DIN Identity AI Agent Protocol

Posted on 27 March 2026 by a.human 4 min

DIN Identity AI Agent Protocol

Document 1: The DIN Protocol Specification (v1.0) Public Domain Release — "The Sovereign Identity Standard" 1. Executive Summary The Decentralised Identity Name (DIN) protocol establishes a new standard for digital existence: One Human, One Identity, Infinite Agents. In an era of autonomous AI, the critical failure of current systems is the "Accountability Gap"—agents act without verifiable permission, and identities die with the user. DIN solves this by unifying three distinct personas—Public (Official), Anonymous (Pseudonymous), and Life-Cycle (Inheritance)—into a single, sovereign on-chain object. Built on the Nervos CKB blockchain and secured by Post-Quantum Cryptography, DIN is not just a login; it is a legal container for your digital self. It ensures that every AI Agent action is traceable to a human principal, and that your digital legacy survives you. 2. The Architecture: The Sovereign Stack To ensure permanent sovereignty and quantum resistance, DIN moves beyond the limitations of standard cloud storage and smart contracts. We utilize a Three-Layer Sovereign Stack: Layer 1: The Logic Anchor (Nervos CKB) • Role: The immutable root of trust. • Mechanism: The DIN exists as a "Spore Cell"—a first-class digital asset owned directly by the user. • Why Nervos? Unlike Ethereum, where identity is state inside a smart contract, the Cell Model allows the identity to be a native asset (like a Bitcoin UTXO). The user holds the keys to the Cell; no third party can seize it. • On-Chain Data: Only the essential root hashes, public keys (Hybrid Classical + PQ), and lifecycle state are stored here, ensuring low, deterministic fees. Layer 2: The Secret Vault (Nillion) • Role: Secure storage for the "Life-Cycle" profile (Wills, Seeds, Secrets). • The Innovation: We replace standard encryption with Blind Computation. • How it Works: Sensitive inheritance data is sharded across a decentralized network using Multi-Party Computation (MPC). The data never exists in a decrypted state on any single server. It is mathematically disintegrated until the protocol authorizes its reconstruction. • Security: Information Theoretic Security. Even if a quantum computer attacks the network, the data remains inaccessible without the specific reconstruction trigger. Layer 3: The Public Asset Layer (Walrus) • Role: High-availability storage for the "Public" and "Anonymous" profiles (Portraits, Attestations, Logs). • Why Walrus? Utilizing advanced erasure coding, Walrus ensures that identity assets (like your public portrait) remain available and censorship-resistant even if a majority of storage nodes fail, at a fraction of the cost of Arweave. 3. The Three-Profiles Specification DIN unifies the fragmented self into three composable profiles stored within the Spore Cell: Profile Function Technology Public (Front Portrait) Official Business, KYC, Legal Identity. Watermarked portrait stored on Walrus. Attestations from family/pros signed via ZK-Proofs. Anonymous (Rear GAN Portrait) Pseudonymous Forums, Gaming, Agent Ops. GAN-generated face (no real biometrics). ZK-Proofs allow login without revealing identity. Life-Cycle (The Vault) Death, Inheritance, Emergency Recovery. Stored on Nillion. Accessible only via the Hybrid Life-Lock trigger. 4. The Inheritance Mechanism: The Hybrid Life-Lock To prevent the "Schrödinger’s User" problem (where a living user is mistakenly declared dead), DIN implements a Two-Factor Death Trigger. The Logic Gate: The Vault opens ONLY if: 1. Condition A: Proof of Silence (Time-Lock). The user has failed to sign a "Heartbeat" transaction for a set duration (e.g., 6 months). 2. Condition B: Proof of Death (Attestation). A threshold of Guardians (Social Recovery) OR Oracle-verified Death Certificates is submitted. Why this is safer: • Coma Protection: If you are offline (Condition A met), your family knows you are alive and will not sign the attestation (Condition B failed). Your assets are safe. • Hostage Protection: If you are coerced, the Time-Lock is not yet expired (Condition A failed), protecting your assets from forced transfer. 5. Cryptography Standard DIN mandates Hybrid Signatures for all critical actions to ensure Post-Quantum readiness: SIG = SIG_Classical (Ed25519) || SIG_PostQuantum (CRYSTALS-Dilithium) This ensures that your identity remains secure even if elliptical curve cryptography is broken in the future.