Decentralized Identity (DID)

Generate cryptographic identities that you own and control. Sign and verify messages with your DID keys.

Generate Your DID

Create a new Decentralized Identifier using Web Crypto API.

Sign a Message

Use your private key to sign a message.

Verify Signature

Verify that a signature was created with your public key.

DID Flow Diagram

Step 1: Key Generation

Browser generates ECDSA key pair using Web Crypto API. Private key never leaves your device.

Step 2: DID Creation

DID is derived from public key hash: did:genesis:[base58(publicKey)]

Step 3: DID Document

JSON-LD document describing the DID, authentication methods, and service endpoints.

Step 4: Message Signing

Sign messages with private key. Signature proves message ownership without revealing key.

Step 5: Verification

Anyone with your public key can verify you signed a message. No central authority needed.