Decentralized Identity (DID)
Generate cryptographic identities that you own and control. Sign and verify messages with your DID keys.
Generate Your DID
Create a new Decentralized Identifier using Web Crypto API.
Sign a Message
Use your private key to sign a message.
Verify Signature
Verify that a signature was created with your public key.
DID Flow Diagram
Step 1: Key Generation
Browser generates ECDSA key pair using Web Crypto API. Private key never leaves your device.
Step 2: DID Creation
DID is derived from public key hash: did:genesis:[base58(publicKey)]
Step 3: DID Document
JSON-LD document describing the DID, authentication methods, and service endpoints.
Step 4: Message Signing
Sign messages with private key. Signature proves message ownership without revealing key.
Step 5: Verification
Anyone with your public key can verify you signed a message. No central authority needed.