Skip to main content

Envisioning is an emerging technology research institute and advisory.

LinkedInInstagramGitHub

2011 — 2026

research
  • Reports
  • Newsletter
  • Methodology
  • Origins
  • My Collection
services
  • Research Sessions
  • Signals Workspace
  • Bespoke Projects
  • Use Cases
  • Signal Scanfree
  • Readinessfree
impact
  • ANBIMAFuture of Brazilian Capital Markets
  • IEEECharting the Energy Transition
  • Horizon 2045Future of Human and Planetary Security
  • WKOTechnology Scanning for Austria
audiences
  • Innovation
  • Strategy
  • Consultants
  • Foresight
  • Associations
  • Governments
resources
  • Pricing
  • Partners
  • How We Work
  • Data Visualization
  • Multi-Model Method
  • FAQ
  • Security & Privacy
about
  • Manifesto
  • Community
  • Events
  • Support
  • Contact
  • Login
ResearchServicesPricingPartnersAbout
ResearchServicesPricingPartnersAbout
  1. Home
  2. Research
  3. Sentinel
  4. Decentralized Identifiers

Decentralized Identifiers

Cryptographically verifiable identifiers created and controlled by users, not centralized authorities
Back to SentinelView interactive version

Decentralized Identifiers (DIDs) represent a fundamental shift in how digital identity is managed and verified in an increasingly interconnected world. Unlike traditional identifiers such as email addresses, usernames, or government-issued ID numbers that depend on centralized authorities to issue and validate them, DIDs are cryptographically generated strings that individuals or organizations can create independently. The technology operates through a distributed ledger or blockchain infrastructure, where each DID is associated with a DID document containing public keys, authentication protocols, and service endpoints. This document enables cryptographic verification of identity claims without requiring a central authority to vouch for authenticity. The controller of a DID maintains private keys that prove ownership and allow them to update or revoke their identifier, creating a self-sovereign identity model where users retain complete control over their digital credentials and personal information.

The emergence of DIDs addresses critical vulnerabilities in current identity systems that have plagued both individuals and organizations for decades. Centralized identity providers create single points of failure, making them attractive targets for data breaches that can expose millions of user credentials simultaneously. Furthermore, traditional systems force users to fragment their digital identities across countless platforms, each collecting and controlling personal data with limited transparency or user oversight. DIDs solve these problems by enabling portable, interoperable identity credentials that users can present selectively across different contexts without creating new accounts or surrendering control to platform operators. This technology also tackles the challenge of identity verification in cross-border transactions and digital services, where differing standards and regulatory frameworks have historically created friction. By establishing a universal, cryptographically secure method for proving identity claims, DIDs enable new business models in sectors ranging from financial services to healthcare, where secure, privacy-preserving identity verification is essential.

Early implementations of DID technology are already emerging across various sectors, with particular traction in government digital identity programs and enterprise authentication systems. Research initiatives and pilot programs have demonstrated the viability of DIDs for educational credential verification, allowing students to maintain verifiable records of their achievements independent of any single institution. In supply chain management, DIDs are being explored as a means of establishing provenance and authenticity for products moving through complex global networks. The technology aligns with broader trends toward data sovereignty and privacy-enhancing technologies, particularly as regulatory frameworks like GDPR emphasize individual control over personal information. As interoperability standards mature and more organizations adopt DID-compatible systems, this technology is positioned to become foundational infrastructure for the next generation of digital interactions, enabling a future where individuals can navigate online spaces with greater security, privacy, and autonomy over their digital identities.

TRL
8/9Deployed
Impact
5/5
Investment
3/5
Category
Software

Related Organizations

Decentralized Identity Foundation (DIF) logo
Decentralized Identity Foundation (DIF)

United States · Consortium

100%

An engineering-driven organization developing the technical specifications and standards for decentralized identity.

Standards Body
World Wide Web Consortium (W3C) logo
World Wide Web Consortium (W3C)

United States · Consortium

100%

The international standards organization for the Web, responsible for the Decentralized Identifiers (DID) and Verifiable Credentials (VC) recommendations.

Standards Body
Danube Tech logo
Danube Tech

Austria · Company

95%

A company specializing in decentralized identity software, maintaining the Universal Resolver for DIDs.

Developer
Digital Bazaar logo
Digital Bazaar

United States · Company

95%

Web technology company specializing in digital identity and payment standards.

Developer
Spruce ID logo
Spruce ID

United States · Startup

95%

Develops decentralized identity software, including tools for verifiable credentials and ZK-based authentication.

Developer
MATTR logo
MATTR

New Zealand · Startup

90%

Provides a platform for creating and verifying digital credentials, contributing heavily to JSON-LD and BBS+ signature standards.

Developer
Transmute logo
Transmute

United States · Startup

90%

A company applying verifiable credentials and DIDs to supply chain security and trade documentation.

Developer
Walt.id logo
Walt.id

Austria · Startup

90%

Provides open-source infrastructure for decentralized identity and wallets, supporting W3C standards and ZK proofs.

Developer
Spherity logo
Spherity

Germany · Startup

85%

Decentralized digital identity software provider focusing on Digital Product Passports and machine identity.

Deployer
Gen Digital logo
Gen Digital

United States · Company

80%

Parent company of Avast, which acquired Evernym (the creator of Sovrin), consolidating key SSI technology.

Acquirer
Mesh logo
Mesh

United States · Startup

80%

Embedded finance and crypto transfer platform.

Developer

Supporting Evidence

Evidence data is not available for this technology yet.

Connections

Software
Software
Verifiable Credentials

Cryptographically signed digital attestations that users control and share selectively

TRL
8/9
Impact
5/5
Investment
4/5
Applications
Applications
Self-Sovereign Identity Wallets

Digital wallets that let users store and share verified credentials without relying on centralized authorities

TRL
7/9
Impact
5/5
Investment
4/5
Software
Software
Verifiable Data Registries

Distributed ledgers that track authorized credential issuers and validate digital identity claims

TRL
6/9
Impact
5/5
Investment
4/5
Applications
Applications
Mobile Digital Identity (mDL)

Government-issued driver's licenses and IDs stored securely on smartphones

TRL
8/9
Impact
5/5
Investment
5/5
Applications
Applications
Cross-Border eID Schemes

Electronic identity systems that work across national borders through technical and legal frameworks

TRL
7/9
Impact
5/5
Investment
4/5
Applications
Applications
Digital Twin Identity Frameworks

Cryptographic binding systems that link physical assets to their virtual replicas

TRL
6/9
Impact
4/5
Investment
4/5

Book a research session

Bring this signal into a focused decision sprint with analyst-led framing and synthesis.
Research Sessions