Domain encryption enables controllers to securely store sensitive domain settings using Interchain Identifiers (IIDs), which are fully conformant DIDs specifically designed for digital domains within blockchain namespaces.

Overview

Domain encryption provides:

  • IID-compliant document structure
  • Privacy-preserving domain tokenization
  • Verifiable linked resources
  • Polymorphic service mediation
  • Herd privacy protection

Domain Settings Encryption

Domain settings encryption uses pairwise key agreement and authenticated encryption to ensure that sensitive configuration data is only accessible to authorized parties, while maintaining IID compliance.

  1. Setup Encryption Keys

    • Generate key agreement key pair
    • Generate authentication key pair
    • Register in IID document
    • Secure private keys
  2. Encrypt Settings

    • Perform key agreement
    • Derive encryption key
    • Encrypt with authentication
    • Generate proof
  3. Store Encrypted Data

    • Create encrypted resource
    • Store via mediator
    • Update hashgraph
    • Maintain privacy
  4. Access Control

    • Verify recipient
    • Validate authorization
    • Check proofs
    • Enforce permissions

Security Considerations

Key Management

  • Regular key rotation
  • Secure key storage
  • Authorization validation
  • Access revocation

Encryption

  • Authenticated encryption
  • Fresh nonces
  • Additional data
  • Integrity checks

Storage

  • Off-chain encryption
  • Mediator security
  • Proof verification
  • Backup strategy

Future Proofing

  • Post-quantum readiness
  • Protocol upgrades
  • Version management
  • Migration support

Prerequisites

IID Knowledge

  • Interchain Identifier specification
  • Domain tokenization concepts
  • Linked resources
  • Privacy-preserving features

Cryptography

  • Key agreement methods
  • Content-derived identifiers
  • Hashgraph verification
  • Tor network integration

Domain IID Setup

Privacy-Preserving Features

  1. Polymorphic Mediation

    • Single service endpoint
    • Tor network integration
    • Blind request routing
    • Service negotiation
  2. Resource Hashgraph

    • Content-derived identifiers
    • Verifiable resource linking
    • Private resource count
    • Proof verification
  3. Herd Privacy

    • Standardized document structure
    • Common service patterns
    • Minimal correlation data
    • Population-based obscurity
  4. Secure Storage

    • Off-chain encryption
    • Content addressing
    • Distributed storage
    • Access control

Implementation Guide

Domain Capabilities

Asset Identification

  • Unique digital asset typing
  • Token class specification
  • Verifiable identifiers
  • Namespace registration

Resource Linking

  • On-chain/off-chain resources
  • Verifiable content addressing
  • Private resource metadata
  • Proof verification

Rights Management

  • Machine-executable rights
  • Capability delegation
  • Service invocation
  • Access control

Entity Relationships

  • Spatial Web integration
  • Graph relationships
  • Edge definitions
  • Node connections

Security Considerations

Best Practices

IID Compliance

  • Follow IID specification
  • Implement privacy features
  • Use content addressing
  • Enable service mediation

Resource Management

  • Content-derived identifiers
  • Hashgraph implementation
  • Private metadata
  • Proof generation

Privacy

  • Minimize correlation
  • Use Tor endpoints
  • Implement mediation
  • Protect metadata

Integration

  • Spatial Web compatibility
  • Cross-chain interoperability
  • Standard representations
  • Proper verification

Developer Resources

For technical support or questions about domain encryption and IIDs, join our Developer Community or contact our Developer Relations Team.