layer-2.id

Identity is the first layer.
Verification is the second.

I. FOUNDATION

Layer-2 identity is the architecture of verified existence in a decentralized world. It is not a database entry, nor a username, nor a profile photograph attached to an email address. It is a cryptographic commitment — a mathematical proof that a particular entity exists, possesses certain attributes, and has been attested to by a network of verifiers whose consensus is anchored to an immutable base chain.

The concept emerges from a fundamental tension in blockchain architecture: the base layer (Layer-1) provides absolute security through redundancy and decentralization, but at the cost of throughput, privacy, and expressiveness. Identity — with its nuanced claims, selective disclosures, and contextual presentations — demands a richer computational environment. Layer-2 provides that environment while inheriting the base layer’s guarantees through periodic anchoring.

In this architecture, an identity is not stored. It is proven. The distinction is profound: storage implies a custodian, a server, a point of failure. Proof implies mathematics — a structure that is true regardless of who evaluates it, where it is computed, or when it is verified. Your identity on Layer-2 is as permanent as a theorem.

II. MECHANISM

The mechanism of Layer-2 identity operates through a compression-and-commitment cycle that transforms rich identity claims into succinct proofs anchored to the base chain. This cycle is the beating heart of the system — the rhythmic process through which identity achieves both expressiveness and finality.

Claim Compression
Identity attributes — name, credential, biometric hash, institutional attestation — are encoded as leaves in a Merkle tree. The tree’s root, a single 32-byte hash, represents the entirety of an identity’s claims at a given moment. This root is the identity’s fingerprint: compact, unique, and computationally bound to every claim it contains.
Batch Aggregation
Multiple identity roots are themselves aggregated into a higher-order commitment — a batch proof that attests to thousands of identities simultaneously. This is the scaling mechanism: the base chain need not process each identity individually but instead verifies a single proof that covers an entire batch.
Anchor Submission
The batch proof is submitted to the base chain as a transaction. Once confirmed, every identity within the batch inherits the security guarantees of the base layer — immutability, censorship resistance, and global verifiability — without having individually consumed base-layer resources.
Selective Disclosure
An identity holder can reveal specific claims without exposing others. Using Merkle proofs, they demonstrate that a particular attribute exists within their identity tree without revealing the tree’s full contents. The verifier checks the proof against the anchored root: if the mathematics hold, the claim is true.
A Layer-2 identity is not a record. It is a proof — a mathematical object whose existence guarantees its truth.

The identity artifact exists in a space between the physical and the abstract. It cannot be held, yet it has weight. It cannot be seen, yet it has form. It is the first object in human history whose authenticity is self-evident — requiring no authority, no institution, no trust in any party other than mathematics itself. In this, Layer-2 identity completes a project that began with wax seals and notary stamps: the creation of credentials that are unforgeable by design, not merely by difficulty.

layer-2.id
Est. MMXXVI