Skip to content

DID on Layer 2

IOST 3.0's decentralized identity framework is built natively on Layer 2 technology, enabling scalable, efficient, and privacy-preserving identity operations that overcome traditional blockchain limitations.

Integration Architecture

The integration of DID with Layer 2 follows a carefully designed architecture that balances security, scalability, and usability:

DID Layer 2 Operation Flow

This diagram illustrates how DID operations flow through IOST 3.0's Layer 2 architecture, showing the process from user identity operations through batching and state commitments to final verification. The system leverages optimistic rollups where state transitions are presumed valid until proven otherwise during a challenge period.

Layered Security Model

IOST 3.0 employs a hybrid approach to DID storage and verification:

  1. Layer 1 Anchoring: Critical security data (state roots, revocation registry) secured on the base chain

  2. Layer 2 Processing: Identity operations (issuance, verification, updates) processed on Layer 2

  3. Cross-Layer Communication: Secure bridges for data consistency between layers

Optimistic Rollups for Identity

The DID framework utilizes optimistic rollups specifically optimized for identity operations:

  1. Batch Processing: Multiple identity operations combined into single Layer 1 transactions

  2. Fraud Proofs: Cryptographic verification to challenge invalid operations

  3. Delayed Finality: Optimistic confirmation with challenge period for security

  4. Compressed Proofs: Efficient data encoding for identity claims

Performance Benefits

The Layer 2 implementation delivers significant performance improvements for DID operations:

Throughput & Latency

OperationLayer 1 (Direct)Layer 2 (IOST 3.0)Improvement
DID Creation15-30 seconds<2 seconds~15x faster
Credential Issuance15-30 seconds<1 second~20x faster
Verification5-10 seconds<500ms~15x faster
Batch UpdatesLimited1000+ ops/batchMassive scale

Cost Efficiency

Layer 2 integration dramatically reduces the cost of identity operations:

  • Gas Fee Reduction: 50-100x lower cost compared to Layer 1 operations

  • Batched Processing Economics: Shared settlement costs across multiple operations

  • Tiered Fee Structure: Different pricing for different operation types

Technical Implementation

DID Synchronization Flow

The process of synchronizing DID operations between Layer 1 and Layer 2:

  1. Identity Transaction Creation: User or service initiates identity operation on Layer 2

  2. Sequencing & Execution: Transaction processed by domain-specific DID processors

  3. State Transition: Updated identity state committed to Layer 2 state tree

  4. Batch Formation: Multiple identity operations grouped into batch

  5. Layer 1 Anchoring: State root committed to base chain with security guarantees

  6. Cryptographic Verification: Zero-knowledge proofs verify correctness without revealing data

Selective Data Availability

IOST 3.0's approach to identity data availability:

  1. Public Data: Essential verification data always available in Layer 2 data availability layer

  2. Private Data: Personal attributes stored off-chain with encrypted access controls

  3. Selective Disclosure System: Zero-knowledge proofs enabling verification without data exposure

Identity Recovery & Security

Layer 2 implementation provides enhanced security and recovery options:

Multi-Layer Security

  1. Social Recovery: Distributed guardian system for identity recovery

  2. Layer 1 Challenge Mechanism: Option to dispute fraudulent operations

  3. Time-Locks: Configurable delay periods for high-value identity changes

  4. Break-Glass Procedures: Emergency identity recovery paths

Security Guarantees

The Layer 2 DID system maintains critical security properties:

  1. Non-Custodial: Users maintain control of private keys

  2. Censorship Resistant: Decentralized processing prevents selective censorship

  3. Data Integrity: Cryptographic verification of identity data

  4. Exit Rights: Ability to withdraw identity to Layer 1 or other systems

Use Cases & Benefits

Layer 2 DID unlocks powerful new identity capabilities:

Enterprise Applications

  • High-Volume KYC: Process thousands of user verifications per minute

  • Compliance Automation: Programmatic regulatory checks with minimal overhead

  • Employee Onboarding: Streamlined identity verification for workforce management

Consumer Applications

  • Instant Authentication: Sub-second identity verification for seamless UX

  • Affordable Self-Sovereignty: Identity creation accessible to all users

  • Privacy-Preserving Commerce: Shopping and services without data exposure

Future Development

The IOST 3.0 DID on Layer 2 roadmap includes:

  1. Parallelized Verification: Multi-threaded credential verification for further throughput improvements

  2. Additional Zero-Knowledge Circuits: Expanding the types of private verifiable claims

  3. Cross-Chain Interoperability: Identity verification across multiple blockchain networks

  4. On-Chain Reputation Systems: Privacy-preserving attestation and scoring

Integration with Other Components

DID on Layer 2 connects seamlessly with other IOST 3.0 modules:

Released under the MIT License.