LAYER2.ID

Identity infrastructure for the second layer

Decentralized Identifiers

A DID is a new type of globally unique identifier — not requiring a centralized registration authority. DIDs on Layer 2 inherit the security guarantees of the base layer while achieving the throughput needed for real-world identity systems. Each identifier is a cryptographic root, branching into an ecosystem of verifiable claims.

did:layer2:zQ3shNpcFMbhLkm9RqXkPGF2
→ controller: did:layer2:zQ3shNpcF...
→ authentication: Ed25519VerificationKey2020
→ service: [IdentityHub, CredentialStore]

Root systems run deep. A DID document maps authentication methods, service endpoints, and delegation chains — forming the subterranean architecture of digital identity.

Verifiable Credentials

Seeds carry potential. A verifiable credential encapsulates a claim — signed, timestamped, and anchored to Layer 2. From academic records to professional certifications, each credential is a seed pod waiting to prove its provenance.

Identity Graphs

Branching canopies of trust. An identity graph maps the relationships between identifiers, credentials, and attestations. On Layer 2, these graphs resolve in milliseconds — enabling real-time identity verification across interconnected systems.

graph.query({
subject: "did:layer2:zQ3sh...",
predicate: "hasCredential",
depth: 3,
trust_anchor: "did:layer2:root"
})

Each node in the graph carries weight — reputation scores, attestation counts, temporal validity. The canopy grows as trust accumulates.

Protocol Architecture

The Layer 2 identity stack is built in composable modules — resolution, authentication, credential issuance, and graph traversal. Each module communicates through standardized interfaces, enabling any L2 chain to integrate sovereign identity primitives.

┌─────────────────────────────────────┐
│ Application Layer (DApps, Wallets) │
├─────────────────────────────────────┤
│ Credential Layer (VC, VP, Schema) │
├─────────────────────────────────────┤
│ Identity Layer (DID, Auth, Keys) │
├─────────────────────────────────────┤
│ Settlement Layer (L2 → L1 Anchor) │
└─────────────────────────────────────┘

Zero-Knowledge Identity

Prove who you are without revealing what you are. Zero-knowledge proofs on Layer 2 enable selective disclosure — age verification without birthdate, membership proof without member lists, credential validity without credential contents.

zkProof.generate({
claim: "age >= 18",
credential: vc_hash,
circuit: "age_range_v2",
reveal: [] // nothing disclosed
})
// → proof: 0x7a4b...f2e1 (valid)

The mathematics of privacy. Each proof is a compact witness — computationally verifiable, informationally opaque. Layer 2 makes these proofs economically viable at scale.

The Identity Layer

Layer 2 is not just a scaling solution — it is the identity layer of the decentralized web. Every transaction authenticated. Every credential verifiable. Every individual sovereign. The root system extends. The canopy grows. The seeds propagate.