Identity
The Gateway identity system combines blockchain wallet capabilities with proxy re-encryption requirements, creating a robust framework for secure data access and sharing. This dual-key approach enables both secure transaction signing and privacy-preserving data operations.
Identity Components
PRE-Compatible Key
The system requires an elliptic curve cryptography key pair for proxy re-encryption operations. This key enables:
- Secure data encryption
- Generation of re-encryption keys
- Secure data sharing
Blockchain Wallet
A Solana-compatible wallet provides essential capabilities for network interaction:
- Transaction signing
- Smart contract interaction
- State verification
- Access management
Decentralized Identity (DID)
Gateway implements a DID system that abstracts underlying blockchain identities, enabling seamless multi-chain support. This abstraction layer provides several key benefits:
Chain Agnosticism
The DID system encapsulates different blockchain identities, allowing Gateway to maintain consistent identity management across different blockchain networks. Users can interact with the system using their preferred blockchain wallet while maintaining consistent access rights.
Identity Resolution
The resolution process converts blockchain-specific identities into Gateway’s internal format through a deterministic mapping process. This enables consistent access control regardless of the underlying blockchain identity used for authentication.
Authentication Flow
- User initiates connection with blockchain wallet
- System verifies PRE key association
- DID resolution maps to internal identifier
- Access permissions resolve based on on-chain roles
- System establishes authenticated session
Permission Management
The identity system integrates directly with the coordination layer’s role management contract. Users can manage permissions through direct blockchain transactions, with all changes recorded on-chain. The system supports granular permission controls including:
- View/Update/Delete access levels
- Data sharing capabilities
- Time-based access restrictions
- Role-based permissions
Security Architecture
Key Security
Identity security relies on proper management of both PRE and blockchain keys. Users must:
- Maintain secure private key storage
- Implement proper backup procedures
- Follow key rotation best practices
- Keep PRE and blockchain keys separate
Access Control
The system enforces access control through cryptographic verification of both PRE and blockchain signatures. All access attempts are logged on-chain through the coordination layer’s event system.
Integration Guidelines
When implementing Gateway identity support, applications must:
- Support both PRE and blockchain key management
- Implement secure key storage
- Handle DID resolution properly
- Manage authentication sessions securely
- Monitor identity-related events