Lesson 2

How On-Chain Identity Is Built

After understanding the concept of decentralized identity, the next key question is: how is on-chain identity actually implemented? A DID is not a single smart contract or a simple blockchain address. Instead, it is a complete technical system built around identity identifiers, key management, and resolution mechanisms. This lesson starts from the underlying architecture, breaking down the core components and operating logic of DID to help you form a holistic understanding of on-chain identity technology.

DID Architecture and Core Components

The goal of DID is to enable verifiable, scalable, and long-lived digital identities without relying on centralized identity providers. Rather than storing full identity data directly on-chain, DID systems adopt a modular design that combines identifiers, resolution, and credentials.

From a structural perspective, a typical DID system consists of the following core components:

  • DID Identifier: A unique identifier for an entity, usually in the format did:method:identifier
  • DID Document: A document that describes the identity’s public keys, verification methods, and service endpoints
  • Verifiable Credentials (VCs): Claims issued by third parties to prove specific attributes or qualifications
  • Decentralized storage or on-chain anchoring mechanisms: Used to ensure integrity, immutability, and long-term availability of identity data

A key design principle here is minimal on-chain storage. The blockchain is used only to anchor critical, immutable information, while detailed data can be stored off-chain or in decentralized storage systems. This approach balances security, cost, and scalability.

Public–Private Keys, Resolution, and Registration Mechanisms

Cryptography is the foundation of trust in DID systems. Unlike traditional username-and-password models, DID relies on public–private key pairs for identity control and verification, eliminating the need for centralized authentication authorities.

In practice, the DID lifecycle typically involves the following steps:

  • Users locally generate one or more public–private key pairs
  • Private keys are held and controlled by the user, and used for signing and authentication
  • Public keys are published in the DID Document for external verification
  • The DID identifier and its document are anchored on-chain or registered via a decentralized registry

When an external system needs to verify a DID, it uses a DID Resolver to retrieve the corresponding DID Document and checks whether the signature matches the public key listed in that document. This resolution process is open, standardized, and does not depend on any single institution.

It is important to note that a DID is not the same as a blockchain address. A single DID can be associated with multiple keys and supports key rotation, revocation, and permission hierarchies. These features make decentralized identities more secure, flexible, and suitable for long-term use.

Mainstream DID Methods and Standards

To support different underlying networks and use cases, DID does not have a single implementation. Instead, it is extended through DID Methods, where each method defines how identities are registered, updated, and resolved.

Some of the most representative DID methods today include:

  • did:ethr: A DID implementation based on Ethereum addresses and smart contracts
  • did:key: A lightweight DID derived directly from a public key, requiring no on-chain registration
  • did:web: A DID method that hosts DID Documents via domain names and HTTPS, making it easy to integrate with existing Web systems
  • did:ion: A highly scalable solution built on the Bitcoin network using the Sidetree protocol

At the standards level, DIDs and Verifiable Credentials are primarily driven by the W3C. Their core value lies in:

  • Ensuring interoperability across different DID methods
  • Enabling identity verification logic to work across platforms and ecosystems
  • Providing a unified interface for Web3 applications, enterprise systems, and public services

As these standards continue to mature, DID is transitioning from an experimental concept into a foundational infrastructure capable of large-scale deployment.

Disclaimer
* Crypto investment involves significant risks. Please proceed with caution. The course is not intended as investment advice.
* The course is created by the author who has joined Gate Learn. Any opinion shared by the author does not represent Gate Learn.