Skip to main content

Overview

D-Chain is an application specific blockchain that is designed to host regulated decentralised applications in a public manner.

It is designed to facilitate compliant & disintermediated interactions using value-representing verifiable data;

There are two unique features provided by D-Chain to support decentralised applications deployed: Offchain Data verification and Utilities for Compliance.

The combination of these two simple yet powerful features the infrastructure for decentralised applications deployed on D-Chain to transact, without intermediaries, a wide range of real world assets backed by verifiable data.

Bringing Verifiable Data Onchain

D-Chain facilitates decentralised applications to register the verification requirements and post verification action(s) to perform state change on chain.

For publicly & onchain verifiable data, onchain verification does not require the source of data to be checked and so users / providers can make submission as defined by application.

Examples: zk-proofs, snarks, verifiable credential presentations

For offchain / cryptographically verifiable data: the verification mechanism maybe consensus based, through extension data provided by validators delegated to perform verification in a sidecar process. E.g. Digital signatures on documents / contracts. It is important to note that in this case, validators are not attesting to the data themselves but to the verification processes - which are auditable.

Examples: very large data size, confidentiality requirements

For trusted sender attestation: this category are used for applications to assign trusted parties who are effectively the appointed verifiers of the data.

Example: data submitted by certain sender address(es) / includes certain verifiable presentation

Read more in the offchain verifiable data notary section.

Utilities for Compliance

Embedded Self Sovereign Identity Verification

The Self Sovereign Identity (SSI) framework is extensively used and embedded on every level of D-Chain. In the Verifiable Credential Trust Triangle, D-Chain provides verification utilities for onchain verification.

On the deploy decentralised application level: each application registers their verifiable presentation (VP) requirements for interaction types in D-Chain VerificationRouteRegistry, and the chain ensures that a valid VP is provided by the user as part of the transaction for the given interaction.

For usage of D-Chain native functionalities, the chain's governance decides on the VP needed, for example, instead of voting on specific accounts that can deploy smart contracts, the rule based governance allows anyone with valid (VP) to execute such an action.

On consensus building level: each validator for D-Chain are uniquely onboarded and incentivised to provide high assurance level, which is important to provide the aforementioned service of running verification sidecars. Onboarding include obtaining a valid verifiable credential issued by one of the trusted issuers determined by the chain's governance. A verifiable presentation derived from the credential are used and validated for each successful block proposal.

This consensus level verification ensures block are proposed only by accountable entities. This creates the foundational trust for all transaction for all applications that happens on D-Chain.

Initially, VP that are compatible with European Digital Identity (EUDI) regulations is expected to be adopted, fostering the onboarding and trust for millions of European citizens and businesses.

Reinventing a new identity layer creates new regulatory and onboarding challenges.

Read more in the Verifiable Credential Verification section.

Abstract Account for InfoSec

Account Abstraction is native on D-Chain to provide flexibility for decentralised applications to create user interfaces that can provide the same level of consumer protection as current compliant financial applications.

Read more in the abstract account section.