Introduction

Litentry Protocol is helping support change that in favour of a user-centric internet with the blockchain.

Concept of User-Centric Internet

As you entrust safe-storage of your passwords and online activity data to third parties on the app-centric internet of today, you are often asked to comply with ambiguous and unfair privacy policies handing over control your own data. As a result your data is often harvested and used in ways you do not have a say in and which you have not approved of.

Litentry is helping support change that in favor of a user-centric internet with the blockchain. That means the internet should driven by the users needs. As a Litentry user you are in total control of your information and will be able to decide exactly what information is shared with various apps and services. You will not be subject to the cost of migration from one application to another or subject to specific terms of a particular app or service. The profit generated by the user's data should flow back to you the user, instead of mainly flowing to service providers/companies, this is made possible by woning your own data and not being subject to the restrictions and applications lockins that are so familiar with Internet 2.0. With Litentry and Internet 3.0 you will be able to ensure that you only provide your user data when you want to and that you are rewarded if/when you supply your data to any advertiser or service provider.

Litentry includes an identity-based network and related tools, as a whole it consists of a decentralized identity authentication and user activity data management infrastructure.

Highlighths

Blockchain Powered

Litentry is built on Substrate, and as such Litentry inherits the leading edge technologies of the Blockchain industry. Litentry aim to be one of the first Parachains of Polkadot Network and as such benefit from this thriving cross-chain ecosystem and Polkadot's shared security.

Identity Management

Users get back the control of access history and privacy data generated in the apps or services. And their identities are kept anonymous and independent from each other.

Decentralized Storage

A user is able to store their encrypted identity related data on a decentralized storage like IPFS or Arweave, or an on-chain Database. The data is protected by the access control of decentralized storage.

Identity Staking

With a transparent protocol, an identity owner could stake his identity into identity pools and get regular rewards while still having their data and real world identity protected. In other words by staking your identity and data, you make your data available anonymously to be queried and mined by an app or service. This means that your data can be monetised for your benefit as well as for the DApp that is mining the data through permissioned data queries.

Decentralized Ecosystem Contributor

Since your identity profile can be shared anonymously between different platforms, a user does not need to create multiple accounts in each application in order to use the different services without creating user profiles, passwords and registration with each service. Because the user owns his/her data the barriers of migrating to another service are significantly lower. This allows the user to easily migrate to the service or application that best services their needs in a frictionless manner. Because the user owns their own data and profile the application or service is prevented from building an invasive user profile. Through this Litentry, the user and the decentralized ecosystem benefit each other.

Concept of Decentralization

The decentralization of Litentry includes following aspects:

Decentralization of identity storage

With Litentry the User's data, including identity credential, are stored in a anonymous encrypted decentralized storage, instead of the central data server of the service provider, currently we support IPFS, in the future we will have other storage support like Arwaeve or Litentry native on-chain key-value store.

Decentralization of identity authentication

When user requires an authentication, he needs to submit an authentication request transaction. The identity validator listens to the authentication request event from the Litentry Mainnet. Then it provides validation for the authentication request.

Decentralization of identity relationships

The relationship of user's data stored in an external storage, and the identity associated with it is validated with cryptographic calculation, and is recorded in the decentralized network instead of regular centralized service like Certificate Authority used in HTTPS protocol. The owner (real person) may have different identities and the different identities belonging to owner are not discoverable in any of the data, and protected by Schnorr25519 Algorithm. In a similar way to which your public and private keys of a wallet are related but your private key is not discoverable from you public key.

Decentralization of Identity Data Allocation

The user data generated when using third party applications/services is processed by the resolver function on Litentry Network, thus providing the user with trustworthy data, from various sources. As such users are able to get and store valuable user profile like health info, shopping history, etc.

Definitions

User

The user is the origionator of the data, it is a person who owns one or more identities or IoT devices.

Identity

It is a generalized concept of identity, not only includes the identity of a person, but also the identity of anything tht could generate claims like an IoT device. A person could own multiple identities, like an identity that only related to their music preferences, an identity only for data in Germany, or an identity as a game player in a specific game or accross many games. The identity is the reference to its related external user data, the id by itself does not have any meaning other than the linking of the user with the external user data.

External Data

Data generated when using the applications/services like the shopping history when a user is shopping in e-store. This external user data is associated with a particular user identity.

Authorization Token

The authorization token is a cryptographic proof that the holder of the token has permission to read and/or write external data for the related identity. This is similar to an authorisation token that would give permission to do a transaction from your crypto wallet.