Litentry Protocol is helping support change that is in favour of a user-centric internet with the blockchain.

Concept of User-Centric Internet

As you entrust safe storage of your passwords and online activity data to third parties on the app-centric internet of today, you are often asked to comply with ambiguous and unfair privacy policies which involves handing over control of your data. As a result, your data is often harvested and used in ways you do not have a say in and which you have not approved of.

Litentry is helping support change in favor of a user-centric internet with the blockchain. That means the internet should be driven by the users' needs. As a Litentry user you are in total control of your information and will be able to decide exactly what information is shared with various apps and services. You will not be subject to the cost of migration from one application to another or subject to specific terms of a particular app or service. The profit generated by the user's data should flow back to you the user, instead of mainly flowing to service providers/companies, this is made possible by owning your own data and not being subject to the restrictions and application lockins that we are so familiar with on Internet 2.0. With Litentry and Internet 3.0 you will be able to ensure that you only provide your user data when you want to and that you are rewarded if/when you supply your data to any advertiser or service provider.

Litentry includes an identity-based network and its' related tools, as a whole it consists of decentralized identity authentication and user activity data management infrastructure.


Blockchain Powered

Litentry is built on Substrate, and as such Litentry inherits the leading edge technologies of the Blockchain industry. Litentry aim to be one of the first Parachains of Polkadot Network and as such benefit from this thriving cross-chain ecosystem and Polkadot's shared security.

Identity Management

Users get back the control of access history and privacy data generated in the apps or services. And their identities are kept anonymous and independent from each other.

Decentralized Storage

A user is able to store their encrypted identity-related data on decentralized storage services like IPFS or Arweave, or an on-chain Database. The data is protected by the access control of decentralized storage.

Identity Staking

With a transparent protocol, an identity owner could stake his identity into identity pools and get regular rewards while still having their data and real-world identity protected. In other words, by staking your identity and data, you make your data available anonymously to be queried and mined by an app or service. This means that your data can be monetised for your benefit as well as for the DApp that is mining the data through permissioned data queries.

Decentralized Ecosystem Contributor

Since your identity profile can be shared anonymously between different platforms, a user does not need to create multiple accounts in each application in order to use different services. Because the user owns his/her data the barriers of migrating to another service are significantly lower. This allows the user to easily migrate to the service or application that best services their needs in a frictionless manner. Because the user owns their own data and profile, the application or service is prevented from building an invasive user profile. Through this Litentry, the user and the decentralized ecosystem benefit each other.

Concept of Decentralization

The decentralization of Litentry includes the following aspects:

Decentralization of identity storage

With Litentry the Users' data, including identity credentials, are stored in an anonymous encrypted decentralized storage, instead of the central data server of the service provider. Currently, we support IPFS, in the future, we will have other storage support like Arwaeve or Litentry native on-chain key-value store.

Decentralization of identity authentication

When a user requires an authentication, he needs to submit an authentication request transaction. The identity validator listens to the authentication request event from the Litentry Mainnet. Then it provides validation for the authentication request.

Decentralization of identity relationships

The relationship between the user's data stored in external storage and the identity associated with it is validated with cryptographic calculation and is recorded in the decentralized network instead of regular centralized services like Certificate Authority used in HTTPS protocol. The owner (real person) may have different identities and the different identities belonging to the owner are not discoverable in any of the data and protected by Schnorr25519 Algorithm. In a similar way to which your public and private keys of a wallet are related but your private key is not discoverable from your public key.

Decentralization of Identity Data Allocation

The user data generated when using third-party applications/services are processed by the resolver function on Litentry Network, thus providing the user with trustworthy data, from various sources. As such users are able to get and store valuable user profiles like health info, shopping history, etc.



The user is the originator of the data, it is a person who owns one or more identities or IoT devices.


It is a generalized concept of identity, it not only includes the identity of a person, but also the identity of anything that could generate claims like an IoT device. A person could own multiple identities, for example:

  • An identity that is related to a user's music preferences.
  • An identity for their data in Germany.
  • An identity as a game player in a specific game or across many games.

The identity is the reference to its related external user data, the id by itself does not have any meaning other than the linking of the user with the external user data.

External Data

Data that is generated when using the applications/services like the shopping history when a user is shopping an in e-store. This external user data is associated with a particular user identity.

Authorization Token

The authorization token is cryptographic proof that the holder of the token has permission to read and/or write external data for the related identity. This is similar to an authorisation token that would give permission to do a transaction from your crypto wallet.