.. _protocol-ref-identity:
Identities are a low-level construct that provide the foundation for user-facing functionality on the platform. An identity is a public key (or set of public keys) recorded on the platform chain that can be used to prove ownership of data. Please see the Identity DIP for additional information.
Identities consist of multiple objects that are described in the following sections and listed in this summary table:
| Field | Type | Description |
|---|---|---|
| $version | integer | The protocol version |
| id | array of bytes | The identity id (32 bytes) |
| publicKeys | array of keys | Public key(s) associated with the identity |
| balance | integer | Credit balance associated with the identity |
| revision | integer | Identity update revision |
See the identity implementation in rs-dpp for more details.
Example Identity
{
"protocolVersion":1,
"id":"6YfP6tT9AK8HPVXMK7CQrhpc8VMg7frjEnXinSPvUmZC",
"publicKeys":[
{
"id":0,
"type":0,
"purpose":0,
"securityLevel":0,
"data":"AkWRfl3DJiyyy6YPUDQnNx5KERRnR8CoTiFUvfdaYSDS",
"readOnly":false
}
],
"balance":0,
"revision":0
}The identity id is a unique identifier created from the double sha256 hash of the outpoint funding the identity creation. Typically it is displayed using Base58 encoding.
id = base58(sha256(sha256(<identity create funding outpoint>)))
:::{note}
The identity id uses the Dash Platform specific application/x.dash.dpp.identifier content media type. For additional information, please refer to the js-dpp PR 252 that introduced it and identifier.rs.
:::
See rs-dpp for examples of using InstantSend or ChainLocks to create the identity id.
The identity publicKeys array stores information regarding each public key associated with the identity. Multiple identities may use the same public key.
:::{note}
Each identity must have at least two public keys: a primary key (security level 0) that is only used when updating the identity and an additional one (security level 2) used to sign state transitions. The maximum number of keys is 15000 as defined by rs-dpp.
:::
Each item in the publicKeys array consists of an object containing:
| Field | Type | Description |
|---|---|---|
| id | integer | The key id (all public keys must be unique) |
| type | integer | Type of key (default: 0 - ECDSA) |
| data | array of bytes | Public key (0 - ECDSA: 33 bytes, 1 - BLS: 48 bytes, 2 - ECDSA Hash160: 20 bytes, 3 - BIP13 Hash160: 20 bytes, 4 - EDDSA_25519_HASH160: 20 bytes) |
| purpose | integer | Public key purpose (0 - Authentication, 1 - Encryption, 2 - Decryption, 3 - Transfer) |
| securityLevel | integer | Public key security level (0 - Master, 1 - Critical, 2 - High, 3 - Medium) |
| readonly | boolean | Identity public key can't be modified with readOnly set to true. This can’t be changed after adding a key. |
| disabledAt | integer | Timestamp indicating that the key was disabled at a specified time |
| signature | array of bytes | Signature of the signable identity create or topup state transition by the private key associated with this public key |
See the public key implementation in rs-dpp for more details.
Each public key in an identity's publicKeys array must be assigned a unique index number (id).
The type field indicates the algorithm used to derive the key. Available key types defined in rs-dpp include:
| Type | Size (bytes) | Description |
|---|---|---|
0 |
33 | ECDSA Secp256k1 (default) |
1 |
48 | BLS 12-381 |
2 |
20 | ECDSA Secp256k1 Hash160 |
3 |
20 | BIP13 pay-to-script-hash public key |
4 |
20 | EDDSA 25519 Hash160 |
The data field contains the compressed public key.
The purpose field describes which operations are supported by the key. Please refer to DIP11 - Identities for additional information regarding this. Keys for some purposes must meet certain the security level criteria defined by rs-dpp as detailed below:
| Type | Description | Allowed Security Level(s) |
|---|---|---|
0 |
Authentication | Any security level |
1 |
Encryption | Medium |
2 |
Decryption | Medium |
3 |
Transfer | Critical |
The securityLevel field indicates how securely the key should be stored by clients. Please refer to DIP11 - Identities for additional information regarding this.
| Level | Description | Security Practice |
|---|---|---|
| 0 | Master | Should always require a user to authenticate when signing a transition. Can only be used to update an identity. |
| 1 | Critical | Should always require a user to authenticate when signing a transition |
| 2 | High | Should be available as long as the user has authenticated at least once during a session. Typically used to sign state transitions, but cannot be used for identity update transitions. |
| 3 | Medium | Should not require user authentication but must require access to the client device |
The readOnly field indicates that the public key can't be modified if it is set to true. The
value of this field cannot be changed after adding the key.
The disabledAt field indicates that the key has been disabled. Its value equals the timestamp when the key was disabled.
Each identity has a balance of credits established by an asset lock transaction on the Core chain. This credit balance is used to pay the fees associated with state transitions.
There are five identity-related state transitions: identity create, identity topup, identity update, identity credit transfer, and identity credit withdrawal. Details are provided in this section including information about asset locking and signing required for these state transitions.
Identities are created on the platform by submitting the identity information in an identity create state transition.
| Field | Type | Description |
|---|---|---|
| $version | integer | The protocol version (currently 1) |
| type | integer | State transition type (2 for identity create) |
| publicKeys | array of keys | Public key(s) associated with the identity |
| assetLockProof | proof object | Asset lock proof object proving the asset lock transaction exists on the Core chain and is locked |
| userFeeIncrease | integer | Extra fee to prioritize processing if the mempool is full. Typically set to zero. |
| signature | array of bytes | Signature of state transition data by the single-use key from the asset lock (65 bytes) |
| identityId | array of bytes | An identity id for the identity being created (32 bytes) |
See the identity create implementation in rs-dpp for more details.
Identity credit balances are increased by submitting the topup information in an identity topup state transition.
| Field | Type | Description |
|---|---|---|
| $version | integer | The protocol version (currently 1) |
| type | integer | State transition type (3 for identity topup) |
| assetLockProof | proof object | Asset lock proof object proving the layer 1 locking transaction exists and is locked |
| identityId | array of bytes | An identity id for the identity receiving the topup (can be any identity) (32 bytes) |
| userFeeIncrease | integer | Extra fee to prioritize processing if the mempool is full. Typically set to zero. |
| signature | array of bytes | Signature of state transition data by the single-use key from the asset lock (65 bytes) |
See the identity topup implementation in rs-dpp for more details.
Identities are updated on the platform by submitting the identity information in an identity update state transition. This state transition requires either a set of one or more new public keys to add to the identity or a list of existing keys to disable.
| Field | Type | Description |
|---|---|---|
| $version | integer | The protocol version (currently 1) |
| type | integer | State transition type (5 for identity update) |
| identityId | array of bytes | The identity id (32 bytes) |
| revision | integer | Identity update revision |
| nonce | integer | Identity nonce for this transition to prevent replay attacks |
| addPublicKeys | array of public keys | (Optional) Array of up to 10 new public keys to add to the identity. Required if adding keys. |
| disablePublicKeys | array of integers | (Optional) Array of up to 10 existing identity public key ID(s) to disable for the identity. Required if disabling keys. |
| userFeeIncrease | integer | Extra fee to prioritize processing if the mempool is full. Typically set to zero. |
| signaturePublicKeyId | integer | The ID of public key used to sign the state transition |
| signature | array of bytes | Signature of state transition data (65 bytes) |
See the identity update implementation in rs-dpp for more details.
Identities can transfer credits on the platform by submitting an identity credit transfer state transition. This state transition requires specifying the sender identity, recipient identity, transfer amount, and a signature for verification.
| Field | Type | Description |
|---|---|---|
| $version | integer | The protocol version (currently 1) |
| type | integer | State transition type (6 for identity credit transfer) |
| identityId | array of bytes | The identity id of the sender (32 bytes) |
| recipientId | array of bytes | The identity id of the recipient (32 bytes) |
| amount | integer | The credit amount to transfer |
| nonce | integer | Identity nonce for this transition to prevent replay attacks |
| userFeeIncrease | integer | Extra fee to prioritize processing if the mempool is full. Typically set to zero. |
| signaturePublicKeyId | integer | The ID of public key used to sign the state transition |
| signature | array of bytes | Signature of state transition data (65 bytes) |
See the identity credit transfer implementation in rs-dpp for more details.
Credits can be withdrawn from an identity to an external Core wallet using an identity credit withdrawal state transition. This transition allows specifying the withdrawal amount, output script, and signing details.
| Field | Type | Description |
|---|---|---|
| $version | integer | The protocol version (currently 1) |
| type | integer | State transition type (7 for identity credit withdrawal) |
| identityId | array of bytes | An identity id (32 bytes) |
| amount | integer | The amount of credits to withdraw (64 bits) |
| coreFeePerByte | integer | Fee per byte for the transaction on Core (32 bits) |
| pooling | integer | Pooling mode for transaction batching |
| outputScript | array of bytes | (Optional) The output script for receiving the withdrawal (if not set, defaults to Core address) |
| nonce | integer | Identity nonce for this transition to prevent replay attacks |
| userFeeIncrease | integer | Extra fee to prioritize processing if the mempool is full. Typically set to zero. |
| signaturePublicKeyId | integer | The ID of public key used to sign the state transition |
| signature | array of bytes | Signature of state transition data (65 bytes) |
See the identity credit withdrawal implementation in rs-dpp for more details.
The identity create and identity topup state transitions both include an asset lock proof object. This object references the Core chain asset lock transaction and includes proof that the transaction is locked.
Currently there are two types of asset lock proofs defined by rs-dpp: InstantSend and ChainLock. Transactions almost always receive InstantSend locks, so the InstantSend asset lock proof is the predominate type. See rs-dpp for examples of using InstantSend or ChainLocks as the asset lock proof.
The InstantSend asset lock proof is used for transactions that have received an InstantSend lock. Asset locks using an InstantSend lock as proof must comply with this structure established in rs-dpp.
| Field | Type | Description |
|---|---|---|
| type | integer | The asset lock proof type (0 for InstantSend locks) |
| instantLock | array of bytes | The InstantSend lock (islock) |
| transaction | array of bytes | The asset lock transaction |
| outputIndex | integer | Index of the transaction output to be used |
The ChainLock asset lock proof is used for transactions that have note received an InstantSend lock, but have been included in a block that has received a ChainLock. Asset locks using a ChainLock as proof must comply with this structure established in rs-dpp.
| Field | Type | Description |
|---|---|---|
| type | array of bytes | The type of asset lock proof (1 for ChainLocks) |
| coreChainLockedHeight | integer | Height of the ChainLocked Core block containing the transaction |
| outPoint | object | The outpoint being used as the asset lock |
:::{note} The identity create and topup state transition signatures are unique in that they must be signed by the private key used in the layer 1 locking transaction. All other state transitions will be signed by a private key of the identity submitting them. :::
The process to sign an identity create state transition consists of the following steps:
- Create a canonical, signable version of the state transition encoded with Bincode. The signable state transition excludes the following fields:
identityIdsignaturefor all public keyssignaturefor the overall state transition
- Calculate the double SHA-256 hash of the encoded signable state transition
- Sign the hash from the previous step using the private key associated with the asset lock transaction, then add the result to the state transition's
signaturefield - For each public key being added to the identity, sign the hash from step 2 using the respective private key and add the result to the public key's
signaturefield - Use Bincode to re-encode the state transition with all signatures and the identity id included