Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
22 commits
Select commit Hold shift + click to select a range
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
.idea/
82 changes: 81 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
@@ -1,2 +1,82 @@
# artifacts
# Artifacts

Artifacts that illustrate Earth Program use cases and solutions

## Renewable Energy Certificates

These artifacts help realize the Renewable Energy Certificates Focal Use Case.

### Cryptographic Materials

Many of the identifiers used in this set of artifacts are DIDs based on cryptographic public/private keypairs. This allows the artifacts' identifiers to be created offline and secured using cryptographic signatures.

The public/private key pairs are Secp256k1 keys generated using [didkit](https://spruceid.dev/docs/didkit/) and represented in [Json Web Key](https://datatracker.ietf.org/doc/html/rfc7517) format. The .jwk files contain both the public and private keys for each actor. From these keys a DID and associated DID document has been generated using didkit.

* **HydroElec** — The producer behind the proposed project.
* Key pair [./rec/keys/hydroelec.jwk](./rec/keys/hydroelec.jwk)
* DID document [./rec/dids/hydroelec.did.json](./rec/dids/hydroelec.did.json)

* **Smart Meter 1** — The first of two electric meters that issue signed VCs as evidence of electricity production.
* Key pair [./rec/keys/meter1.jwk](./rec/keys/meter1.jwk)
* DID document [./rec/dids/meter1.did.json](./rec/dids/meter1.did.json)

* **Smart Meter 2** — The second of two electric meters that issue signed VCs as evidence of electricity production.
* Key pair [./rec/keys/meter2.jwk](./rec/keys/meter2.jwk)
* DID document [./rec/dids/meter2.did.json](./rec/dids/meter2.did.json)

* **UN FCCC** — The issuing authority for REC2022 Renewable Energy Certificates.
* Key pair [./rec/keys/unfccc.jwl](./rec/keys/unfccc.jwk)
* DID document [./rec/dids/unfccc.did.json](./rec/dids/unfccc.did.json)

* **UN Rec2022** (DOES THIS NEED TO BE CRYPTOGRAPHIC?)
* Key pair [./rec/keys/un.rec2022.jwk](./rec/keys/un.rec2022.jwk)
* DID document [./rec/dids/un.rec2022.did.json](./rec/dids/un.rec2022.did.json)

* **Certifier** — A UN authorized project certifier. They review the project proposal from the producer and issue an REC2022 Certification verifiable credential.
* Key pair [./rec/keys/certifier.jwk](./rec/keys/certifier.jwk)
* DID document [./rec/dids/certifier.did.json](./rec/dids/certifier.did.json)

* **Verifier** — A UN authorized project verifier. They review the project on-site and issue an REC2022 Verification verifiable credential, based the propsoal, the REC2022 Certification, and the evidence produced by the Project's smart meters.
* Key pair [./rec/keys/verifier.jwk](./rec/keys/verifier.jwk)
* DID document [./rec/dids/verifier.did.json](./rec/dids/verifier.did.json)


### Verifiable Credentials (VCs)

1. Project Proposal

This VC captures the automated metadata about the project and refers definitively for a descriptive PDF with additional details. [./rec/credentials/hydroelec.project1.json](./rec/credentials/hydroelec.project1.json)

That file is a fully formed VC describing the following metadata:
* **producer**: HydroElec's DID for exercising control over this project
* **geographicLocation**: The GPS coordinates for the project location in Capetown, South Africa.
* **dateProposed**: January 30, 2022
* **annualTarget**: The expected annual electricity production of 1000 MWh

It is signed by HydroElec. (Or, it will be. Currently the proof is faked.)

2. Certifier Credential
3. Verifier Credential
4. Project Certification
5. Project Verification
6. Electricity Production

### DIDs
Throughout these examples, we use a fictional did:example which uses an Ed25519 public key for both the method-specific identifier and all of its verification methods.

#### 1. HydroElec

The file [./rec/keys/hydroelec.jwk](./rec/hydroelec.ed25519) is a representation of the private and public keys, respectively, that control this DID:

```did:key:zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD```

When this DID is resolved it returns the DID document found in [./rec/dids/hydroelec.did.json](./rec/dids/hydroelec.did.json)

2. UNFCCC
3. Certifier
4. Verifier
5. Project (as registered)

### IIDs
1. The NFT class created by the UNFCCC
2. The particular NFT tokens minted
Binary file added docs/Artifacts.isf
Binary file not shown.
Binary file added docs/Capability for Minting Tokens.isf
Binary file not shown.
27 changes: 27 additions & 0 deletions minimalDID.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
"https://w3id.org/security/suites/ed25519-2020/v1"
],
"id": "did:cosmos:ixo:nft:1:AAAAC3NzaC1lZDI1NTE5AAAAICwtd+9EJPeiBDh37Ffi6uJ6grYqtH97WrJW0fyui9rX",
"verificationMethod": [
{
"id": "#key-0",
"type": "Ed25519VerificationKey2020",
"controller": "did:example:AAAAC3NzaC1lZDI1NTE5AAAAICwtd+9EJPeiBDh37Ffi6uJ6grYqtH97WrJW0fyui9rX",
"publicKeyMultibase": "AAAAC3NzaC1lZDI1NTE5AAAAICwtd+9EJPeiBDh37Ffi6uJ6grYqtH97WrJW0fyui9rX"
}
],
"authentication": [
"#key-0"
],
"assertionMethod": [
"#key-0"
],
"capabilityDelegation": [
"#key-0"
],
"capabilityInvocation": [
"#key-0"
]
}
37 changes: 37 additions & 0 deletions rec/credentials/hydroelec.project1.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://www.w3id.org/earth/iid/v1",
"https://unfccc.int.example.com/ns/2022/rec/v1",
],
"id": "https://hydroelec.example.com/projects/1",
"type": "REC2022/Proposal",
"producer": "did:example:AAAAC3NzaC1lZDI1NTE5AAAAICwtd+9EJPeiBDh37Ffi6uJ6grYqtH97WrJW0fyui9rX",
"geographicLocation": {
"lat" : -33.918861,
"long" : 18.423300
},
"dateProposed": "2022-01-30",
"annualTarget": 1000,
"linkedResource": {
"id": "proposal",
"path": "proposal",
"rel": "detail",
"type": "iid:ResourceDescriptor",
"resourceFormat": "application/pdf",
"compression": "gzip",
"endpoint": "https://www.w3id.org/earth/artifacts/hydroelec.proposal.pdf.gzip",
"proof": {
"type": "iid:hash",
"stage": "raw",
"value": "asdrioqweindcuioqweroiasdcnuieasdnjcjasdkf",
}
},
"proof": {
"type": "Ed25519Signature2020",
"created": "2022-01-30T03:50:55Z",
"proofValue": "z5SpZtDGGz5a89PJbQT2sgbRUiyyAGhhgjcf86aJHfYcfvPjxn6vej5na6kUzmw1jMAR9PJU9mowshQFFdGmDN14D",
"proofPurpose": "assertionMethod",
"verificationMethod": "did:example:AAAAC3NzaC1lZDI1NTE5AAAAICwtd+9EJPeiBDh37Ffi6uJ6grYqtH97WrJW0fyui9rX#key-0"
}
}
32 changes: 32 additions & 0 deletions rec/dids/certifier.did.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
{
"EcdsaSecp256k1VerificationKey2019": "https://w3id.org/security#EcdsaSecp256k1VerificationKey2019",
"publicKeyJwk": {
"@id": "https://w3id.org/security#publicKeyJwk",
"@type": "@json"
}
}
],
"id": "did:key:zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8",
"verificationMethod": [
{
"id": "did:key:zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8#zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8",
"type": "EcdsaSecp256k1VerificationKey2019",
"controller": "did:key:zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8",
"publicKeyJwk": {
"kty": "EC",
"crv": "secp256k1",
"x": "HWxpqouTfGstEAMGjJ53JLWJoKcEtxtw1K-mxCLE4oM",
"y": "6MC-pwz3WJBH8-9ySNjawc1fgKeoTaePP1Py8uktoHM"
}
}
],
"authentication": [
"did:key:zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8#zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8"
],
"assertionMethod": [
"did:key:zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8#zQ3shgcxqAs77QCN4azCsfUgPHcSLhNvKatmePUrHXRfkiLm8"
]
}
32 changes: 32 additions & 0 deletions rec/dids/hydroelec.did.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
{
"EcdsaSecp256k1VerificationKey2019": "https://w3id.org/security#EcdsaSecp256k1VerificationKey2019",
"publicKeyJwk": {
"@id": "https://w3id.org/security#publicKeyJwk",
"@type": "@json"
}
}
],
"id": "did:key:zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD",
"verificationMethod": [
{
"id": "did:key:zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD#zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD",
"type": "EcdsaSecp256k1VerificationKey2019",
"controller": "did:key:zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD",
"publicKeyJwk": {
"kty": "EC",
"crv": "secp256k1",
"x": "IuTV_ZHm7TnHNkxXkk_wib9-4fumceoVpKajqlNMIO4",
"y": "6lbfKH4cC8NN2_t-9ZzVETxA2zEIiQcDIglYTgG7MmA"
}
}
],
"authentication": [
"did:key:zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD#zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD"
],
"assertionMethod": [
"did:key:zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD#zQ3shPm1156YHd3pzvhz8BMtZPT9LnTxtGyFBnm8tzJmjnBWD"
]
}
32 changes: 32 additions & 0 deletions rec/dids/meter1.did.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
{
"EcdsaSecp256k1VerificationKey2019": "https://w3id.org/security#EcdsaSecp256k1VerificationKey2019",
"publicKeyJwk": {
"@id": "https://w3id.org/security#publicKeyJwk",
"@type": "@json"
}
}
],
"id": "did:key:zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc",
"verificationMethod": [
{
"id": "did:key:zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc#zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc",
"type": "EcdsaSecp256k1VerificationKey2019",
"controller": "did:key:zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc",
"publicKeyJwk": {
"kty": "EC",
"crv": "secp256k1",
"x": "eh6u5aeo_50eqf0fjANmK3KdRDCtJixeHA9Wa5IfTIk",
"y": "mOrVKorsRzAsFmb-u828cbbgHs4NVnk32qAAU-PS5Lk"
}
}
],
"authentication": [
"did:key:zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc#zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc"
],
"assertionMethod": [
"did:key:zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc#zQ3shnrp17gjuGWX1BMREpKJEEyb6dM9nYnjzyVPG3PHh6kWc"
]
}
32 changes: 32 additions & 0 deletions rec/dids/meter2.did.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
{
"EcdsaSecp256k1VerificationKey2019": "https://w3id.org/security#EcdsaSecp256k1VerificationKey2019",
"publicKeyJwk": {
"@id": "https://w3id.org/security#publicKeyJwk",
"@type": "@json"
}
}
],
"id": "did:key:zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c",
"verificationMethod": [
{
"id": "did:key:zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c#zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c",
"type": "EcdsaSecp256k1VerificationKey2019",
"controller": "did:key:zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c",
"publicKeyJwk": {
"kty": "EC",
"crv": "secp256k1",
"x": "IlX8l1TAUuqaNY73XwrxXy2CzKcb-8-ueyguKhHTX1M",
"y": "U0L8gvB0AbhmSbTL_VMV4JMSOdVgKIFeEBrZG6aoaV4"
}
}
],
"authentication": [
"did:key:zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c#zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c"
],
"assertionMethod": [
"did:key:zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c#zQ3shPipfYsVQK5HGjPDBZ34qAHFG5JMWeBDWYJU3kAavXj5c"
]
}
32 changes: 32 additions & 0 deletions rec/dids/un.rec2022.did.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
{
"EcdsaSecp256k1VerificationKey2019": "https://w3id.org/security#EcdsaSecp256k1VerificationKey2019",
"publicKeyJwk": {
"@id": "https://w3id.org/security#publicKeyJwk",
"@type": "@json"
}
}
],
"id": "did:key:zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4",
"verificationMethod": [
{
"id": "did:key:zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4#zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4",
"type": "EcdsaSecp256k1VerificationKey2019",
"controller": "did:key:zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4",
"publicKeyJwk": {
"kty": "EC",
"crv": "secp256k1",
"x": "SAYAEh62gmVXnTHoqEtI0_86hkbwAe6U8xdO9jFvMtU",
"y": "zR1jwZRCiUOskmNWqehw1wJ0BTlbBKtCjC0ezfIQQ8E"
}
}
],
"authentication": [
"did:key:zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4#zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4"
],
"assertionMethod": [
"did:key:zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4#zQ3shjVFnfpw8Pb4rZPaZQZbmcGo5MgssdnnNKkhSaGG9ksE4"
]
}
32 changes: 32 additions & 0 deletions rec/dids/unfccc.did.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
{
"EcdsaSecp256k1VerificationKey2019": "https://w3id.org/security#EcdsaSecp256k1VerificationKey2019",
"publicKeyJwk": {
"@id": "https://w3id.org/security#publicKeyJwk",
"@type": "@json"
}
}
],
"id": "did:key:zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq",
"verificationMethod": [
{
"id": "did:key:zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq#zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq",
"type": "EcdsaSecp256k1VerificationKey2019",
"controller": "did:key:zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq",
"publicKeyJwk": {
"kty": "EC",
"crv": "secp256k1",
"x": "UyLz3FWAd5zIN7DulIXOqPy3uVCfDFWzxQufjo6bvKo",
"y": "iqt8lR9HbYoI_j09_Z01eTFpck_iUwRb6fpgoGU-vj4"
}
}
],
"authentication": [
"did:key:zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq#zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq"
],
"assertionMethod": [
"did:key:zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq#zQ3shT1KWQc6o3qrC3PPnig2twVet2ir618NUw9s8Q5KXrrLq"
]
}
32 changes: 32 additions & 0 deletions rec/dids/verifier.did.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,32 @@
{
"@context": [
"https://www.w3.org/ns/did/v1",
{
"EcdsaSecp256k1VerificationKey2019": "https://w3id.org/security#EcdsaSecp256k1VerificationKey2019",
"publicKeyJwk": {
"@id": "https://w3id.org/security#publicKeyJwk",
"@type": "@json"
}
}
],
"id": "did:key:zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT",
"verificationMethod": [
{
"id": "did:key:zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT#zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT",
"type": "EcdsaSecp256k1VerificationKey2019",
"controller": "did:key:zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT",
"publicKeyJwk": {
"kty": "EC",
"crv": "secp256k1",
"x": "5lqgcTPez3h4xtPtDN-H6-IDlrk8Ea4zPebgdBIKH1g",
"y": "BWBKVbVwCQLM4FAVgO4V-azr6AZojBpG4JQ9tALisYk"
}
}
],
"authentication": [
"did:key:zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT#zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT"
],
"assertionMethod": [
"did:key:zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT#zQ3shv9K3mWECTkBBbd9VXtRbmgbpfBsRKijgvzmvYPfgbCnT"
]
}
1 change: 1 addition & 0 deletions rec/keys/certifier.jwk
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"kty":"EC","crv":"secp256k1","x":"HWxpqouTfGstEAMGjJ53JLWJoKcEtxtw1K-mxCLE4oM","y":"6MC-pwz3WJBH8-9ySNjawc1fgKeoTaePP1Py8uktoHM","d":"6QEeveOCezFpuOKi3O-XsyZ1oC0QQf0lATz_Xww7EUU"}
1 change: 1 addition & 0 deletions rec/keys/hydroelec.jwk
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"kty":"EC","crv":"secp256k1","x":"IuTV_ZHm7TnHNkxXkk_wib9-4fumceoVpKajqlNMIO4","y":"6lbfKH4cC8NN2_t-9ZzVETxA2zEIiQcDIglYTgG7MmA","d":"j2YZsSgLSm8ZHinzD32svQ2pK1A1aJbGMJsAQO8K34U"}
1 change: 1 addition & 0 deletions rec/keys/meter1.jwk
Original file line number Diff line number Diff line change
@@ -0,0 +1 @@
{"kty":"EC","crv":"secp256k1","x":"eh6u5aeo_50eqf0fjANmK3KdRDCtJixeHA9Wa5IfTIk","y":"mOrVKorsRzAsFmb-u828cbbgHs4NVnk32qAAU-PS5Lk","d":"yD5v0UJxtXuPnZ1CsWO7Y5wKB6Rd842meIw6cFni79Q"}
Loading