Domain Privacy
Implement secure private domains using IID-compliant encryption
Domain encryption enables controllers to securely store sensitive domain settings using Interchain Identifiers (IIDs), which are fully conformant DIDs specifically designed for digital domains within blockchain namespaces.
Overview
Domain encryption provides:
- IID-compliant document structure
- Privacy-preserving domain tokenization
- Verifiable linked resources
- Polymorphic service mediation
- Herd privacy protection
Domain Settings Encryption
Domain settings encryption uses pairwise key agreement and authenticated encryption to ensure that sensitive configuration data is only accessible to authorized parties, while maintaining IID compliance.
-
Setup Encryption Keys
- Generate key agreement key pair
- Generate authentication key pair
- Register in IID document
- Secure private keys
-
Encrypt Settings
- Perform key agreement
- Derive encryption key
- Encrypt with authentication
- Generate proof
-
Store Encrypted Data
- Create encrypted resource
- Store via mediator
- Update hashgraph
- Maintain privacy
-
Access Control
- Verify recipient
- Validate authorization
- Check proofs
- Enforce permissions
Security Considerations
Key Management
- Regular key rotation
- Secure key storage
- Authorization validation
- Access revocation
Encryption
- Authenticated encryption
- Fresh nonces
- Additional data
- Integrity checks
Storage
- Off-chain encryption
- Mediator security
- Proof verification
- Backup strategy
Future Proofing
- Post-quantum readiness
- Protocol upgrades
- Version management
- Migration support
Prerequisites
IID Knowledge
- Interchain Identifier specification
- Domain tokenization concepts
- Linked resources
- Privacy-preserving features
Cryptography
- Key agreement methods
- Content-derived identifiers
- Hashgraph verification
- Tor network integration
Domain IID Setup
Privacy-Preserving Features
-
Polymorphic Mediation
- Single service endpoint
- Tor network integration
- Blind request routing
- Service negotiation
-
Resource Hashgraph
- Content-derived identifiers
- Verifiable resource linking
- Private resource count
- Proof verification
-
Herd Privacy
- Standardized document structure
- Common service patterns
- Minimal correlation data
- Population-based obscurity
-
Secure Storage
- Off-chain encryption
- Content addressing
- Distributed storage
- Access control
Implementation Guide
Domain Capabilities
Asset Identification
- Unique digital asset typing
- Token class specification
- Verifiable identifiers
- Namespace registration
Resource Linking
- On-chain/off-chain resources
- Verifiable content addressing
- Private resource metadata
- Proof verification
Rights Management
- Machine-executable rights
- Capability delegation
- Service invocation
- Access control
Entity Relationships
- Spatial Web integration
- Graph relationships
- Edge definitions
- Node connections
Security Considerations
Best Practices
IID Compliance
- Follow IID specification
- Implement privacy features
- Use content addressing
- Enable service mediation
Resource Management
- Content-derived identifiers
- Hashgraph implementation
- Private metadata
- Proof generation
Privacy
- Minimize correlation
- Use Tor endpoints
- Implement mediation
- Protect metadata
Integration
- Spatial Web compatibility
- Cross-chain interoperability
- Standard representations
- Proper verification
Developer Resources
IID Specification
Interchain Identifiers specification
Implementation Guide
IID implementation details
Privacy Guide
Privacy-preserving features
Resource Guide
Resource management
For technical support or questions about domain encryption and IIDs, join our Developer Community or contact our Developer Relations Team.
Was this page helpful?