#NOTRUST
Identities, DIDs, and confidentiality
HW & SW based secure
Identities (DLT attestation -> trust, provenance, context)
Interaction (e.g. DID based https)
Processes (e.g. Verifiable Claims)
DLTINFRASTRUCTURE
.
TRUSTED
NODE
WEB
INTERFACE
DEVICE 4
DEVICE 1
DEVICE 3
DEVICE 2
SWITZERLAND JAPAN
Secure Multi Party Computing
DIGITAL ASSETMANAGEMENT
TRACK RECORD
• 1 DISTRIBUTED ENERGY SOLUTIONS
• 2 TRUSTED SENSOR SOLUTIONS
• 3 CAR WALLETS (M2M ECONOMY)
USE CASES
TRUSTED PROBE SENSOR
1
2
3
CONFIDENTIALITY
• Don’t trust, proof!
• Ensure integrity.
• No need to trust partners/providers.
• Innovative signing schemes (SMPC)
• Secrets are never stored (SMPC).