DID Method specifications implement detailed technical protocols that
address the complete lifecycle management of decentralized identifiers within specific distributed systems. The foundation typically begins with method-specific syntax defined by ABNF (Augmented Backus-Naur Form) grammar that specifies the exact format for the method-specific identifier component, often incorporating rules for encoding network identifiers, namespaces, or cryptographic material within the DID string itself.
Create operations (often denoted as 'Register' in specifications) define precise cryptographic procedures for generating new identifiers. These typically include
key generation algorithms, registration
transaction formats, and initial
state encoding. Advanced methods implement sophisticated capabilities like hierarchical
deterministic derivation, quantum-resistant cryptographic primitives, or zero-knowledge generation protocols that enhance privacy or security properties.
Resolution mechanics define the complete technical pipeline from identifier to document, typically including multiple phases: DID parsing to extract method-specific components, network addressing to locate authoritative data sources,
state resolution to reconstruct the current document from historical operations, and document construction to assemble the final representation according to W3C syntax requirements. Performance-focused methods often implement caching strategies, gateway architectures, or peer-to-peer resolution networks to optimize availability and
latency.
Update operations specify
state transition models appropriate to the underlying distributed system. These include authorized
transaction formats, signature requirements, conflict resolution mechanisms for concurrent updates, and canonicalization procedures to ensure
deterministic processing. Advanced methods implement sophisticated capabilities like delegated update authority, time-locked transitions, or threshold signature requirements for enhanced security models.
Deactivation procedures
address the paradox of permanent removal in append-only systems, typically implementing cryptographic tombstone patterns that irrevocably signal
termination of an identifier while maintaining provenance records. This often involves publishing provably unreconstructable
encryption keys, cryptographic commitment to
termination intent, or specialized
transaction types that validators enforce as terminal
state transitions.
Beyond core operations, comprehensive method specifications
address additional considerations including fee models, privacy characteristics,
scalability properties, and security assumptions specific to the underlying distributed system.