Decentralized Identifiers (DIDs)
DIDs are cryptographically verifiable identifiers that enable users, organisations and AI agents to prove control over their digital identity without depending on centralized registration systems. Each DID is associated with cryptographic keys that allow the holder to authenticate and authorize actions. Unlike traditional identifiers tied to specific platforms or services, DIDs work across organizational boundaries and technology stacks. The DID holder maintains complete control over their identifier and associated authentication materials. In Nuggets’ Platform:- Human Users: Each person receives DIDs that anchor their self-sovereign identity, with unique PeerDIDs generated for each entity they interact with to prevent correlation
- AI Agents: Every AI agent operates with its own public DID, establishing clear accountability chains to human controllers
- Organizations: Companies use public DIDs for corporate identity management and AI agent oversight
- Cryptographic Control: Identity holders prove ownership through digital signatures, holder binding and key challenges
- Decentralized Verification: Authentication without relying on centralized identity providers
- Service Discovery: DID documents can specify service endpoints, which can be used for identity-related services
Verifiable Credentials (VCs)
Verifiable Credentials enable cryptographically secure claims about any attributes, qualifications, or permissions. These digital credentials contain claims issued by trusted authorities and can be independently verified without contacting the original issuer. VCs that support Selective Disclosure, such as BBS+ or SD-JWT transform how sensitive information is shared by allowing precise control over what data is disclosed and to whom. The cryptographic signatures ensure data integrity while enabling privacy-preserving verification. Example Nuggets VC Applications (non-exhaustive list):- Identity Attributes: Verified personal information derived from authoritative sources
- Authorization Grants: Permissions and capabilities assigned to users and AI agents
- Compliance Certifications: Regulatory compliance status and audit results
- Reputation Indicators: Trust scores and historical performance metrics
- Access Permissions: Fine-grained authorization for systems and data
- Selective Disclosure: Present only required information for each interaction
- Zero-Knowledge Proofs: Demonstrate compliance without revealing sensitive details
- Revocation Management: Issuers can invalidate credentials when circumstances change (coming soon)
- Composite Credentials: Combine multiple claims from different issuers (coming soon)
OpenID Connect (OIDC)
OpenID Connect provides standardized authentication flows that work across web and mobile, and API applications. Built on OAuth 2.0, OIDC enables applications to verify user identity and obtain authorized access to resources. Nuggets enhances OIDC with decentralized identity capabilities, maintaining compatibility with existing enterprise systems while adding advanced security and privacy features. Nuggets OIDC Enhancement:- Biometric Integration: Authentication flows incorporating biometric verification
- Credential-Based Claims: ID tokens enhanced with verifiable credential data
- AI Agent Authentication: Extended flows supporting machine identity verification
- Privacy-Preserving Flows: Authentication without exposing unnecessary personal information
- Human-in-the-loop: end user verifies sharing of data and / or approval
- Enterprise Compatibility: Works with existing identity and access management systems
- Standard Protocols: Familiar authentication patterns for developers and IT teams
- Federation Support: Cross-organizational authentication with maintained user control
- Token Security: Enhanced token validation using cryptographic identity verification
Standards Convergence
Nuggets integrates these standards to create unified identity infrastructure supporting both human users and autonomous AI systems: Identity Establishment:- Users and AI agents receive DIDs as persistent identity anchors
- Identity attributes and permissions encoded as verifiable credentials
- Cryptographic keys enable authentication
- OIDC provides familiar authentication patterns for applications
- DID-based verification enhances security beyond traditional username/password and even Passkeys that can be shared.
- Verifiable credentials supply verified claims about identity and permissions
- Users maintain complete control over identity data in self-sovereign wallets
- Selective disclosure ensures minimal data exposure for each interaction
- Zero-knowledge proofs enable selective compliance verification without data revelation