What is the Gateway ID?

1. DID
Gateway uses the Decentralized Identifiers standard. An example of a DID on Gateway is did:gtw:a73a82f4-1657-4d6d-9bb5-f943e06bcdeb2. Signing Key
Users generate their own signing key and share the public key to the network. This key allows organizations and users to cryptographically sign messages and transactions, registering proof of intent of specific actions on the protocol layer. Users sign a message with their private key when they want to execute some action. This signature can be verified by anyone with access to the corresponding public key and is accessible to any network agent that seeks to verify the signature. This signature is present on data contributed, consents given, and requests made as well. Every user and organization on the platform is assigned a private ECDSA (Elliptic Curve Digital Signature Algorithm) signing key. The types of signing keys available will continue to evolve as demanded.3. Encryption Key
Additionally, users generate their own encryption key pair and share their public key to the network to support data confidentiality. The public key is surfaced to allow counter-parties to encrypt data intended for you. It is with the RSA-4096 format and stored with OAEP headers.Account Registration
Accounts are registered on the Gateway Ledger to allow key information like public encryption key and public signing key to surface. An example of a user registration can be seen here. Every account registration will surface the:- DID
- Public Signing Key
- Public Encryption Key
Using multiple Decentralized Identifiers (DIDs) is recommended to enhance
privacy by reducing the risk of linking users’ online activities, thereby
improving anonymity and security
Privacy

Gateway ID was designed with a singular mission: to empower users to take control of their data while maintaining a standard of security and privacy often unparalleled in the digital realm.We’ve adopted a minimalist approach in public data disclosure, revealing only the essential information necessary to establish verifiable intent and ensure unimpeachable data integrity.