Collection of links to valuable resources.
We group links and papers into different categories. Some domains overlap in different categories so its worth checking all categories. No resources are listed twice.
- Crypto Stackexchange
- Asecuritysite.com
- A curated list of multi party computation resources and links.
- Explore connected papers in a visual graph
- ZK Research
- researchrabbit ai
- Kantara Identity
- Blockchain and Identity
- ingopedia: A curated list of ZK resources and links.
- Practical Cryptography for Developers
- David Killer Crypto Blog
- Where to use a blockchain in non-financial applications?
- Navigating Privacy on Public Blockchains
- Secure computation: Homomorphic encryption or hardware enclaves?
- BLS12-381 For The Rest Of Us
- zkSNARKs in a nutshell
- A Brief Dive Into zk-SNARKs and the ZoKrates Toolbox on the Ethereum Blockchain
- Quadratic Arithmetic Programs: from Zero to Hero
- HoneyBadgerSwap: Making MPC as a Sidechain
- Decentralized Identity: Passport to Web3
- Demystifying Zero Knowledge Proofs
- What are zk-SNARKs?
- Zero-Knowledge Proofs: STARKs vs SNARKs
- Elliptic Curve Cryptography: a gentle introduction
- Simple Explanations of Arithmetic Circuits and Zero-Knowledge Proofs
- Blockchains, crypto, & web3: Connections, models, more, all episodes
- Web3 is Self-Certifying
- Web5: The Decentralized Web Platform
- What is Web5, Jack Dorsey’s latest idea?
- ZKP— PlonK Algorithm Introduction
- Create your first zero-knowledge snark circuit using circom and snarkjs
- iden3 Blog
- The BBS Signature Scheme
- Anonymous Credential Part 2: Selective Disclosure and CL Signature
- tutorial anoncreds
- Medium: Arthur Hayes
- How To Script An Automatic Token Airdrop for 40k subscribers
- Zero Knowledge in DiDs and Social Networks
- How DECO Enables Undercollateralized DeFi Lending: A Proof of Concept With Teller
- CS294/194-196: Special Topics on Science and Technology of Decentralization and Decentralized Intelligence
- ZK-STARK Theory & Implementation
- Proofs, Arguments, and Zero-Knowledge, PDF, Youtube
- CSN09112 Module, Example file encryption using scrypt and NaCl for the gocrypto book
- ECE/CS 598 AM: Cryptography with Ideal Functionalities
- Einführung in die Kryptographie von Christof Paar
- Decentralized Systems Lab
- Zero-Knowledge Proofs
- Lecture slides Blockchain-based Systems Engineering
- Iden3 Documentation: Publications
- Onur Mutlu: Digital Design and Computer Architecture Spring 2020 (252-0028-00L)
- Onur Mutlu: Lecture Video Playlist on YouTube
- Andrew Miller: ECE498AC/CS498AM: Applied Cryptography, Fall 2019
- Decentralized Systems Lab: Courses
- Christine Parlour, Dawn Song: CS294-177/CS194-177/PHDBA 297T.1/MFE 230T.3: Decentralized Finance
- Intuitive Advanced Cryptography
- A Graduate Course in Applied Cryptography
- IC3 Initiative for Cryptocurrencies and Contracts
- DeFi MOOC
- Bankless
- CryptoClear
- UC Model Youtube: MACS Frontier
- Zero Knowledge
- Grand Amphi Théatre
- Finite Fields in Cryptography: Why and How
- explained-from-first-principles: Number theory
- Elliptic Curve Cryptography (ECC)
- Functional Commitment Schemes: From Polynomial Commitments to Pairing-Based Accumulators from Simple Assumptions
- Notes for Lecture 27
- Penumbra Value Commitments
- Efficient Functional Commitments: How to Commit to a Private Function
- Polynomial Commitment with a One-to-Many Prover and Applications
- Commit-Chains: Secure, Scalable Off-Chain Payments
- Lecture 10 Premiere: Privacy on the Blockchain
- Batching Techniques for Accumulators with Applications to IOPs and Stateless Blockchains
- An Expressive (Zero-Knowledge) Set Accumulator
- From Zero Knowledge to Bulletproofs
- Hyperproofs: Aggregating and Maintaining Proofs in Vector Commitments
- SNARKBlock: Federated Anonymous Blocklisting from Hidden Common Input Aggregate Proofs
- Many-out-of-many Proofs
- Zero-Knowledge for Homomorphic Key-Value Commitments with Applications to Privacy-Preserving Ledgers
- Experimenting with Collaborative zk-SNARKs: Zero-Knowledge Proofs for Distributed Secrets
- Zero-Knowledge Proofs on Secret-Shared Data via Fully Linear PCPs
- Proof of Replication
- Sealed-Glass Proofs: Using Transparent Enclaves to Prove and Sell Knowledge
- ZoKrates - Scalable Privacy-Preserving Off-Chain Computations
- LegoSNARK: Modular Design and Composition of Succinct Zero-Knowledge Proofs
- Youtube: Discrete Log based Zero-Knowledge Proofs - Dan Boneh, Stanford
- ZKProof Community Reference
- Lecture 5: Proofs of Knowledge, Schnorr’s protocol, NIZK
- Doubly-efficient zkSNARKs without trusted setup
- zkStudyClub: PCD without zkSNARK with Pratyush Mishra (UC Berkeley) & Benedikt Bünz (Stanford)
- Designated Verifier Proofs and Their Applications
- Mystique: Efficient Conversions for Zero-Knowledge Proofs with Applications to Machine Learning
- Libra: Succinct Zero-Knowledge Proofs with Optimal Prover Computation
- PlonK: Permutations over Lagrange-bases for Oecumenical Noninteractive arguments of Knowledge
- Darlin: Recursive proofs using Marlin
- Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes
- Group Signatures: Authentication with Privacy
- Proof-of-Personhood: Redemocratizing Permissionless Cryptocurrencies
- Decentralized Trust Management
- NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging
- Compact Certificates of Collective Knowledge
- CA Authorization Smart Contract Architecture
- On Enforcing the Digital Immunity of a Large Humanitarian Organization
- Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology
- Security Analysis of Coconut, an Attribute-Based Credential Scheme with Threshold Issuance
- Zero-Knowledge Proof-of-Identity: Sybil-Resistant, Anonymous Authentication on Permissionless Blockchains and Incentive Compatible, Strictly Dominant Cryptocurrencies
- Towards Self-sovereign, Decentralized Personal Data Sharing and Identity Management
- Auditable Credential Anonymity Revocation Based on Privacy-Preserving Smart Contracts
- Anonymous Credentials Light
- SCPKI: A Smart Contract-based PKI and Identity System
- Cinderella: Turning Shabby X.509 Certificates into Elegant Anonymous Credentials with the Magic of Verifiable Computation
- With a Little Help from My Friends: Constructing Practical Anonymous Credentials
- Towards Smart Contract-based Verification of Anonymous Credentials
- Exploring Web3 From the View of Blockchain
- zk-creds: Flexible Anonymous Credentials from zkSNARKs and Existing Identity Infrastructure
- Decentralized Anonymous Credentials
- A note on anonymous credentials using BLS signatures
- Zero-knowledge credentials with deferred revocation checks
- Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers
- Anonymous credentials 2.0
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- A Truly Self-Sovereign Identity System
- SAVER: SNARK-friendly, Additively-homomorphic, and Verifiable Encryption and decryption with Rerandomization
- Privacy-Preserving Reputation Systems based on Blockchain and other Cryptographic Building Blocks: A Survey
- A Survey on Authorization in Distributed Systems: Information Storage, Data Retrieval and Trust Evaluation
- Chainlink 2.0: Next Steps in the Evolution of Decentralized Oracle Networks
- Chainlink Off-chain Reporting Protocol
- Town Crier: An Authenticated Data Feed for Smart Contracts
- DECO: Liberating Web Data Using Decentralized Oracles for TLS
- Practical Decentralized Oracle Contracts for Cryptocurrencies
- Discreet Log Contracts
- Youtube: Fan Zhang- "Connection Blockchains to the Real World"
- CHORUS: a Programming Framework for Building Scalable Differential Privacy Mechanisms
- Non-Interactive Differentially Anonymous Router
- Differential Privacy for Directional Data
- GUPT: Privacy Preserving Data Analysis Made Easy
- The Algorithmic Foundations of Differential Privacy
- The Composition Theorem for Differential Privacy
- Prio: Private, Robust, and Scalable Computation of Aggregate Statistics
- Prio+: Privacy Preserving Aggregate Statistics via Boolean Shares
- Lightweight techniques for private heavy hitters
- Some Remarks and Ideas About Monetization of Sensitive Data
- On the Tradeoff Between Privacy and Utility in Data Publishing
- Empirical privacy and empirical utility of anonymized data
- Optimal Utility-Privacy Trade-off with Total Variation Distance as a Privacy Measure
- Secure Multi-party Differential Privacy
- Secure Multiparty Computation for Privacy-Preserving Data Mining
- Differential Privacy Under Fire
- Private Record Matching Using Differential Privacy
- Detecting Violations of Differential Privacy
- Verifiable Differential Privacy
- DPGen: Automated Program Synthesis for Differential Privacy
- LightDP: Towards Automating Differential Privacy Proofs
- εktelo: A Framework for Defining Differentially-Private Computations
- Approximate Span Liftings
- Differentially Private Bayesian Programming
- SAC: A System for Big Data Lineage Tracking
- Capturing and Querying Fine-grained Provenance of Preprocessing Pipelines in Data Science
- Data quality: “Garbage in – garbage out”
- Heterogeneous Private Information Retrieval
- Towards Extending Noiseless Privacy - Dependent Data and More Practical Approach
- MACAO: A Maliciously-Secure and Client-Efficient Active ORAM Framework
- A Tale of Two Trees: One Writes, and Other Reads
- Policy-Sealed Data: A New Abstraction for Building Trusted Cloud Services
- PrivacyGuard: Enforcing Private Data Usage Control with Blockchain and Attested Off-chain Contract Execution
- Towards Contractual Agreements for Revocation of Online Data
- CALYPSO: Private Data Management for Decentralized Ledgers
- Droplet: Decentralized Authorization and Access Control for Encrypted Data Streams
- Witness Encryption and its Applications
- LedgerView: Access-Control Views on Hyperledger Fabric
- WAVE: A Decentralized Authorization Framework with Transitive Delegation
- Decentralizing Privacy: Using Blockchain to Protect Personal Data
- Design of a Privacy-Preserving Decentralized File Storage with Financial Incentives
- Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials
- A2L: Anonymous Atomic Locks for Scalability in Payment Channel Hubs
- Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
- OblivP2P: An Oblivious Peer-to-Peer Content Sharing System
- Building a Secure Data Market on Blockchain, Youtube
- Zeph: Cryptographic Enforcement of End-to-End Data Privacy
- A Demonstration of Sterling: A Privacy-Preserving Data Marketplace
- Towards Building a Responsible Data Economy (Dawn Song, UC Berkeley), Youtube
- Federated Authorization over Access to Personal Data for Decentralized Identity Management
- FileBounty: Fair Data Exchange
- Do You Know Where Your Data Are? Secure Data Capsules for Deployable Data Protection
- Towards Blockchain-based Auditable Storage and Sharing of IoT Data
- Universal Atomic Swaps: Secure Exchange of Coins Across All Blockchains
- NFTs for Art and Collectables: Primer and Outlook
- IPFS - Content Addressed, Versioned, P2P File System (DRAFT 3)
- Topology-Aware Cooperative Data Protection in Blockchain-Based Decentralized Storage Networks
- Secure Untrusted Data Repository (SUNDR)
- DORY: An Encrypted Search System with Distributed Trust
- Verifiable Set Operations over Outsourced Databases
- When Query Authentication Meets Fine-Grained Access Control: A Zero-Knowledge Approach
- vSQL: Verifying Arbitrary SQL Queries over Dynamic Outsourced Databases
- Can a Public Blockchain Keep a Secret?
- CHURP: Dynamic-Committee Proactive Secret Sharing
- Storing and Retrieving Secrets on a Blockchain
- Practical Non-interactive Publicly Verifiable Secret Sharing with Thousands of Parties
- Refresh When You Wake Up: Proactive Threshold Wallets with Offline Devices
- Long Live The Honey Badger: Robust Asynchronous DPSS and its Applications
- COBRA: Dynamic Proactive Secret Sharing for Confidential BFT Services
- Smart Contract With Secret Parameters
- Espresso CAP Specification: Configurable Asset Privacy
- Decentralized Cross-Blockchain Asset Transfers
- tbDEX: A Liquidity Protocol v0.1
- The Ring of Gyges: Investigating the Future of Criminal Smart Contracts
- Marvel DC: A Blockchain-Based Decentralized and Incentive-Compatible Distributed Computing Protocol
- Towards Efficient Data Valuation Based on the Shapley Value
- AuthSC: Mind the Gap between Web and Smart Contracts
- User Centricity: A Taxonomy and Open Issues
- Dawn Song (Berkeley)- "Data Sovereignty and Decentralized Data Science"
- User-Managed Access to Web Resources
- Federated Authorization over Access to Personal Data for Decentralized Identity Management
- Bringing Privacy Control back to Citizens
- Metaverse for Social Good: A University Campus Prototype
- Personal Data: The Emergence of a New Asset Class
- Property Rights By Armen A. Alchian
- User Data Privacy: Facebook, Cambridge Analytica, and Privacy Protection
- Decentralized Society: Finding Web3’s Soul
- Cryptoeconomic Security for Data Availability Committees
- Balance: Dynamic Adjustment of Cryptocurrency Deposits
- Hawk: The Blockchain Model of Cryptography and Privacy-Preserving Smart Contracts
- VERI-ZEXE: Decentralized Private Computation with Universal Setup
- On-Chain Fully Homomorphic Encryption: smartFHE: Privacy-Preserving Smart Contracts from Fully Homomorphic Encryption
- Zexe: Enabling Decentralized Private Computation
- Zexe Youtube
- BUILDING PRACTICAL SYSTEMS THAT COMPUTE ON ENCRYPTED DATA
- Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and Performant Smart Contracts
- HoneyBadgerMPC and AsynchroMix: Practical Asynchronous MPC and its Application to Anonymous Communication
- Enigma: Decentralized Computation Platform with Guaranteed Privacy
- Arbitrum: Scalable, private smart contracts
- Decentralized Privacy-preserving Timed Execution in Blockchain-based Smart Contract Platforms
- LucidiTEE: A TEE-Blockchain System for Policy-Compliant Multiparty Computation with Fairness
- ACE: Asynchronous and Concurrent Execution of Complex Smart Contracts
- Piranha: A GPU Platform for Secure Computation
- CLOAK: Enabling Confidential Smart Contract with Multi-party Transactions
- Scalable and Privacy-preserving Off-chain Computations
- Auditable, Available and Resilient Private Computation on the Blockchain via MPC
- Pesca: A Privacy-Enhancing Smart-Contract Architecture
- Flexible Anonymous Transactions (FLAX): Towards Privacy-Preserving and Composable Decentralized Finance
- zkay: Specifying and Enforcing Data Privacy in Smart Contracts
- MP-SPDZ: A Versatile Framework for Multi-Party Computation
- Faster Secure Two-Party Computation in the Single-Execution Setting
- Computing on Encrypted Data
- Publicly Auditable MPC-as-a-Service with succinct verification and universal setup
- Multiverse of HawkNess: A Universally-Composable MPC-based Hawk Variant
- Efficient Constant-Round MPC with Identifiable Abort and Public Verifiability
- MPC-TP: Fully Linear PCPs and their Cryptographic Applications - Niv Gilboa
- Founding Secure Computation on Blockchains
- SoK: Off The Chain Transactions
- Formalizing Anonymous Blacklisting Systems
- SoK: Privacy-Preserving Computing in the Blockchain Era
- SoK: A Taxonomy of Cryptocurrency Wallets
- SoK: Off The Chain Transactions
- SoK: Certified Robustness for Deep Neural Networks
- SoK: Computer-Aided Cryptography
- SoK: Blockchain Light Clients
- SoK: General Purpose Compilers for Secure Multi-Party Computation
- SoK: TEE-assisted Confidential Smart Contract
- SoK: Differential Privacy as a Causal Property
- SoK: Research Perspectives and Challenges for Bitcoin and Cryptocurrencies
- SoK: Delegation and Revocation, the Missing Links in the Web’s Chain of Trust
- SoK: Oracles from the Ground Truth to Market Manipulation
- SoK: Benchmarking Flaws in Systems Security
- Universally Composable Security: A New Paradigm for Cryptographic Protocols
- Security and Composition of Multiparty Cryptographic Protocols
- Security and Composition of Cryptographic Protocols: A tutorial
- iUC: Flexible Universal Composability Made Simple
- Obtaining Universally Composable Security: Towards the Bare Bones of Trust
- Security and composition of cryptographic protocols: a tutorial (part I)
- A Formal Treatment of Hardware Wallets
- On the Usability of Authenticity Checks for Hardware Security Tokens
- What’s in Your Wallet? Privacy and Security Issues in Web 3.0
- Identity Management in IoT Networks Using Blockchain and Smart Contracts
- Smart Contract-Based Access Control for the Internet of Things
- PPCA: Privacy-Preserving Conditional Actions for IoT Environments Using Smart Contracts
- LegIoT: Ledgered Trust Management Platform for IoT
- A Minimalist Approach to Formalizing Analog Sensor Security
- SmartDID: A Novel Privacy-preserving Identity based on Blockchain for IoT
- INVITED Things, Trouble, Trust: On Building Trust in IoT Systems
- Smart Contract Data Feed Framework for Privacy-Preserving Oracle System on Blockchain
- A Blockchain Model in Tamarin and Formal Analysis of Hash Time Lock Contract
- Zapper: Smart Contracts with Data and Identity Privacy
- Experiences Deploying Multi-Vantage-Point Domain Validation at Let’s Encrypt
- Pistis: Issuing Trusted and Authorized Certificates With Distributed Ledger and TEE
- CanDID: Can-Do Decentralized Identity with Legacy Compatibility, Sybil-Resistance, and Accountability
- TeSC: TLS/SSL-Certificate Endorsed Smart Contracts
- One Key to Sign Them All Considered Vulnerable: Evaluation of DNSSEC in the Internet
- Designing for Tussle in Encrypted DNS
- A Cryptographic Analysis of the TLS 1.3 Handshake Protocol
- Cycling Attacks on GCM, GHASH and Other Polynomial MACs and Hashes
- Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
- Twisted Polynomials and Forgery Attacks on GCM
- GCM Security Bounds Reconsidered
- Message Franking via Committing Authenticated Encryption
- Fast Message Franking: From Invisible Salamanders to Encryptment
- Beyond Birthday Bound Secure MAC in Faulty Nonce Model
- Partitioning Oracle Attacks
- Implementing and Proving the TLS 1.3 Record Layer
- The Illustrated TLS 1.3 Connection
- ROSEN: RObust and SElective Non-repudiation (for TLS)
- ROSEN: RObust and SElective Non-repudiation (for TLS)
- Decentralized naming and certificate authority
- An ACME-based certificate authority, written in Go
- ENS
- Ethereum Name Service: the Good, the Bad, and the Ugly
- Asecuritysite: DNSSEC
- Atlan: The new way for data-driven teams to discover, understand, trust, and collaborate on data assets
- Promethium: Fast Data Discovery and Governance
- Steem: Powering Communities and Opportunities
- Affinidi: Changing data ownership for good
- Veramo: Performant and modular APIs for Verifiable Data and SSI
- GET protocol: Ticketing is the start of something bigger
- SISMO: The key primitive for web3 identities
- Proof of Interest
- libocr consists of a Go library and a set of Solidity smart contracts that implement the Chainlink Offchain Reporting Protocol
- This demonstrates how a smart contract on NEAR can access off-chain data via Chainlink's oracle solution.
- The industry leading Web3 API
- The World’s Most Powerful Blockchain Development Suite
- Composable Web3 data network
- Sign-in with Ethereum RFP
- Ceramic Protocol Specification
- Okta
- Golang SSI Framework
- NFT3 | The First Unified Virtual Identity Network for Web3
- The essential web3 toolkit for sharing and funding anything.
- Identity protocol for open applications
- Polygon DID Implementation
- Introducing Polygon ID, Zero-Knowledge Identity for Web3
- EIP-1056: Ethereum Lightweight Identity
- Claim your passport
- decentralized-identity / snark-credentials
- spruceID: Your Keys, Your Data, github
- iden3: Prove your access rights, not your identity
- emmy: Library for zero-knowledge proof based applications (like anonymous credentials
- Starkware STARK 101
- zkSync is a user-centric zk rollup platform from Matter Labs (opens new window). It is a scaling solution for Ethereum, already live on Ethereum mainnet.
- zkSNARK implementation in JavaScript & WASM
- ZoKrates
- arkworks is a Rust ecosystem for zkSNARK programming
- gnark is a fast zk-SNARK library that offers a high-level API to design circuits
- mimblewimble
- zkSNARK library implementation in Go from scratch (compiler, setup, prover, verifier)
- circom and snarkjs
- zkSnark circuit compiler
- zkSNARK implementation in JavaScript & WASM
- Circom circuits used by the iden3 core protocol.
- zkrp package
- Ethereum implementation of the Coconut smart contract library
- MerkleTree compatible with circomlib/sm
- IDEN3: Scalable distributed identity infrastructure using zero-knowledge proofs to guarantee privacy
- Iden3 Documentation: Iden3 Docs
- Circom and SnarkJS
- Robust MPC-based confidentiality layer for blockchains
- Anonymous Zether: A private payment system for Ethereum-based blockchains, with no trusted setup.
- emp-toolkit
- ABY Developer Guide
- The Confidential Computing Platform for Collaborative Analytics and AI
- Zether: Towards Privacy in a Smart Contract World
Identity Data Computation Projects (pay attention on legitimacy, verify on your own by checking docs)
- Hyperledger CL Credentials
- Hyperledger BBS+ Credentials, PDF Title: Anonymous credentials 2.0
- Veramo, docs, specs
- SpruceID, docs, cryptoscript
- iden3, docs
- Mattr, docs, learn
- Trinsic, docs
- Lukso, docs
- Ceramic, docs
- Ocean Protocol, docs
- Secret Network, docs
- Oasis Labs, docs
- iExec, docs
- Sia
- Kepler, docs
- Storj, paper
- Filecoin, paper
- brightID, docs
- civic, docs
- Decentralized Identity Foundation, docs
- ShoCard, docs
- Phala, docs
- iDX, docs
- Serto, docs
- Go Ethereum Development
- ether.js: Complete Ethereum library and wallet implementation in JavaScript
- ethr-did-resolver: DID resolver for Ethereum Addresses with support for key management
- go ethereum client
- SIGN-IN WITH ETHEREUM
- openzeppelin-contracts: OpenZeppelin Contracts is a library for secure smart contract development.
- How To Use AccessControl.sol
- Role Based Access Control for the Ethereum Blockchain
- Creating Zero knowledge Proofs with ZoKrates
- CESC: Crypto Economics Security Conference
- ICBC: IEEE International Conference on Blockchain and Cryptocurrency
- CAAW: 1st International Workshop on Cryptoasset Analytics
- Cryptography Conferences
- IEEE-Security
- Security and Privacy Conference Deadlines
- Usenix Security Symposium
- Eurocrypt
- Crypto
- S&P: IEEE Symposium on Security and Privacy
- NDSS Symposium
- Security Conference Ranking
- CCS (sigsag): ACM Conference on Computer and Communications Security
- Dawn Song
- Andrew Miller
- Thomas Ristenpart
- Dan Boneh
- Bryan Ford
- Clementine Gritti
- Andrew Paverd
- Robert Drost, Ph.D.
- Vitalik Buterin
- Dahlia Malkhi
- Pratyush Mishra
- Asset management for a DeFi world
- Institutional crypto-capital network
- Data DAO part 1 DataDAO introduction
- Tezos: A blockchain designed to evolve.
- Web 5: TBD
- Ocean: On-ramp and off-ramp for data assets into DeFi
- IC3 Newsletter.
- rekt
- Decentralized Systems Lab
- YCombinator: Hacker News
- Encrypted Data Vaults 0.1
- Decentralized Identifier Resolution (DID Resolution) v0.2
- A Primer for Decentralized Identifiers
- Verifiable Credentials Data Model v1.1
- 3ID DID Method Specification
- ERC1238: Non-transferrable Non-Fungible Tokens (NTT)
- EIP-721: Non-Fungible Token Standard
- ERC-725 - Ethereum Identity Standard
- ERC-735: Claim Holder #735
- EIP-1155: Multi Token Standard
- EIP-1462: Base Security Token
- EIP-1056: Ethereum Lightweight Identity
- Ethereum Improvement Proposals
- Blockchain Identity