Working Groups

As an engineering-driven development-focused organization, our Working Groups are at the core of everything we do.

Claims and Credentials

Join this group to contribute to the standards and technology that create, exchange, and verify claims and credentials in a decentralized identity ecosystem. For example, a cryptographically...
Learn More

DID Methods

Members of this Working Group are creating specifications to standardize an initial set of commonly used DID methods and develop strategies for collaborative, scalable, self-help standardization of...
Learn More

Creator Assertions

The Creator Assertions Working Group builds upon the work of the Coalition for Content Provenance and Authenticity (C2PA) by defining additional assertions that allow content creators to express...
Learn More

DIDComm

Join this group to contribute to specs that embody a method for secure, private and authenticated message-based communication, where trust is rooted in DIDs and used over a wide variety of transports.
Learn More

Hospitality & Travel WG

To create standards, schemas, processes, and related documentation designed to support the exchange of self-sovereign data of travelers, services, and intermediaries in the hospitality and travel...
Learn More

Identifiers & Discovery

Members of the Working Group are engaged in development of protocols and systems that enable creation, resolution, and discovery of decentralized identifiers and names across underlying decentralized...
Learn More

Applied Crypto

The Cryptography Working Group will explore cryptographic protocols and -primitives related to Decentralized Identity, including, but not limited to, specific and actual cryptographic topics, such as...
Learn More

Labs

The DIF Labs Working Group serves as an incubation environment for decentralized identity-based user applications and spec implementations. The WG provides an IP-safe environment for general...
Learn More

Archived Working Groups

Previously active working groups that have completed their charter or been superseded.

DID Authentication

Learn More

Secure Data Storage

Learn More

Sidetree

Learn More

Wallet Security

Learn More

Storage and Compute

Learn More

KERI

Learn More