BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
Blockchain · 5 min read

Decentralized Identifiers (DIDs):
Self-Sovereign Identity Explained

Understanding DIDs and how they enable user-controlled digital identity.

On-chain
Verified
SBT
Minting
PQ
Signatures
<1ms
Verify

Digital identity is broken. Every time you create an account on a new platform, you hand over personal data to yet another centralized custodian. These custodians become honeypots for attackers, single points of failure, and gatekeepers who can revoke your identity at will. Decentralized Identifiers, or DIDs, represent a fundamental rethinking of this model. Rather than receiving an identity from a provider, you generate one yourself, anchor it to a verifiable data registry, and remain in full control of who can read your credentials and for how long.

What Is a DID?

A DID is a globally unique URI that resolves to a DID Document, a small JSON-LD object containing the public keys, authentication methods, and service endpoints associated with the identifier's subject. The W3C finalized the DID Core specification as a Recommendation in July 2022, establishing the canonical syntax:

did:method-name:method-specific-id

// Example DIDs
did:web:example.com:users:alice
did:key:z6Mkf5rGMoatrSj1f4CyvuHBeXJELe9RPdzo2PKGNCKVtZxP
did:ion:EiClkZMDxPKqC9c-umQfTkR8vvZ9JPhl_xLDI9Nfk38w5w
did:sol:devnet:3Js1pvbcQqRobfMf5jBnKEWPjmpd9G7TTFxhCmwp5gFB

The critical property is that no central registry assigns DIDs. The subject generates a cryptographic key pair, derives the identifier deterministically, and optionally anchors it to a blockchain or other verifiable data registry. Resolution is method-specific: did:web uses DNS and HTTPS, did:ion reads from the Bitcoin network via the Sidetree protocol, and did:key requires no network at all since the entire public key is encoded directly in the identifier.

DID Methods Compared

Choosing the right DID method depends on your trust model, latency requirements, and infrastructure constraints. The following table summarizes the most widely adopted methods:

MethodAnchorResolutionProsCons
did:webDNS + HTTPSHTTP GETEasy to deploy, human-readableRelies on DNS/TLS trust model
did:keyNone (self-contained)Local decodeZero infrastructure, instantNo rotation, no service endpoints
did:ionBitcoin (Sidetree)ION node lookupMaximum censorship resistanceSlow anchoring (~10 min blocks)
did:solSolanaRPC callSub-second finality, low costSolana validator availability
did:ethrEthereumContract callLarge ecosystem, EIP-1056Gas costs, L1 congestion

For high-throughput authentication systems, resolution latency matters enormously. A did:key resolves in microseconds because the key material is literally embedded in the identifier string, while a did:ion resolution can take hundreds of milliseconds as it traverses the Sidetree overlay. When you need to verify millions of identities per second, even small resolution overheads compound into unacceptable delays.

The DID Document

Every DID resolves to a DID Document that acts as the subject's cryptographic passport. A minimal document includes a verification method (public key) and an authentication relationship:

{
  "@context": "https://www.w3.org/ns/did/v1",
  "id": "did:web:auth.example.com:users:alice",
  "verificationMethod": [{
    "id": "#key-1",
    "type": "JsonWebKey2020",
    "publicKeyJwk": {
      "kty": "OKP",
      "crv": "Ed25519",
      "x": "d75a980182b10ab..."
    }
  }],
  "authentication": ["#key-1"],
  "service": [{
    "id": "#auth-endpoint",
    "type": "H33AuthService",
    "serviceEndpoint": "https://api.h33.ai/v1/verify"
  }]
}

Richer documents can include key agreement methods for encrypted communication, delegation and capability invocation relationships, and multiple service endpoints for different protocols. The document is entirely under the subject's control: they can rotate keys, add new verification methods, or deactivate the DID without asking anyone's permission.

DIDs and Verifiable Credentials

DIDs become truly powerful when combined with Verifiable Credentials (VCs). A VC is a tamper-evident claim about a subject, signed by an issuer, and presented by a holder. The flow works like this:

This selective disclosure is where ZKP-based systems shine. Rather than revealing your full date of birth, you can prove "I am over 21" without disclosing the actual date. H33's ZKP verification layer, backed by an in-process DashMap cache achieving 0.085 microsecond lookups, makes these proof checks practical at scale.

The Quantum Threat to DIDs

Most DID methods today rely on Ed25519 or secp256k1 signatures. A sufficiently powerful quantum computer running Shor's algorithm could forge these signatures, impersonating any DID subject. Post-quantum migration is not optional; it is an architectural imperative.

The signatures anchoring DID Documents to verifiable registries are the system's root of trust. If an attacker can forge an Ed25519 signature, they can replace a subject's public key in their DID Document and assume their identity entirely. This is not a theoretical concern: NIST finalized its post-quantum signature standards (ML-DSA, formerly CRYSTALS-Dilithium) in 2024 precisely because the timeline for cryptographically relevant quantum computers is measured in years, not decades.

Migrating DIDs to post-quantum signatures requires updating three layers simultaneously: the verification methods listed in DID Documents, the signature algorithms used by credential issuers, and the verification logic in every relying party. This is a coordination problem of enormous scale.

Post-Quantum DIDs with H33

H33's authentication stack is built to handle this transition natively. Every authentication event passes through a fully post-quantum pipeline: biometric templates encrypted under BFV fully homomorphic encryption, verified via ZKP STARK lookups, and attested with Dilithium (ML-DSA) signatures. The entire chain completes in approximately 42 microseconds per authentication, sustaining 1.595 million authentications per second on production hardware.

For DID-based systems, this means you can anchor your DID Documents with Dilithium signatures today, ensuring that even a future quantum adversary cannot forge your identity. The DID Document's verification method simply references a Dilithium public key instead of Ed25519:

{
  "verificationMethod": [{
    "id": "#pq-key-1",
    "type": "Multikey",
    "publicKeyMultibase": "z6LSb...dilithium5...publickey"
  }],
  "authentication": ["#pq-key-1"]
}

Because H33's Dilithium sign-and-verify cycle completes in roughly 244 microseconds for an entire 32-user batch, the overhead of post-quantum signatures is negligible compared to the security guarantee. Batch attestation means that a single Dilithium signature covers 32 concurrent verifications, amortizing the cost to under 8 microseconds of signature overhead per user.

Encrypted Identity Resolution

H33 goes further than simply replacing signature algorithms. Using BFV fully homomorphic encryption, identity resolution can happen on encrypted data. A verifier submits an encrypted query, the system performs the lookup without ever seeing the plaintext identifier, and returns an encrypted result that only the verifier can decrypt. This eliminates a class of privacy leaks inherent in traditional DID resolution, where the resolver learns which identifiers a verifier is interested in.

The combination of FHE-encrypted resolution, ZKP selective disclosure, and post-quantum attestation creates identity infrastructure that is simultaneously private, minimal, and quantum-resistant. This is the architecture self-sovereign identity always needed but never had the cryptographic tooling to build.

Implementation Considerations

If you are building a system that incorporates DIDs, keep these practical concerns in mind:

Decentralized identifiers represent the most significant shift in digital identity architecture since the introduction of public-key infrastructure. Combined with post-quantum cryptography and homomorphic encryption, they offer a path toward identity systems that no government can revoke, no breach can compromise, and no quantum computer can forge. The building blocks exist today. The question is whether your infrastructure is ready to use them.

Ready to Go Quantum-Secure?

Start protecting your users with post-quantum authentication today. 1,000 free auths, no credit card required.

Get Free API Key →

Build With Post-Quantum Security

Enterprise-grade FHE, ZKP, and post-quantum cryptography. One API call. Sub-millisecond latency.

Get Free API Key → Read the Docs
Free tier · 10,000 API calls/month · No credit card required
Verify It Yourself