The goal of DID design is to enable verifiable, scalable, and long-term usable digital identities without relying on centralized identity providers. Its architecture doesn’t directly store complete identity information but instead uses a combination of identifiers, resolution, and credentials.
Looking at the overall structure, a typical DID system usually consists of several core components:
The key principle behind this architecture is minimal on-chain data: blockchains only record immutable critical information, while detailed data can be flexibly stored off-chain or in decentralized storage solutions—balancing both security and scalability.
In the DID framework, cryptography underpins identity trust. Unlike traditional account-password models, DID relies on public-private key pairs for identity control and verification, eliminating the need for centralized validation nodes.
Specifically, generating and using a DID typically involves these steps:
When an external system needs to verify a DID, it queries the corresponding DID Document using a DID Resolver and validates the signature with the public key provided. This resolution process is open and standardized, without dependency on any single organization.
It’s important to note that a DID is not equivalent to a blockchain address—a single DID can be linked to multiple keys, supports key rotation, revocation, and hierarchical permissions, making identities safer and more flexible over long-term use.
To accommodate different underlying networks and use cases, there’s no single implementation of DID. Instead, DID Method extensions define how identities are registered, updated, and resolved for each scenario.
Currently, the most representative DID Methods include:
At the standards level, W3C leads the development of DID and verifiable credentials. The main value includes:
As these standards mature, DIDs are evolving from experimental technology into scalable foundational infrastructure.