đID Layer
In this section, you'll learn about the core component that enables Concordium to manage digital identity.
What is the ID Layer?
Concordium has a built-in identity management system called the ID Layer that allows individuals and organizations to create secure and private identities for interacting on the network.
It uses advanced cryptographic techniques like Zero-Knowledge Proofs (ZKPs), threshold signatures (a secure way to generate a single digital signature), and ring signatures to ensure the security and privacy of user data.
Check out the illustration below, showing the layers, components, and relationships within the Concordium ID Layer:
That means that Concordium has an ID layer for managing digital identity. Digital identity refers to your online fingerprint - the data computers use to recognize you in the digital world, including your usernames, passwords, browsing history, social media profiles, etc. Now, in the context of Concordium, digital identity goes beyond usernames and passwords. It is a verified representation of you, embedded directly within the network. It entails an Identity verification process that creates a unique profile linked to your real-world information without revealing sensitive details.
What is the main goal of the ID Layer?
The essence of the ID layer is creating a verified identity that enables secure and private interactions. In return, it gives users more control over their digital identity and helps protect them from identity theft and other types of fraud.\
What does the ID Layer offer?
The Concordium's ID Layer is designed to offer several essential functionalities, which include the following:
Strong Authentication: It verifies users' identities for secure interactions.
Privacy Protection: It uses advanced cryptography to keep user data private.
Regulatory Compliance: It is designed to meet regulations regarding identity verification.
User Control: It allows users to decide what information to share and the ability to revoke access to their data at any time.
Next, you'll learn about another key component - Concordium Interoperability Standard tokens (CIS-2).
Last updated