Identity infrastructure for the second layer
A DID is a new type of globally unique identifier — not requiring a centralized registration authority. DIDs on Layer 2 inherit the security guarantees of the base layer while achieving the throughput needed for real-world identity systems. Each identifier is a cryptographic root, branching into an ecosystem of verifiable claims.
did:layer2:zQ3shNpcFMbhLkm9RqXkPGF2
→ controller: did:layer2:zQ3shNpcF...
→ authentication: Ed25519VerificationKey2020
→ service: [IdentityHub, CredentialStore]
Root systems run deep. A DID document maps authentication methods, service endpoints, and delegation chains — forming the subterranean architecture of digital identity.
Branching canopies of trust. An identity graph maps the relationships between identifiers, credentials, and attestations. On Layer 2, these graphs resolve in milliseconds — enabling real-time identity verification across interconnected systems.
graph.query({
subject: "did:layer2:zQ3sh...",
predicate: "hasCredential",
depth: 3,
trust_anchor: "did:layer2:root"
})
Each node in the graph carries weight — reputation scores, attestation counts, temporal validity. The canopy grows as trust accumulates.
Prove who you are without revealing what you are. Zero-knowledge proofs on Layer 2 enable selective disclosure — age verification without birthdate, membership proof without member lists, credential validity without credential contents.
zkProof.generate({
claim: "age >= 18",
credential: vc_hash,
circuit: "age_range_v2",
reveal: [] // nothing disclosed
})
// → proof: 0x7a4b...f2e1 (valid)
The mathematics of privacy. Each proof is a compact witness — computationally verifiable, informationally opaque. Layer 2 makes these proofs economically viable at scale.