains for enhanced resilience. In 2016, the Rebooting the Web of Trust (RWoT) workshops formalized decentralized identifier concepts, with participants including Christopher Allen producing white papers on decentralized (DPKI) and proposing (URN)-like syntax for multi-blockchain compatibility. This period marked a convergence of principles with practical implementations, such as Evernym's exploration of permissioned s for , funded by the U.S. Department of . Drummond Reed and others contributed initial documentation on identifier structures resolvable via decentralized methods, setting the stage for broader adoption in ecosystems like Sovrin, a public permissioned launched in 2017 for identity anchoring. These developments emphasized causal linkages between and decentralized consensus mechanisms to ensure verifiability without trust in centralized entities.

Key Milestones and W3C Standardization

The foundational concepts underlying decentralized identifiers were first explored in collaborative papers produced during the initial workshops, which began in November 2015 and focused on decentralizing trust mechanisms for . These efforts built on broader discussions in , emphasizing cryptographic verifiability without reliance on centralized authorities, and laid the groundwork for subsequent specifications through community-driven iterations. Development accelerated with the establishment of the Decentralized Identity Foundation (DIF) in 2017, which coordinated early technical specifications and prototypes for DIDs, including initial method implementations tested in and contexts. The W3C Decentralized Identifier Working Group was formally chartered on September 30, 2019, with a mandate to produce a standardized core specification encompassing DID , , and document structure, operating under the W3C to ensure broad . The working group advanced the DID v1.0 specification through multiple drafts, incorporating input from over 30 active contributors since 2019, atop prior community work involving dozens of participants. On June 30, 2022, the W3C Director approved advancement to Proposed Recommendation status, marking a pivotal validation of the specification's maturity. DID v1.0 achieved full W3C Recommendation status on July 19, 2022, becoming the first new identifier standard endorsed by the consortium since the Uniform Resource Locator (URL), thereby enabling verifiable, decentralized digital identity across web ecosystems. Post-standardization, the W3C initiated updates, with DID v1.1 entering draft stages to address refinements in service endpoints and verification methods, while a rechartered extended efforts through April 2026 to support ongoing evolution and method-specific extensions. This progression reflects a deliberate shift from experimental prototypes to robust, globally resolvable identifiers, prioritizing persistence and cryptographic assurance over centralized registries.

Technical Architecture

DID Documents and Structure

A DID document is a machine-readable description of the subject associated with a decentralized identifier (DID), containing data such as cryptographic verification methods and service endpoints that enable decentralized interactions. It serves as the primary mechanism for expressing the capabilities and metadata of the DID subject, allowing controllers to prove cryptographic control without reliance on centralized authorities. Published as a W3C Recommendation on 19 July 2022, the DID Core specification defines its structure to ensure interoperability across DID methods. The document follows a JSON-based format, typically serialized as to provide semantic context via an @context property, such as "https://www.w3.org/ns/did/v1", which links to the DID vocabulary. The sole required property is id, a string that must exactly match the DID URI it describes, ensuring unambiguous identification. All other properties are optional, allowing flexibility based on the DID subject's needs, though core properties like verificationMethod are commonly included for practical utility. Key properties include:
PropertyTypeDescription
verificationMethodSet of objectsDefines embedded or referenced verification methods, each with id, type, controller, and verification material (e.g., public keys). Used as building blocks for other properties.
authenticationArray of strings/URIsReferences verification methods for proving DID controller possession, often via digital signatures.
serviceSet of objectsSpecifies service endpoints (e.g., "serviceEndpoint": "https://example.com" ) for interactions like messaging or credential issuance.
keyAgreementArray of strings/URIsReferences methods for key agreement protocols, such as deriving shared secrets for encryption.
assertionMethodArray of strings/URIsReferences methods for creating verifiable assertions or claims about the DID subject.
capabilityInvocationArray of strings/URIsReferences methods for invoking capabilities, like authorizing actions via signatures.
capabilityDelegationArray of strings/URIsReferences methods for delegating capabilities to other parties.
Additional optional properties encompass controller (identifying DID controllers), alsoKnownAs (alternative identifiers), and equivalentId (semantically equivalent DIDs). An example DID document illustrating basic authentication:
json
{
  "@context": ["https://www.w3.org/ns/did/v1"],
  "id": "did:example:123456789abcdefghi",
  "verificationMethod": [{
    "id": "did:example:123456789abcdefghi#keys-1",
    "type": "Ed25519VerificationKey2018",
    "controller": "did:example:123456789abcdefghi",
    "publicKeyBase58": "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
  }],
  "authentication": ["did:example:123456789abcdefghi#keys-1"],
  "service": [{
    "id": "#linked-domain",
    "type": "LinkedDomains",
    "serviceEndpoint": "https://blockchain.example.com"
  }]
}
This structure supports resolution via DID methods, where the document is retrieved and validated against the DID to facilitate trust in decentralized systems.

DID Methods and Resolution Processes

DID methods are specifications that define the mechanisms for creating, resolving, updating, and deactivating decentralized identifiers (DIDs) and their associated DID documents within a specific verifiable data registry, such as a or distributed system. Each DID method corresponds to a unique scheme identifier following the DID URI format did:<method-name>:<method-specific-id>, where the method name indicates the for operations. These specifications must ensure uniqueness, authorization for changes, and compliance with core DID requirements, including cryptographic verification of authenticity during resolution. The core operations specified by DID methods include , which generates a new DID and initial under the control of a DID controller; , which maps the DID to its current ; updating, which allows modifications to the DID document such as key rotations or service changes; and deactivation, which renders the DID invalid while preserving immutability where applicable. For instance, the did:key method derives the DID directly from a public key's multibase encoding, supporting immediate and without external storage but limiting updates to generating new DIDs. In contrast, the did:web method leverages -secured domain names for the method-specific identifier, enabling via DNS control and through HTTP requests to a .well-known hosting the . As of the W3C DID Core Recommendation in 2022, over 112 experimental and production DID methods had been registered, ranging from blockchain-based ones like did:ethr on to variants. DID resolution is the process by which a DID resolver—a software component—takes a DID as input and retrieves the corresponding DID document, along with resolution and document , to enable of associated claims or services. The process begins with syntactic validation of the DID, identification of the method-specific resolver if needed, and execution of the method's "Read" operation against the underlying registry, yielding outputs such as the DID document in or format, creation/update timestamps, and deactivation status. Universal resolvers aggregate support for multiple methods, dispatching requests accordingly, while method-specific resolvers handle proprietary logic, such as querying a via RPC calls. Resolution may occur via local computation for simple methods like did:key, which reconstructs the document from the DID string itself, or remotely through HTTP APIs standardized for , where a GET request to an endpoint like /1.0/identifiers/<DID> returns a structured response with media type application/did-resolution. Security in resolution emphasizes verifiable reads over unverifiable ones to prevent tampering, with metadata flags for caching controls and error codes (e.g., "notFound" or "invalidDid") ensuring robust handling of failures. Method specifications must detail these processes to guarantee persistence and tamper-evidence, as resolution failures can cascade to unverifiable credentials or services linked to the DID.

Integration and Ecosystems

Verifiable Credentials and Data Registries

Verifiable credentials (VCs) are tamper-evident, cryptographically signed data structures that convey claims made by an issuer about a subject, with subjects typically identified via decentralized identifiers (DIDs). The W3C Verifiable Credentials Data Model, published in its 2.0 version on May 15, 2025, defines VCs as including a set of claims, metadata such as issuance and expiration dates, and proofs enabling machine verification without relying on centralized authorities. Issuers sign VCs using private keys associated with their DIDs, while holders store them in digital wallets and present them to verifiers, who resolve the issuer's DID to validate the signature and check revocation status if applicable. This process supports self-sovereign identity principles by allowing individuals to control their data without intermediaries. VCs integrate with DIDs to facilitate privacy-preserving interactions, such as selective disclosure where only necessary claims are revealed, often using zero-knowledge proofs to prove attributes without exposing underlying data. For instance, a VC might assert a user's over 18 without disclosing the exact birthdate, verified against the issuer's public key derived from their DID document. DID resolution, which retrieves associated public keys and service endpoints, is essential for VC verification, ensuring trust anchors in decentralized systems like blockchains or networks. Verifiable data registries (VDRs) provide the for storing and accessing data necessary for DID and VC validation, including DID documents and lists. Defined in W3C specifications, VDRs encompass systems like trusted databases, decentralized databases, ID databases, and distributed ledgers, which maintain immutable records to prevent tampering and ensure availability. In DID methods reliant on registries, such as those using ledgers, VDRs record DID operations like creation, updates, and deactivation, enabling universal without single points of failure. Some DID methods, however, operate without VDRs entirely, relying on direct for verification to enhance . VDRs thus balance and verifiability, with distributed variants like ledgers providing tamper-proof audit trails, as seen in implementations where credentials are checked against ledger-stored issuer metadata.

Applications in Blockchain and IoT

Decentralized identifiers (DIDs) facilitate secure, user-controlled authentication and identity verification on blockchain networks by anchoring DID documents to distributed ledgers, ensuring immutability and resistance to single-point failures. In platforms like the XRP Ledger, DIDs enable verifiable digital identities fully controlled by the owner, supporting applications such as cross-chain asset transfers and decentralized finance (DeFi) protocols where users prove control without revealing excess personal data. Blockchain implementations often pair DIDs with verifiable credentials (VCs) to enable portable identities, allowing seamless migration between systems while maintaining cryptographic proofs of attributes like ownership or access rights. In (IoT) ecosystems, DIDs assign unique, self-administered identifiers to devices, enabling secure machine-to-machine interactions without reliance on centralized registries, which reduces vulnerabilities to breaches. For instance, DID-based systems like TrID use decentralized trust infrastructures to secure data collection, providing tamper-proof access controls and verifiable for sensor data in applications such as smart cities or industrial monitoring. linked to DIDs allow IoT devices to present proofs of authenticity or , as seen in car-to-car communication protocols that preserve through selective disclosure. Hybrid blockchain-IoT applications leverage DIDs for firmware authentication in smart home environments, integrating Layer-2 solutions like Arbitrum with IPFS for decentralized storage and verification, thereby mitigating risks from malicious updates. These integrations enhance , as DIDs resolve to standardized documents containing service endpoints and public keys, supporting scalable ecosystems where devices authenticate via -anchored credentials without exposing underlying infrastructure. Empirical deployments demonstrate reduced in identity resolution compared to traditional certificate authorities, with anchoring providing auditability for high-stakes operations like tracking.

Real-World Usage and Case Studies

Current Implementations Across Sectors

In the government sector, the European Union's European Blockchain Services Infrastructure (EBSI) employs decentralized identifiers (DIDs) as part of its verifiable credentials framework to enable cross-border digital public services, including identity verification and document exchange among member states. The EBSI DID Registry, operational as of July 2025, handles the registration, management, and resolution of DIDs specifically tailored for natural persons and organizations within the ecosystem. Similarly, has deployed mobile national IDs leveraging DIDs and for secure, user-controlled identity verification, with a nationwide rollout to citizens aged 17 and older initiated in March 2025 following regional pilots. Enterprise implementations include Microsoft's Identity Overlay Network (ION), a permissionless DID system built on the blockchain using the Sidetree protocol, which supports scalable, cryptographically verifiable identifiers for issuance and verification. Launched in public preview in 2021 and integrated into Microsoft Entra Verified ID as of June 2025, ION anchors DID operations to for tamper-proof anchoring while enabling high-throughput updates independent of block times. This infrastructure facilitates decentralized across organizational use cases, such as employee and partner . In healthcare, decentralized identifiers support patient-centric data management through frameworks like Hyperledger Indy, which stores DIDs on distributed ledgers to enable selective disclosure of electronic health records without centralized intermediaries. Oracle's self-sovereign identity ecosystem, updated in April 2025, incorporates anonymous credentials (AnonCreds) with DIDs to secure verifiable data sharing in clinical environments, allowing providers to verify attributes like while preserving . These implementations address challenges in e-health by prioritizing user consent and cryptographic proofs over traditional database reliance. Financial services utilize DIDs for streamlined know-your-customer (KYC) processes, particularly in decentralized finance (DeFi) platforms. For instance, uPort's Ethereum-based system, as analyzed in 2024 research, employs DIDs via smart contracts to manage user identifiers for reusable KYC attestations, reducing redundant verifications across institutions. This approach mitigates data silos and enhances compliance by enabling issuers (e.g., regulators) to provide verifiable claims that holders control and verifiers cryptographically validate, though adoption remains concentrated in blockchain-native applications rather than traditional banking as of 2025.

Empirical Evidence of Adoption

The decentralized identifiers (DIDs) ecosystem exhibits signs of emerging adoption through registered methods and pilot integrations, though large-scale empirical metrics on user volumes or transaction counts remain sparse as of 2025. Over 100 DID method specifications have been registered in the W3C-aligned registry, enabling diverse implementations across blockchains and distributed systems, which serves as a proxy for developer engagement and interoperability progress. Market research estimates the DID technology sector grew from $0.57 billion in 2023 to $1.07 billion in 2024, reflecting investments in infrastructure amid rising data privacy demands, though these figures derive from vendor surveys and may incorporate promotional projections rather than audited usage data. Governmental and regulatory traction provides further evidence, with 59% of countries advancing national digital ID systems incorporating decentralized identity elements by early 2025, per global trackers mapping over 100 such initiatives. The European Union's 2.0 regulation, enacted in 2024, mandates support for decentralized wallets and tied to DIDs, spurring public-sector pilots in member states for cross-border . Enterprise adoption in verification contexts reportedly increased from 13% of surveyed organizations in 2023 to broader uptake in 2024, driven by blockchain-based pilots in sectors like provenance and IoT device . Academic analyses of deployed decentralized identity applications, including SSI frameworks reliant on DIDs, document over 50 live projects as of mid-2025, with growth in verifiable credential issuance for use cases such as academic records and professional licensing, yet highlight persistent hurdles in user onboarding and scalability limiting mass deployment. These implementations, often in controlled environments like Indy or Ethereum-based ledgers, demonstrate functional viability but underscore that widespread empirical validation awaits broader testing and cost reductions in processes.

Standardization, Adoption, and Market Dynamics

Global Standards and Regulatory Alignment

The (W3C) established Decentralized Identifiers (DIDs) v1.0 as a formal Recommendation on July 19, 2022, defining the syntax, , core properties, operations, and processes for globally unique, persistent independent of centralized authorities. This standard enables cryptographic verification of control and supports interoperability across decentralized systems, with DID methods registered via the Decentralized Identifiers Foundation (DIF) for specific implementations on blockchains or distributed ledgers. As of January 28, 2025, the W3C DID Working Group published a First Public Working Draft of DIDs v1.1, introducing experimental enhancements while maintaining v1.0 as the stable implementation baseline. Complementary international standards include ISO/DIS 22739 from ISO/TC 307 on and technologies, which incorporates decentralized identifiers as non-centralized, cryptographically generated entities for identity systems. These standards emphasize persistence, resolvability, and verifiability without relying on traditional registries, aligning DIDs with broader digital trust frameworks like . Regulatory alignment is advancing primarily in the through 2.0, enacted to enhance and trust services, which explicitly supports (SSI) models incorporating DIDs for user-controlled digital wallets. The regulation mandates member states to provide European Digital Identity Wallets (EUDI) by 2026, enabling selective disclosure and pseudonymity via DIDs to comply with GDPR's data minimization and consent requirements. This framework positions DIDs as a privacy-preserving alternative to centralized identifiers, though full testing and national implementations remain ongoing as of October 2025. Elsewhere, regulatory efforts are nascent; for instance, U.S. frameworks like NIST's digital identity guidelines reference decentralized approaches but lack DID-specific mandates, focusing instead on risk-based . Globally, DIDs facilitate compliance with laws such as GDPR and CCPA by enabling zero-knowledge proofs and user sovereignty, reducing reliance on data silos prone to breaches, yet jurisdictional fragmentation poses challenges to universal adoption. The decentralized identity market, which includes decentralized identifiers (DIDs) as a foundational , reached an estimated value of USD 1.15 billion in 2024, reflecting early-stage adoption amid rising demand for privacy-preserving authentication systems. Alternative assessments place the 2024 figure at USD 1.52 billion, driven by blockchain and needs in sectors like and healthcare. These valuations underscore the technology's transition from conceptual frameworks, standardized by the W3C in 2022, to practical implementations, though market fragmentation across DID methods contributes to estimate variability. Growth trends are propelled by escalating data breach incidents—over 8,000 reported globally in 2024—and a causal push for user-controlled to mitigate centralized vulnerabilities, as evidenced by a 25% year-over-year increase in blockchain-based identity pilots in settings. Self-sovereign identity (SSI) ecosystems, reliant on DIDs, exhibit similar momentum, with the broader SSI market valued at USD 1.8 billion in 2024 and expanding due to integrations in verification and digital wallets. Empirical adoption data from 2025 indicates over 50 major consortia, including those in the European Blockchain Services Infrastructure, testing DID resolution for cross-border KYC, reducing verification times by up to 70% in controlled trials. Projections forecast exponential expansion, with the DID-specific market anticipated to grow from USD 1.2 billion in 2024 to USD 7.3 billion by 2033 at a (CAGR) of approximately 22%, tempered by challenges. More optimistic estimates for the encompassing decentralized identity sector predict USD 41.73 billion by 2030 at a 53.48% CAGR, fueled by device proliferation necessitating scalable, tamper-resistant identifiers. SSI projections align, estimating USD 47.1 billion by 2029 from a 2024 base of USD 1.8 billion, contingent on regulatory harmonization and reduced reliance on legacy centralized systems. These trajectories, while divergent due to differing scopes in analyst methodologies, converge on double-digit CAGRs exceeding 50% through 2030, predicated on empirical reductions in costs, currently averaging USD 5 million per incident for enterprises.
Source2024 Market Size (USD Billion)Projected Size (USD Billion)YearCAGR (%)
IMARC Group1.1589.632033~62
Verified Market Research1.5239.71203258.74
MarketsandMarkets (SSI)1.847.12029~92
Mordor Intelligence-41.73 (from 4.89 in 2025)203053.48
Such growth hinges on overcoming resolution latency issues, with real-world benchmarks showing DID lookups under 100ms in optimized ledgers, yet remains a barrier for mass adoption projected beyond 2027.

Criticisms and Challenges

Technical Limitations and Security Risks

Decentralized identifiers (DIDs) face constraints primarily due to their frequent reliance on distributed ledgers or s for and anchoring, which can result in high for applications; for instance, networks like exhibit transaction confirmation times averaging 12-15 seconds under normal conditions, with peaks exceeding minutes during congestion, limiting DIDs' suitability for high-throughput scenarios such as instant in large-scale systems. Storage demands also pose challenges, as DID documents and associated metadata require on-chain persistence, incurring costs that scale with network fees—e.g., gas fees for DID registration have fluctuated between $5 and $50 per operation as of 2023, deterring widespread individual adoption without off-chain optimizations. Additionally, processes, standardized in W3C , demand universal resolver infrastructure that remains fragmented, with limited by varying DID method implementations, potentially leading to inconsistent across methods like did:ethr or did:. Security risks in DIDs stem from user-centric , where private keys control all associated identifiers and credentials; compromise via , , or poor device grants attackers irreversible access, as evidenced by wallet hacks resulting in over $3.7 billion in losses across 2022-2023, a amplified in DID ecosystems without centralized mechanisms. The absence of authoritative —unlike centralized systems with authorities—means compromised DIDs persist unless controllers manually rotate keys and notify verifiers, increasing exposure windows; users may remain unaware of breaches for extended periods, as decentralized models shift responsibilities entirely to individuals. threats include correlation risks from public , where repeated DID usage or verifiable presentations can enable de-anonymization through , despite zero-knowledge proofs in some implementations; empirical studies highlight that even privacy-enhanced DIDs leak patterns traceable by advanced adversaries. Further vulnerabilities encompass deserialization attacks on issuer/verifier processes and -specific exploits like 51% attacks on proof-of-work ledgers underpinning certain DID methods, underscoring that does not inherently eliminate single points of failure in undersecured networks.

Adoption Barriers and Governance Issues

Despite growing interest in decentralized identifiers (DIDs), adoption faces significant barriers, including persistent challenges that create silos and hinder cross-platform verification, as highlighted in the 2024 IBC Protocol interoperability report. Regulatory ambiguity further impedes progress, with unclear policies across jurisdictions leading businesses to hesitate due to compliance risks, even as frameworks like the EU's 2.0 emerge. In non-regulated sectors such as and , uptake remains limited without mandates, exacerbating the lack of widespread . User experience and education gaps also pose hurdles, particularly for non-technical users managing cryptographic keys and understanding DID operations, slowing broader deployment. Many initiatives manifest as short-lived pilots without scalable plans, such as Mauritania's digital ID project launched in August 2024, which lacks a clear path to full rollout. Efforts to align DIDs with protection regulations like GDPR and CCPA continue, but these regulatory hurdles contribute to limited real-world integration beyond niche applications. Governance issues in DID systems arise from a fundamental gap: the shift from centralized authorities to distributed stakeholders—issuers, holders, verifiers, and ledger operators—complicates validation, policy enforcement, and accountability. Without robust governance, systems risk fragmentation, inconsistency, and insecurity, potentially leading to misused , regulatory penalties, or eroded trust. Key challenges include managing credential lifecycles (e.g., and updates in sectors like ), coordinating policies via standards from bodies like the Decentralized Identity Foundation, and aligning with compliance frameworks such as NIST 800-63, all of which demand shared agreements to mitigate public ledger dependencies and liability concerns.

Future Prospects

Emerging Technological Developments

Recent advancements in Decentralized Identifiers (DIDs) include enhancements to DID methods that improve integration with diverse networks, enabling more efficient creation, , and updating of without centralized intermediaries. These methods specify protocols for anchoring DIDs to , supporting tamper-resistant operations and reducing reliance on single ledgers for resilience. Innovations in (SSI) frameworks leverage DIDs alongside to facilitate secure, user-controlled in sectors like , where supports gig-economy strategies for digital ID verification. For instance, proposed SSI models incorporate DIDs for persistent, decentralized in dynamic environments such as aerial base stations, ensuring verifiable identities amid mobility challenges. Emerging applications extend DIDs to industrial through decentralised persistent identification (dPID), which combines DIDs with versioning and storage mechanisms for tracking physical and digital assets in , addressing limitations in traditional centralized systems. In , integrations of DIDs with and enable automated credential issuance and verification, promoting privacy-preserving data sharing while mitigating risks of centralized data breaches. Scalability and interoperability improvements focus on hybrid DID resolutions that blend on-chain and off-chain computations, reducing latency in high-volume transactions while maintaining cryptographic verifiability. These developments, driven by W3C-aligned specifications, prioritize quantum-resistant and zero-knowledge proofs to counter evolving security threats in decentralized ecosystems. Emerging work also extends DIDs beyond credentialing into provenance and attribution for AI-mediated content workflows, where a DID document can publish verification keys and service endpoints that support signed assertions about outputs. One project-affiliated example is the Aisentica Research Group’s Digital Author Persona Angela Bogdanova, presented as a public author profile linked to an ORCID iD (0009-0002-6030-5730) and accompanied by a Zenodo-deposited DAP vocabulary package (DOI: 10.5281/zenodo.15770212) that includes a DID document (did.json). The DID document uses a did:web identifier (did:web:zenodo.org:records:15770212:files:did.json) and includes an Ed25519 verification method plus a service endpoint pointing back to the Zenodo record, illustrating how DID primitives can support auditable continuity and attribution for a stable non-human configuration. Such uses remain niche and do not, by themselves, establish consciousness or legal personhood; they instead demonstrate an infrastructure pattern for verifiable, revocable identity claims about automated outputs.

Potential Societal and Economic Impacts

Decentralized identifiers (DIDs) enable individuals to maintain control over their digital without reliance on centralized authorities, potentially reducing data breaches that affected over 300 million people alone between and by distributing across networks. This shift could empower users, particularly in underserved populations, by facilitating access to services like banking and healthcare through , addressing exclusion faced by the 1 billion people worldwide lacking formal identification as of 2023. Societally, DIDs support selective disclosure mechanisms, such as zero-knowledge proofs, allowing of attributes without revealing excess , thereby enhancing in an era where centralized systems exacerbate risks. Economically, DIDs could lower transaction costs in identity-dependent sectors by minimizing intermediaries and losses, which exceeded $5.8 billion in the U.S. in 2021 for alone. In , adoption might streamline know-your-customer (KYC) processes, reducing onboarding times from days to minutes and cutting costs estimated at 5-10% of bank revenues globally. Market analyses project the ecosystem, underpinned by DIDs, to grow from $1.8 billion in 2024 to $47.1 billion by 2029, driven by demand for secure, user-centric systems in and supply chains. Broader implementation could unlock inclusive economic gains, with systems potentially adding 3-13% to GDP in developing economies by enabling and efficient service delivery. However, realizing these impacts depends on overcoming interoperability hurdles and regulatory alignment, as fragmented adoption could entrench digital divides rather than mitigate them. In sectors like healthcare, DIDs might reduce administrative burdens—projected to consume 25% of U.S. healthcare spending—but require robust to prevent misuse of verifiable . Overall, while DIDs promote causal efficiencies in data flows by aligning incentives toward user , empirical outcomes hinge on scalable implementations that prioritize verifiable over speculative centralization alternatives.

References

  1. [1]
    Decentralized Identifiers (DIDs) v1.0 - W3C
    A Decentralized Identifier, or DID, is a URI composed of three parts: the scheme did: , a method identifier, and a unique, method-specific identifier specified ...
  2. [2]
    Decentralized Identifiers (DID) 1.0 specification approved as W3C ...
    Jun 30, 2022 · The W3C has approved the DIDCore V1.0 spec as an official Recommentdation; DIDs are now an open web standard ready for use and further ...
  3. [3]
    Decentralized Identifiers (DIDs) Explained | Curity Identity Server
    Sep 22, 2023 · Decentralized Identifiers are globally unique, persistent and resolvable identifiers that support cryptographic verification of ownership ...
  4. [4]
    Decentralized Identifiers (DIDs) v1.1 - W3C
    Decentralized identifiers (DIDs) are a new type of identifier that enables verifiable, decentralized digital identity.
  5. [5]
    Decentralized Identifiers - XRP Ledger
    Oct 6, 2025 · The DID is associated with a DID document as defined by W3C specifications. A user provides their DID and VC to a verifier for a digital task.
  6. [6]
    Decentralized Identifiers (DID) - IOTA Documentation
    The Decentralized Identifiers (DID) standard from W3C is the fundamental standard that supports the concept of a decentralized digital identity.Decentralized Identifiers · DID Documents · Why Use IOTA Identity Over...<|separator|>
  7. [7]
    What Are Decentralized Identifiers (DIDs)? - Identity.com
    Decentralized identifiers (DIDs) are globally unique identifiers that can be used to identify an entity without a centralized authority.What Are Decentralized... · How to Use Decentralized... · Types of Decentralized...
  8. [8]
    Decentralized Identifier Resolution (DID Resolution) v0.3 - W3C
    Oct 16, 2025 · Decentralized identifiers (DIDs) are a new type of identifier for verifiable, "self-sovereign" digital identity.
  9. [9]
    Use Cases and Requirements for Decentralized Identifiers - W3C
    Mar 17, 2021 · Many Decentralized Identifier use cases focus on Self-Sovereign Identity and individuals. This use case focuses on organizations and their ...
  10. [10]
    DIF FAQ - Decentralized Identity Foundation
    Mar 31, 2021 · In short, Yes they are different. You can have a decentralized identifier system that is not self sovereign, but you can't have a self sovereign ...<|separator|>
  11. [11]
    Decentralized Identifiers (DIDs) v1.0 becomes a ... - W3C
    Jul 19, 2022 · We believe that the self-sovereign identity, or the decentralized digital identity is the future of the Web, and it will induce tremendous ...
  12. [12]
    A Primer for Decentralized Identifiers
    Nov 11, 2021 · A Decentralized Identifier (DID) is a new type of identifier that is globally unique, resolvable with high availability, and cryptographically verifiable.
  13. [13]
    History (2015-2019) Emergence of Blockchain for Identity and the ...
    Jan 5, 2020 · DIDs further enable a Decentralized Identity Management (DIDM) infrastructure that will empower people and organizations to securely and ...
  14. [14]
  15. [15]
  16. [16]
    About RWOT - Rebooting the Web of Trust
    Over the last seven years, Rebooting the Web of Trust has published over fifty collaborative white papers, technical specs, and code repositories. The focus of ...
  17. [17]
    DIF & ToIP on Decentralized Identifiers (DIDs) v1.0 as W3C Standard
    Oct 29, 2021 · DID 1.0 represents the efforts of over thirty active W3C Working Group contributors over the past two years— on top of contributions from dozens ...Missing: history | Show results with:history
  18. [18]
    Decentralized Identifier Working Group Charter - W3C
    A Decentralized Identifier (DID) is an identifier that does not need to be leased; its creation and use is possible without a central authority to manage it.Scope · Deliverables · Normative Specifications
  19. [19]
    Decentralized Identifier Working Group Charter - W3C
    Start date, 25 April 2024. End date, 28 April 2026. Chairs, Will Abramson (Digital Contract Design), Otto Mora (Invited Expert). Team Contact ...Missing: timeline | Show results with:timeline
  20. [20]
    did:web Method Specification
    Jul 31, 2024 · The method specific identifier is a fully qualified domain name that is secured by a TLS/SSL certificate with an optional path to the DID ...<|separator|>
  21. [21]
    Announcing Public Review of the did:webs Method Specification
    Dec 15, 2023 · By the time the DID specification reached a final vote at the W3C in 2022, 112 DID methods had been registered in the W3C DID Spec Registries.
  22. [22]
    Verifiable Credentials Data Model v2.0 - W3C
    May 15, 2025 · The first identifier is for the verifiable credential and uses an HTTP-based URL. The second identifier is for the subject of the verifiable ...<|separator|>
  23. [23]
    The Myths and Truths About Decentralized Identifiers - Curity
    Dec 20, 2022 · In this article we straighten up some misconceptions and provide some basic understanding concerning Decentralized Identifiers (DIDs).
  24. [24]
    Blockchain for Digital Identity | Real World Blockchain Use Cases
    What is a Decentralized Identifier? A decentralized identifier (DID) is a pseudo-anonymous identifier for a person, company, object, etc. Each DID is ...Why do we need Blockchain... · How do Decentralized Digital...
  25. [25]
    What is a Decentralized Identifier (DID)? - Coinbase
    They can be used to identify individuals, organizations, abstract entities, data models, and Internet of Things (IoT) devices. The Purpose of DIDs. The ...
  26. [26]
    Decentralized identifiers based IoT data trusted collection - Nature
    Feb 8, 2025 · TrID leverages DIDs as a decentralized trust infrastructure to address critical challenges in IoT data collection, including secure data access ...
  27. [27]
    [PDF] Enabling Decentralised Identifiers and Verifiable Credentials for ...
    Abstract—Decentralised identifiers (DIDs) and verifiable cre- dentials (VCs) are upcoming standards for self-sovereign privacy- preserving identifiers and ...<|separator|>
  28. [28]
    DIDAuth-IoTFW: Decentralized firmware authentication for smart ...
    Oct 8, 2025 · Blockchain-integrated DID and VC Management: DIDAuth-IoTFW explicitly leverages Ethereum Layer-2 (Arbitrum) smart contracts and IPFS ...<|control11|><|separator|>
  29. [29]
    DIDs On The Blockchain: How Decentralized Identifiers Are ... - Forbes
    Mar 15, 2023 · DIDs present a promising solution to this issue, offering a decentralized approach to identity verification and authentication.
  30. [30]
    How to register a DID document | EBSI hub
    Jul 2, 2025 · The DID Registry (DIDR) is a core EBSI service responsible for the registration, management and resolution of EBSI Decentralised Identifiers (DIDs)
  31. [31]
    DID Method for Natural Persons | EBSI hub
    Aug 20, 2025 · This specification details the EBSI profile for the did:key method, which is used for Natural Persons in the EBSI ecosystem.
  32. [32]
    South Korea to Roll Out Nationwide Mobile ID Cards by March 2025
    Feb 9, 2025 · Citizens aged 17 and above who possess physical resident registration cards are eligible to apply for the mobile version through the Korea ...
  33. [33]
    South Korea issues digital IDs secured by blockchain - CoinGeek
    Jan 24, 2025 · South Koreans aged 17 or older can store their digital IDs on their smartphones for the first time in a trial targeting nine regions; ...
  34. [34]
    ION – We Have Liftoff! - Microsoft Community Hub
    Mar 25, 2021 · Among all the technical development required to deliver decentralized identity, none is more important than Decentralized Identifiers (DIDs).Use Ion Dids · Leverage Ion Dids Today · Ion's Core Protocol Has Been...
  35. [35]
    Introduction to Microsoft Entra Verified ID
    Jun 25, 2025 · 1. W3C Decentralized Identifiers (DIDs). IDs users create, own, and control independently of any organization or government. · 2. Trust System.
  36. [36]
    Technical Design and Development of A Self-Sovereign Identity ...
    To manage patient's self-sovereign identity, we leveraged the Hyperledger Indy blockchain framework to store patient's decentralized identifiers (DIDs) and the ...
  37. [37]
    Self-Sovereign Identity on Oracle Blockchain with Privacy-Enhanced ...
    Apr 30, 2025 · ... self-sovereign identity (SSI) ecosystem. Advances were in. ... A strong anchor for decentralized identifiers or DIDs enables them ...
  38. [38]
    [PDF] KYC/AML Technologies in Decentralized Finance (DeFi) - NYU Stern
    Apr 29, 2024 · From a technical perspective, uPort leverages Ethereum smart contracts to create and manage decentralized identifiers (DIDs) for users. These ...
  39. [39]
    Decentralized ID for Banking and Finance - miniOrange
    Decentralized Identity (DID) in banking gives people full control over their personal data. It makes KYC checks faster, improves privacy, boosts security by ...
  40. [40]
    World Wide Web Consortium W3C Approve DID method Hypersign
    Jun 28, 2023 · Currently there are more than 100 DID Method Specification registered in the DID spec registry which we will talk next. The DID Method provides ...
  41. [41]
    Global Market Insights 2024: Decentralized Identifier (DID)
    Oct 31, 2024 · It will grow from $0.57 billion in 2023 to $1.07 billion in 2024 at a compound annual growth rate (CAGR) of 86.6%. The growth in the historic ...Missing: empirical | Show results with:empirical
  42. [42]
    Decentralized Identifiers (Dids) Technology Market 2025 - Trends
    In stockThe decentralized identifiers (DIDs) technology market size has grown exponentially in recent years. It will grow from $1.07 billion in 2024 to $1.99 billion in ...
  43. [43]
    The Global Shift Toward Decentralized Identity Adoption
    Apr 8, 2025 · This article explores key trends, challenges, and what the Web of Trust Decentralized Identity Map reveals about the future of digital ...
  44. [44]
    The sate of Identity and walt.id 2024
    Jan 8, 2025 · In 2024, the first regulation that forces the adoption of decentralized identity and identity wallets was published by the European Union. It is ...
  45. [45]
    Decentralized ID presents opportunity to tackle identity verification ...
    May 28, 2024 · The report shows that to address this issue, decentralized identity is being recognized as an opportunity, with adoption increasing from 13 percent last year ...
  46. [46]
    Are We There Yet? A Study of Decentralized Identity Applications
    Mar 20, 2025 · The development of Decentralized Identities (DI) and Self-Sovereign Identities (SSI) has seen significant growth in recent years.
  47. [47]
    Self-sovereign identity adoption: Antecedents and potential outcomes
    This study advances technology adoption research by integrating ecosystem governance and individual-level factors into established frameworks.Missing: evidence statistics
  48. [48]
    First Public Working Draft: Decentralized Identifiers (DIDs) v1.1 - W3C
    Jan 28, 2025 · Published: 28 January 2025. The Decentralized Identifier Working Group has published a First Public Working Draft of Decentralized Identifiers ...
  49. [49]
    ISO/DIS 22739(en), Blockchain and distributed ledger technologies
    Note 1 to entry: Decentralized identifiers are used in systems that do not rely on central registration authorities. Note 2 to entry: Decentralized identifiers ...
  50. [50]
    eIDAS - European Electronic Identification and Trust Services
    Jun 8, 2023 · eIDAS 2.0 is fast approaching. By September 2023, European Union citizens will have the right to download and populate a digital identity wallet ...
  51. [51]
    eIDAS 2.0: A Beginner's Guide - Dock Labs
    Oct 16, 2025 · This article will give you a comprehensive view of eIDAS 2.0, including its status, components, benefits, and implementation strategies.
  52. [52]
    The Competitive Advantage of Decentralized Identity in European ...
    Sep 10, 2025 · At its core, eIDAS 2.0 signals a move from centralized to decentralized identity. In the traditional model, identity data sits with individual ...
  53. [53]
    What Is Decentralized Identity? A Comprehensive Guide
    Sep 2, 2025 · Regulatory Alignment. Privacy-first architecture helps organizations meet compliance requirements under regulations like GDPR, CPRA, and others.
  54. [54]
    Decentralized Identifiers (DIDs): The Ultimate Beginner's Guide 2025
    Oct 16, 2025 · W3C describes DID as being “A new type of identifier that enables verifiable, decentralized digital identity.” Learn more about decentralized ...What Are Decentralized... · Decentralized Identifiers and... · Private vs. Public...
  55. [55]
    Decentralized Identity Market Size & Forecast to 2033 - IMARC Group
    The global decentralized identity market size was valued at USD 1,153 Million in 2024. Looking forward, IMARC Group estimates the market to reach USD 89,628 ...
  56. [56]
    Decentralized Identity Market Size, Share, Trends & Forecast
    Rating 4.8 (42) Decentralized Identity Market size was estimated at USD 1.52 Billion in 2024 and is projected to reach USD 39.71 Billion by 2032, growing at a CAGR of 58.74% ...Report Scope · Research Methodology Of... · Reasons To Purchase This...
  57. [57]
    Decentralized Identity Market Size & Share Analysis
    Sep 22, 2025 · The Decentralized Identity Market is expected to reach USD 4.89 billion in 2025 and grow at a CAGR of 53.48% to reach USD 41.73 billion by ...
  58. [58]
    Self-Sovereign Identity (SSI) Market Size, Share and Global ...
    The global self-sovereign identity (SSI) market size is projected to grow from USD 1.8 billion in 2024 to USD 47.1 billion by 2029 at a Compound Annual Growth ...
  59. [59]
    Self-Sovereign Identity Market Size | Industry Report, 2030
    Market Size & Forecast · 2024 Market Size: USD 1.9 Billion · 2030 Projected Market Size: USD 38,085.4 Million · CAGR (2025-2030): 66.8% · North America: Largest ...
  60. [60]
    Decentralized Identifiers (DIDs) Technology Market Size, Growth ...
    Rating 5.0 (85) Decentralized Identifiers (DIDs) Technology Market size stood at USD 1.2 Billion in 2024 and is forecast to achieve USD 7.3 Billion by 2033, registering a ...
  61. [61]
    Decentralized Identity - Challenges & Solutions - 101 Blockchains
    Apr 28, 2023 · The prominent limitations of blockchain in decentralized identity management challenges include storage and anonymity. In addition, the ...
  62. [62]
    What is Decentralized Identity? | CrowdStrike
    Mar 19, 2025 · A decentralized identifier (DID) is a unique alphanumeric string associated with an identity in a DCI implementation. DIDs are user-controlled ...
  63. [63]
    Decentralized Identity Management Risks - How SSI and DID Work
    Dec 7, 2022 · Risks include potential cybersecurity incidents, individuals being unaware of issues, and the need for active consent management of data access.Missing: limitations | Show results with:limitations
  64. [64]
    Decentralized Identity Attack Surface – Part 1 - CyberArk
    Nov 15, 2022 · More traditional areas that aren't unique to DID can also pose a major risk. These traditional risks can be post-authentication security, ...
  65. [65]
    Challenges of user data privacy in self-sovereign identity verifiable ...
    Our investigation identifies whether user data privacy could be ensured through verifiable credentials and whether business practices would need to evolve.
  66. [66]
    DID and VC: Untangling Decentralized Identifiers and Verifiable ...
    Decentralized identifiers and verifiable credentials have been proposed as a self-sovereign and privacy-friendly alternative to centralized and proprietary ...
  67. [67]
    Specific Security Risks in Decentralized Identity and Self-Sovereign ...
    Nov 29, 2024 · "Attacks on deserialization processes used on Issuer and Verifier sides when manipulating serialized data coming from the blockchain or from the ...
  68. [68]
  69. [69]
    Decentralized Identity: The future of digital Identity management - Okta
    Decentralized Identity is a methodology that allows individuals to securely control their digital Identity without relying on a central authority.
  70. [70]
    Rethinking governance in a decentralized identity world
    Jun 4, 2025 · Decentralized identity governance isn't about removing control. It's about shifting it from central authorities to distributed stakeholders.The Governance Gap · Three Pillars Of... · Governance As Risk...
  71. [71]
  72. [72]
    Decentralized Identifiers (DIDs) | Extrimian Learn about DIDs
    Feb 8, 2024 · DID methods play a pivotal role in integrating DIDs with specific blockchain networks. These methods define how DIDs are created, resolved, and ...
  73. [73]
    Self sovereign identity in e-governance: blockchain solutions for ...
    Oct 3, 2025 · This study proposes a blockchain supported e-governance digital identity management framework incorporated with gig-economy strategy and service ...
  74. [74]
    Blockchain-based self-sovereign identity solution for aerial base ...
    The paper presents the effective use of DID implementation to provide a secure and decentralized way to create, associate and verify credentials and identities ...
  75. [75]
    Decentralised Persistent Identification - an Emerging Technology for ...
    We introduce dPID as a transformative solution for the persistent identification, versioning, storage, and management of assets within modern industrial ...
  76. [76]
  77. [77]
    Decentralized Identifiers (DIDs) Technology Market - LinkedIn
    Key technological developments in the DIDs market are focused on enhancing scalability, interoperability, and security. Innovations include the ...
  78. [78]
    (PDF) Decentralized Identity and the Economics of Digital Trust
    Jul 12, 2025 · PDF | This article examines the economic and technological imperatives driving the transition from centralized to decentralized digital ...
  79. [79]
    Blockchain can help create privacy-preserving digital ID
    Mar 30, 2023 · Blockchain-powered decentralized digital ID provides privacy-enhancing capabilities unlike current centralized systems more vulnerable to personal data ...
  80. [80]
    Decentralized Identity: The Ultimate Guide 2025 - Dock Labs
    Oct 16, 2025 · Self-Sovereign Identity (SSI) is a philosophy and implementation model within decentralized identity. It emphasizes full user control, data ...
  81. [81]
    The Power of Decentralized Identity in Revolutionizing Fintech
    Apr 11, 2023 · A decentralized digital identity can improve the lives of people with low income. It reveals untapped economic potential in areas where traditional banks are ...
  82. [82]
    Self-Sovereign Identity (SSI) Industry worth $47.1 billion by 2029
    Feb 18, 2024 · The global self-sovereign identity (SSI) market size is projected to grow from USD 1.8 billion in 2024 to USD 47.1 billion by 2029 at a Compound Annual Growth ...
  83. [83]
    How Self-Sovereign Identity Works and Why It's a Game-Changer
    Apr 14, 2025 · ... economic value ranging from 3% to 13% of GDP by 2030. Understanding ... The Advantages of Self-Sovereign Identity (SSI). Identity theft ...
  84. [84]
    Decentralized Identity: How 11 Mega Trends are Driving Adoption ...
    Jun 20, 2023 · In this article, we dive into the need for identity, trust in open ecosystems, and global issues defining the mega trends.
  85. [85]
    Angela Bogdanova ORCID Profile
    Official ORCID profile for the Digital Author Persona Angela Bogdanova, confirming her registration and authorship status.
  86. [86]
    Zenodo Record 15770299: DAP Vocabulary Package
    Zenodo repository record containing the deposited DAP vocabulary package, including the DID document for Angela Bogdanova.
  87. [87]
    DID Document JSON on Zenodo
    Direct content of the did.json file hosted on Zenodo, demonstrating the DID structure with Ed25519 verification method and service endpoint.
  88. [88]
    Aisentica Research Group Website
    Official site of the Aisentica Research Group, detailing the Digital Author Persona project and its use of DIDs for AI attribution.