Skip to content

w3c-cg/udna

Universal DID-Native Addressing (UDNA)

UDNA Banner

The Architecture Revolution: From Network Locations to Sovereign Identity

Reconstructing Digital Interaction Through Cryptographic Addressing

Concept Architecture Technical Specification Research Roadmap


Navigation Matrix


Executive Synthesis

Universal DID-Native Addressing (UDNA) represents a fundamental architectural reconstruction of digital addressing, establishing Decentralized Identifiers (DIDs) as the primary addressing primitive, supplanting location-based IP addresses and URLs with cryptographic identity.

Core Proposition

"The current internet architecture centers on where information resides rather than what entity it represents. UDNA inverts this paradigm, embedding identity as a first-class construct within the network fabric."

Architectural Contrast

Dimension Contemporary Internet UDNA Architecture Architectural Impact
Addressing Primitive IP addresses (geographic location) DIDs (cryptographic identity) Services become mobile, identity persists
Security Model TLS/SSL (layered security) Embedded cryptographic verification Elimination of man-in-the-middle vectors
Discovery Protocol DNS (hierarchical resolution) DID document resolution (decentralized) Direct, verifiable service discovery
Privacy Architecture IP correlation vulnerability Pairwise pseudonymous identifiers Systemic metadata leakage reduction

Evolutionary Trajectory

Legacy Internet Architecture (1980s-Present)    UDNA Architecture (Future State)
      ↓                                                  ↓
[IP Addresses] β†’ [DNS Names] β†’ [URLs]          [DIDs] β†’ [Verifiable Services]
      ↓                                                  ↓
Location-centric addressing                 Identity-centric addressing
"Connect to this server"                   "Communicate with this entity"

The Architectural Imperative

Systemic Limitations of Current Addressing

Technical Constraints Security Vulnerabilities User Experience Deficiencies

Location Binding

  • Services anchored to physical infrastructure
  • Architectural fragility during migration
  • Complexity from CDNs and load balancers

Protocol Fragmentation

  • Disparate protocols (HTTP, WebSocket, gRPC)
  • Inconsistent authentication models
  • Port and protocol management overhead

Infrastructure Dependencies

  • Centralized DNS hierarchies
  • Certificate Authority monopolies
  • Cloud provider architectural lock-in

Delegated Trust Model

  • Certificate Authorities as single points of failure
  • DNS poisoning and cache injection attacks
  • BGP hijacking vulnerabilities

Surveillance Architecture

  • IP address tracking and correlation
  • Metadata collection surface area
  • Geographic restriction mechanisms

Attack Surface Expansion

  • Man-in-the-middle interception points
  • Phishing through URL obfuscation
  • DDoS amplification vulnerabilities

Authentication Fatigue

  • Repeated authentication across services
  • Password managers as compensatory systems
  • Multi-factor authentication complexity

Device Proliferation Complexity

  • Separate identities per device ecosystem
  • Synchronization and backup challenges
  • Cross-device authentication friction

Service Silos

  • Absence of portable reputation systems
  • Repeated identity verification cycles
  • Systemic data duplication

The Identity Crisis in Digital Architecture

  1. We address infrastructure, not entities - IPs reference machines, not principals
  2. We authenticate redundantly - Each service requires independent proof
  3. We trust intermediaries by necessity - CAs, DNS providers, identity brokers
  4. We leak metadata architecturally - IPs expose location and enable correlation
  5. We cannot migrate services transparently - URLs fracture when infrastructure evolves

The UDNA Paradigm

Fundamental Principle: Identity as Address

Transitioning from https://api.service-provider.com/user/profile to:

udna://did:web:user.example/personal/profile
udna://did:key:z6Mk...9pAqkPc/services/communication
udna://did:ion:abc...xyz/api/v1/documents

Architectural Innovations

Innovation Technical Description Systemic Benefit
Identity-First Routing Network routing based on cryptographic identity rather than location Transparent service mobility without address disruption
Embedded Authentication Identity verification integrated into addressing layer Elimination of separate authentication protocols
Capability-Based Authorization Fine-grained permissions encoded within address structure Least-privilege access as default architectural principle
Privacy-Preserving Architecture Pairwise DIDs preventing correlation across contexts Metadata minimization at protocol level
Decentralized Resolution DID method resolution replacing centralized DNS Elimination of single points of failure

Technical Foundation

UDNA constructs upon established standards:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                   UDNA Architectural Stack                   β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  UDNA Protocol Layer                                        β”‚
β”‚  β€’ Identity-native addressing                               β”‚
β”‚  β€’ Capability-based URL semantics                          β”‚
β”‚  β€’ Decentralized service discovery                         β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  W3C DID Core 1.0 + DIDComm v2 Foundation                  β”‚
β”‚  β€’ Decentralized Identifiers                               β”‚
β”‚  β€’ DID Document structure                                  β”‚
β”‚  β€’ DID Resolution protocol                                 β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  Existing Transport Infrastructure                          β”‚
β”‚  β€’ HTTP/3, WebSocket, WebRTC                               β”‚
β”‚  β€’ TLS 1.3, Noise Protocol Framework                      β”‚
β”‚  β€’ QUIC, libp2p transport layers                          β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Architectural Framework

Layered System Architecture

graph TB
    subgraph "Application Layer"
        A1[Web Applications]
        A2[Mobile Applications]
        A3[IoT Device Ecosystems]
        A4[API Service Meshes]
    end
    
    subgraph "UDNA Protocol Layer"
        B1[UDNA Addressing Schema<br/>udna://did:method/path]
        B2[DID Resolution Infrastructure<br/>Multi-method support]
        B3[Capability System Architecture<br/>Fine-grained authorization]
        B4[Service Discovery Protocol<br/>Via DID document endpoints]
    end
    
    subgraph "Identity Layer"
        C1[W3C DID Standard<br/>did:key, did:web, did:ion]
        C2[DID Document Structure<br/>Public keys, service endpoints]
        C3[Verifiable Credentials<br/>Selective disclosure framework]
    end
    
    subgraph "Transport Layer"
        D1[HTTP/3, WebSocket Protocols]
        D2[WebRTC, libp2p Transports]
        D3[TLS 1.3, Noise Security]
    end
    
    A1 --> B1
    A2 --> B1
    A3 --> B1
    A4 --> B1
    
    B1 --> C1
    B2 --> C2
    B3 --> C3
    B4 --> C2
    
    C1 --> D1
    C2 --> D2
    C3 --> D3
Loading

Core Components

1. UDNA Addressing Schema

udna://{did}/{path}?{query}#{fragment}
       ↑      ↑        ↑         ↑
    Protocol  Identity Resource  Capability
               ↑
          e.g., did:web:user.example
                did:key:z6Mk...9pAqkPc
                did:ion:abc...xyz

2. DID Resolution Infrastructure

  • Local Resolution Cache: Sub-millisecond resolution for known DIDs
  • Peer-to-Peer Resolution: Distributed resolution network
  • Pluggable Method Resolvers: Extensible DID method support
  • Resolution Fallback Chains: Multi-strategy resolution pathways

3. Capability Architecture

{
  "capability": "udna://did:web:principal.example/data/read",
  "issuer": "did:web:authority.example",
  "audience": "did:web:service.example",
  "expiration": "2024-12-31T23:59:59Z",
  "authorized_actions": ["read"],
  "constraints": {
    "access_quota": 1000,
    "temporal_window": "9:00-17:00"
  }
}

4. Service Discovery Protocol

DID documents function as service registries:

{
  "id": "did:web:service-provider.example",
  "service": [{
    "id": "#messaging",
    "type": "MessagingService",
    "serviceEndpoint": "udna://did:web:service-provider.example/messaging"
  }, {
    "id": "#storage",
    "type": "StorageService", 
    "serviceEndpoint": "udna://did:web:service-provider.example/storage"
  }]
}

Transformation Vectors

Healthcare Transformation

Current State: Patient data fragmented across providers, legacy communication systems, systemic breach risks.

UDNA Architecture:

  • Each patient maintains a sovereign DID
  • Providers receive capability tokens for specific data segments
  • Emergency access via cryptographic break-glass mechanisms
  • Immutable audit trails embedded within addressing layer

Transformational Impact:

  • 90% reduction in data breach surface
  • Immediate access to comprehensive medical history
  • Patient-controlled data disclosure policies

Enterprise Evolution

Current State: API proliferation, credential management complexity, audit trail inadequacy.

UDNA Architecture:

  • Services addressed cryptographically rather than by location
  • Automated service dependency discovery
  • Capability-based access control with immediate revocation
  • Cryptographic audit trails with non-repudiation

Transformational Impact:

  • Elimination of API key management overhead
  • Automated service dependency mapping
  • Granular permission revocation in milliseconds

IoT Revolution

Current State: Devices tethered to manufacturer clouds, absence of direct communication, pervasive privacy concerns.

UDNA Architecture:

  • Each device possesses a cryptographic identity
  • Device-to-device encrypted communication channels
  • Cloud-independent local operation capabilities
  • Owner-controlled access policy enforcement

Transformational Impact:

  • Local operations without external dependencies
  • Elimination of data transmission to manufacturer clouds
  • Direct cryptographic control between owner and device

Financial Services Evolution

Current State: Repeated KYC verification, settlement latency, reactive fraud detection.

UDNA Architecture:

  • Portable verifiable credential frameworks
  • DID-based account addressing systems
  • Real-time fraud detection at protocol layer
  • Privacy-preserving transaction validation

Transformational Impact:

  • Instant account portability across institutions
  • Significant reduction in fraud-related losses
  • Global regulatory compliance interoperability

Operational Mechanics

Communication Protocol Flow

sequenceDiagram
    participant A as Client Application
    participant R as Resolution Service
    participant S as Service Endpoint
    participant D as DID Document Registry
    
    Note over A,S: Phase 1: Address Resolution
    A->>R: Resolve udna://did:web:service.example/api
    R->>D: Fetch DID Document for service.example
    D-->>R: Return service endpoint descriptors
    R-->>A: Return verified endpoint metadata
    
    Note over A,S: Phase 2: Capability Validation
    A->>S: Request with capability token
    S->>S: Cryptographic token validation
    S-->>A: Acceptance/Rejection based on capability scope
    
    Note over A,S: Phase 3: Secure Communication
    A->>S: Encrypted payload via DIDComm
    S->>A: Encrypted response
    A->>S: Capability revocation (when required)
Loading

Clinical Implementation: Medical Record Ecosystem

  1. Patient Principal establishes sovereign DID: did:key:zPatient123
  2. Healthcare Institution receives capability: udna://did:key:zPatient123/records/read?expires=2024-12-31
  3. Specialist Practitioner requests specific data: udna://did:key:zPatient123/laboratory/2024-05
  4. Patient authorizes temporal access: udna://did:key:zPatient123/laboratory/2024-05?duration=24h
  5. System Architecture automatically revokes access post-duration

Migration Framework for Existing Systems

Phase 1: Dual Protocol Support
Legacy: https://api.service.com/users/123
UDNA:  udna://did:web:api.service.com/users/123
        ↑
     Coexistence with graceful degradation

Phase 2: UDNA-Primary Architecture
Primary: udna://did:web:api.service.com/users/123
Fallback: Legacy URL for compatibility layer

Phase 3: UDNA-Native Implementation
Exclusive: udna://did:web:api.service.com/users/123
           ↑
        Simplified infrastructure topology

Comparative Analysis

Protocol Analysis Matrix

Architectural Dimension Traditional Web Architecture OAuth 2.0 Framework UDNA Architecture Architectural Advantage
Addressing Primitive URLs (location-based) URLs with token parameters DIDs (identity-based) Service mobility without address disruption
Authentication Mechanism Cookies, API keys Access tokens Identity-embedded addressing Elimination of separate authentication protocols
Authorization Framework ACLs, RBAC systems OAuth scopes Capability-based URL semantics Fine-grained, immediately revocable permissions
Discovery Protocol DNS, WSDL specifications Manual configuration DID document resolution Automated, cryptographically verifiable discovery
Privacy Architecture IP tracking vulnerabilities Token correlation risks Pairwise pseudonymous DIDs Systemic metadata minimization
Portability Characteristic Vendor architectural lock-in Limited portability Full cryptographic sovereignty Identity preservation across ecosystem boundaries
Auditability Framework Log analysis systems Token audit logs Cryptographic proof chains Tamper-evident audit trails

Performance Characteristics

Performance Metric Contemporary Web UDNA Target Performance Performance Improvement
Authentication Latency 100-500ms (OAuth flow) 1-10ms (architecture-embedded) 10-50x performance increase
Resolution Latency 20-200ms (DNS + TLS negotiation) 1-50ms (cached DID resolution) 2-20x resolution acceleration
Connection Establishment 3 RTTs (TCP+TLS handshake) 1-2 RTTs (0-RTT capable) 33-66% reduction in setup time
Revocation Latency Minutes to hours propagation Millisecond propagation 1000x acceleration in revocation

Security Architecture Comparison

graph LR
    subgraph "Traditional Security Architecture"
        A[Client Request] --> B[DNS Resolution]
        B --> C[TLS Handshake Protocol]
        C --> D[Server Authentication]
        D --> E[Application Authentication]
        E --> F[Access Control Evaluation]
        F --> G[Service Response]
    end
    
    subgraph "UDNA Security Architecture"
        H[UDNA Request] --> I[Identity Verification]
        I --> J[Capability Evaluation]
        J --> K[Encrypted Response]
    end
    
    style A fill:#e74c3c
    style B fill:#e74c3c
    style C fill:#e74c3c
    style D fill:#e74c3c
    style E fill:#e74c3c
    style F fill:#e74c3c
    style G fill:#e74c3c
    
    style H fill:#27ae60
    style I fill:#27ae60
    style J fill:#27ae60
    style K fill:#27ae60
Loading

Development Pathway

Development Trajectory

gantt
    title UDNA Development Timeline
    dateFormat  YYYY-MM
    axisFormat  %Y
    
    section Phase 1: Specification Development
    Core Specification Draft        :2024-01, 6M
    Addressing RFC Formulation      :2024-03, 4M
    Security Model Specification   :2024-05, 4M
    
    section Phase 2: Reference Implementation
    UDNA Resolution Engine         :2024-07, 5M
    Client Library Development     :2024-09, 6M
    Comprehensive Test Suite       :2024-11, 4M
    
    section Phase 3: Ecosystem Development
    Browser Integration Protocol   :2025-01, 8M
    Cloud Provider Adoption        :2025-05, 12M
    Production Deployment          :2025-09, 9M
    
    section Phase 4: Standardization Pathway
    IETF RFC Submission           :2026-01, 6M
    W3C Standardization Track     :2026-07, 18M
    Industry Certification        :2027-01, 12M
Loading

Critical Milestones

Q1-Q2 2024: Foundation Establishment

  • βœ… Conceptual framework publication
  • ⏳ W3C Community Group formation
  • πŸ”„ Initial specification drafts
  • πŸ“š Educational resource development

Q3-Q4 2024: Prototype Development

  • πŸ”¬ Reference resolution implementation
  • πŸ§ͺ Test network deployment
  • πŸ“Š Performance benchmark establishment
  • πŸ” Security audit completion

2025: Early Ecosystem Adoption

  • πŸš€ Initial production deployments
  • πŸ”Œ Browser extension development
  • πŸ“± Mobile SDK releases
  • 🌍 Global test network deployment

2026-2027: Standardization Pathway

  • πŸ“œ IETF RFC submission
  • πŸ›οΈ W3C Recommendation progression
  • 🏒 Enterprise adoption programs
  • πŸ”§ Tooling ecosystem maturation

Research Domains

  1. Performance Optimization Research

    • Zero-knowledge capability proof systems
    • DID resolution caching strategies
    • Network-layer optimization protocols
  2. Security Analysis Research

    • Formal protocol verification frameworks
    • Quantum-resistant cryptographic migration
    • Side-channel attack mitigation strategies
  3. Interoperability Research

    • Legacy system bridging protocols
    • Protocol translation layer architecture
    • Standards compliance verification frameworks
  4. Scalability Research

    • Distributed resolution network architecture
    • Data sharding strategies
    • Load balancing architectural approaches

Engagement Framework

Governance Architecture

UDNA implements an open, collaborative governance model informed by successful open-source ecosystems:

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                   UDNA Governance Architecture          β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  Steering Committee                                    β”‚
β”‚  β€’ Technical direction formulation                     β”‚
β”‚  β€’ Specification approval governance                   β”‚
β”‚  β€’ Conflict resolution framework                       β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  Working Group Structure                               β”‚
β”‚  β€’ Specification Working Group                        β”‚
β”‚  β€’ Implementation Working Group                       β”‚
β”‚  β€’ Security Working Group                             β”‚
β”‚  β€’ Ecosystem Development Working Group                β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚  Contributor Community                                 β”‚
β”‚  β€’ Code contribution ecosystem                         β”‚
β”‚  β€’ Documentation development                          β”‚
β”‚  β€’ Testing and feedback systems                       β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

Contribution Pathways

Contribution Role Required Expertise Time Commitment Engagement Pathway
Research Scientist Cryptographic systems, network architecture Flexible schedule Review research publications
Systems Architect Rust/Go/JavaScript, protocol design 5-10 hours weekly Select implementation priorities
Technical Author Documentation architecture, tutorial design 2-5 hours weekly Enhance existing documentation
Security Researcher Security analysis, testing frameworks 2-8 hours weekly Conduct security evaluations
Ecosystem Developer Community development, advocacy 2-10 hours weekly Develop educational content

Engagement Protocol

  1. Join the Architectural Discourse

  2. Review Technical Documentation

  3. Contribute Technical Expertise

    # 1. Repository initialization
    git clone https://github.com/w3c-udna/udna.git
    
    # 2. Exploration of contribution domains
    cd udna
    examine docs/ specs/ research/
    
    # 3. Working group participation
    # Consult COMMUNITY.md for working group schedules
  4. Propose Architectural Improvements

    • Submit GitHub issues for defects or enhancements
    • Participate in specification working groups
    • Present research findings at architectural review sessions

Knowledge Repository

Foundational Literature

  1. Architectural Foundations

  2. UDNA-Specific Documentation

  3. Related Architectural Work

Learning Trajectory

Week 1-2: Foundational Knowledge
β”œβ”€β”€ DID and Verifiable Credential fundamentals
β”œβ”€β”€ Capability security model principles
└── Existing addressing architecture analysis

Week 3-4: UDNA Architectural Concepts
β”œβ”€β”€ Specification draft review
β”œβ”€β”€ Architectural review participation
└── Conceptual implementation exercises

Week 5+: Specialization Development
β”œβ”€β”€ Working group selection
β”œβ”€β”€ Active contribution initiation
└── Architectural improvement proposals

Technical Inquiry Framework

Q: Does UDNA replace existing internet architecture entirely?

A: UDNA constitutes a complementary architectural layer designed to coexist with current protocols during an extended transition period. The architecture enables gradual augmentation and eventual replacement of specific addressing components rather than immediate wholesale replacement. Consider it as introducing identity-native addressing as an optional architectural layer alongside existing URL and IP address systems.

Q: What is the relationship between UDNA and blockchain technologies?

A: UDNA maintains blockchain-agnostic architectural principles. While certain DID methods utilize blockchain infrastructure (such as did:ethr or did:sov), numerous methods operate independently (including did:web, did:key). The architecture accommodates any W3C-compliant DID method, focusing on cryptographic identity primitives rather than specific implementation technologies.

Q: How does UDNA accommodate existing web infrastructure?

A: During architectural transition, systems maintain dual-protocol support. We envision bridge architectures and translation layers enabling legacy system participation within the UDNA ecosystem. The migration pathway incorporates incremental, non-disruptive transition mechanisms preserving existing functionality.

Q: Is UDNA merely another authentication protocol layer?

A: UDNA represents fundamental architectural reconstruction rather than incremental protocol enhancement. Authentication protocols like OAuth presume pre-existing service addressing mechanisms (URLs). UDNA embeds identity within the addressing primitive itself, making authentication inherent to the addressing architecture rather than a supplementary protocol layer.

Q: How does UDNA architecture prevent system abuse with publicly accessible DIDs?

A: UDNA incorporates multiple anti-abuse architectural mechanisms:

  1. Computational proof requirements for DID creation (configurable)
  2. Reputation system architecture based on verifiable credentials
  3. Economic disincentive mechanisms (micro-transactions for specific operations)
  4. Social verification frameworks through attested credential systems
  5. Immediate capability revocation with global propagation
Q: What are the performance characteristics of cryptographic addressing?

A: Contemporary cryptographic operations demonstrate exceptional performance characteristics. Ed25519 signature verification requires approximately 0.1ms on standard hardware. For cached resolution scenarios, UDNA can outperform traditional DNS resolution combined with TLS handshake protocols. The architecture incorporates performance optimization as a fundamental design principle.

Q: Which organizations support UDNA architectural development?

A: UDNA development operates as an open community initiative under W3C governance. While in early developmental phases, we engage researchers from academic institutions, engineers from leading technology organizations, and participants from decentralized identity communities. The objective encompasses broad, multi-stakeholder architectural participation.

Q: How can technical evaluation of UDNA commence currently?

A: Given UDNA's specification development phase, production implementations remain forthcoming. However, engagement pathways include:

  1. Architectural experimentation with conceptual prototypes
  2. Specification development participation
  3. Proof-of-concept implementation development
  4. Use case analysis within community discussions

Consult the Technical Onboarding Guide for current engagement pathways.


Architectural Evolution Initiative

Digital infrastructure requires architectural evolution. From location-dependent to identity-native addressing. From delegated trust to verified cryptographic trust. From incidental privacy to architecturally embedded privacy.

W3C Community Participation Specification Review Architectural Contribution


Universal DID-Native Addressing
Architecting the Identity-Native Internet

About

This repository holds the work of the W3C Universal DID-Native Addressing (UDNA) Community Group. We are developing a standard for addressing Decentralized Identifiers (DIDs) on the web.

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages