Decentralized Identity

Know Your AI

Identity and Trust for AI Agents

Part 1 & 3

Mark Medum Bundgaard

Chief Product Officer, Partisia

Part 2

Søren Eller Thomsen

Senior Cryptographic Engineer, Partisia

Scroll

Know Your AI

Partisia

Partisia

Privacy-preserving computation and decentralized identity

Founded on 30+ years of cryptographic research

Pioneers of Multiparty Computation (MPC)

MPC infrastructure powers our zero-knowledge proving systems

Operating in regulated enterprise environments

The Challenge

AI agents are acting on behalf of humans

But there is no standard way to verify who they are, who authorized them, or what they are allowed to do.

Every service, every API, every transaction faces the same unanswered questions.

Today's Talk

01

The Problem

Why current identity models break down when AI agents act on behalf of humans.

Mark Medum Bundgaard

02

The Solution

Verifiable credentials, decentralized identifiers, and cryptographic delegation chains.

Søren Eller Thomsen

03

The Vision

Multi-agent systems, zero-knowledge authorization, and the future of trusted AI.

Mark Medum Bundgaard

The world is changing

Before

Human
Service

Now

Human
Agent
Service

Part 1 - Mark Medum Bundgaard

What is an AI Agent?

Autonomous Action

Takes real actions in external systems

Multi-Step Reasoning

Chains decisions without human input at each step

Natural Language

Interprets goals, not just predetermined rules

Adaptive Planning

Dynamically adjusts to new requirements

Model Context Protocol

The universal adapter connecting agents to the world

AI Agent

Memory · LLMs · Tools

MCP

Databases

PostgreSQL · SQLite

Dev Tools

Git · Sentry

Productivity

Slack · Google Drive

Web Services

APIs · Live data

When an agent calls a service, who is making the request?

A Concrete Example

Autonomous Trading

Trader

Wants to trade stocks
but not sit at a screen

delegates

AI Agent

Executes trades
autonomously 24/7

trades at

Stock Exchange

Must verify who is
placing the order

How does the exchange know who authorized this agent and what it is allowed to trade?

Three questions every service must ask

Authentication and Authorization are familiar. Delegation is the new question that AI agents introduce.

01

Authentication

“Who is this agent?”

Which agent is connecting - and is it legitimate?

02

Delegation

“Who authorized it?”

Which human instructed this agent to act - and with what scope?

03

Authorization

“What can it do?”

Is this specific action permitted, right now, in this context?

Existing solutions fall short

API Keys

Issued to apps, not agents. No user context. Cannot express delegation scope.

OAuth Tokens

Even OAuth 2.1 and GNAP are scoped to app-level grants. They cannot express verifiable delegation chains or carry portable agent identity across organizational boundaries.

Session Cookies

User-bound but cannot travel across agent handoffs or organizational boundaries.

We lack a standard way to say: “Here is cryptographic proof that this agent is authorized.”

Part 2

The Technical
Solution

Søren Eller Thomsen

Senior Cryptographic Engineer, Partisia

The Context

From Federated to Self-Sovereign Identities

Federated

Provider holds your identity.
You log in through a third party.

Google
Facebook
MitID

Self-Sovereign

You control your own identity.
Cryptographic credentials you carry with you.

Partisia ID Wallet Launched
AltID Q2 2026
EU Digital Identity Wallet Mandatory 2026

Click to reveal

The Building Blocks

Core Technologies

Identity controlled by the individual, no central authority required

VC

Verifiable Credentials

  • Cryptographically signed statements about a subject
  • Tamper-evident and holder-controlled

VP

Verifiable Presentations

  • Packages of credentials assembled by the holder
  • Enables selective disclosure to specific verifiers

DID

Decentralized Identifiers

  • Globally unique, self-created identifier
  • Resolvable to a public key
  • No registration authority needed

The Foundation

Basic Usage

Issuer

Signs credentials

Holder

Controls credentials

Relying Party

Verifies presentations

Registry

Stores DID documents

Verifiable Credential
name Jane Doe
dob 1990-04-01
did did:ex:jane
issuer did:ex:gov
Issuer sig. 0x4a2f...
Verifiable Presentation
embedded VC
name Jane Doe
dob 1990-04-01
did did:ex:jane
issuer did:ex:gov
iss. sig. 0x4a2f...
Holder sig. 0x8b1c...

Resolves DID

Resolves DID

No callback to the Issuer. The Relying Party verifies the credential using the Issuer's public key from the Registry.

Click to reveal

Verifiable Credentials

Verifiable Credential

Issuerdid:ex:gov
Subjectdid:ex:jane
NameJane Doe
DOB1990-04-01
Issuer Sig.0x4a2f...
1

Issuer signs

The government (did:ex:gov) signs Jane's credential with its private key, binding it as the authority.

2

Holder stores

Jane stores the credential in her wallet and controls when and where to share it.

3

Verifier checks

Any relying party can verify the issuer's signature against did:ex:gov, no central lookup needed.

Verifiable Presentations

Verifiable Presentation

Holderdid:ex:jane
Verifierdid:ex:employer
Embedded VCJane Doe identity credential
DisclosedName, DOB
Nonce9f3a7c...e2d1
Holder Sig.0x8b1c...
1

Holder selects

Jane chooses which credentials and which fields to disclose, sharing only Name and DOB, nothing more.

2

Holder signs nonce

The verifier challenges Jane with a random nonce. Jane signs it with her private key, proving she controls did:ex:jane right now.

3

Verifier checks

The employer verifies both Jane's holder signature and the government's issuer signature in one step.

Decentralized Identifiers

DID Document

did:ex:employer
{
"@context": "https://www.w3.org/ns/did/v1",
"id": "did:ex:employer",
"authentication": [{
  "type": "Ed25519VerificationKey2020",
  "publicKeyMultibase": "z6Mkq8..."
}],
"assertionMethod": [{
  "type": "Ed25519VerificationKey2020",
  "publicKeyMultibase": "z6Mkr3..."
}],
"service": [{
  "type": "VerificationService",
  "serviceEndpoint":
    "https://employer.example.com/verify"
}]
}
1

Self-created

The employer generates a key pair and registers did:ex:employer, no central authority needed.

2

Globally resolvable

When Jane presents her VP, the employer's public key is looked up via did:ex:employer to verify the nonce signature.

3

Cryptographically bound

The DID document binds the employer's identity to its public key, anyone can verify who they are dealing with.

The Authentication Flow

HolderVerifier1. Request access2. Challenge (random nonce + domain)3. Sign challenge4. Send signature + DID5. Resolve DID6. Extract public key7. Verify signatureagainst public key8. Authenticated (or rejected)

KYA Framework

Know Your Agent

01

Authentication

Who is the agent?

Both users and agents have DIDs

Agent signs each request

Service verifies signature

02

Delegation

Who authorized it?

User issues VC to agent

Defines permitted actions

Agent presents VC to service

03

Authorization

What can it do?

Service evaluates VC claims

Checks action scope

Allows or denies request

KYA in Practice

Trading Agent Example

Trader

Issues credential

Trading Agent

Holds credential

Stock Exchange

Verifies authorization

Registry

Stores DID documents

Verifiable Credential
issuer did:ex:trader
subject did:ex:agent
scope Trade up to 10k EUR
instruments Equities only
Issuer sig. 0x91cf...
Verifiable Presentation
embedded VC
issuer did:ex:trader
subject did:ex:agent
scope Trade up to 10k EUR
instruments Equities only
issuer sig. 0x91cf...
Holder sig. 0x3d7a...

Resolves DID

Resolves DID

Phase 1: Issuance

1. Trader spawns the Trading Agent.
2. Trader verifies the agent's identity by resolving the agent's DID and checking its signature.
3. Trader issues a Verifiable Credential to the agent (scope: equities, max 10k EUR).

Phase 2: Trade

4. Trading Agent requests a trade at the Stock Exchange.
5. Stock Exchange demands proof of authorization.
6. Trading Agent presents a Verifiable Presentation wrapping the VC and signed by the agent.
7. Exchange resolves the DIDs and verifies both signatures.
8. Exchange checks the trade matches the credential's scope, then allows or denies the order.

Click to reveal

Part 3

The Vision

Mark Medum Bundgaard

Chief Product Officer, Partisia

The Future

Multi-Agent Systems

User
Orchestrator Agent

Research Agent

sub-agent

Scheduling Agent

sub-agent

Finance Agent

sub-agent

Each handoff requires a verifiable delegation chain.
KYA makes every step auditable.

Specialised Sub-Agents

Multi-Agent Delegation

Trader

Issues master VC

Parent Agent

Holds master VC

Equities Agent

Stocks only

Forex Agent

FX pairs only

Crypto Agent

Crypto only

NYSE

Equities exchange

FX Exchange

Currency pairs

Coinbase

Crypto exchange

Master VC

Sub-VC: Equities

Sub-VC: Forex

Sub-VC: Crypto

VP

VP

VP

Phase 1: Issuance

1. Trader issues a master Verifiable Credential to the Parent Trading Agent.

Phase 2: Sub-delegation

2. Parent Agent sub-delegates by issuing narrower credentials to specialised agents (Equities only, Forex only, Crypto only).

Phase 3: Trade

3. Each sub-agent presents a Verifiable Presentation to its dedicated exchange. Exchanges verify the chain independently.

Click to reveal

The Problem

Trading Policy is Secret

Budget Limit

The 10k EUR trading limit reveals the trader's risk appetite and capital allocation strategy.

Allowed Instruments

Knowing the agent can only trade equities exposes the trader's investment strategy to competitors.

Trading Hours

Permitted trading windows reveal when the trader expects volatility - a signal competitors can exploit.

A trader’s policy is commercially sensitive. The exchange should only know: is this order authorized?

The Building Block

Zero-Knowledge Proofs

A prover convinces a verifier that a statement is true, without revealing why it is true.

Prover

holds secret X

”I know X for which P(X) holds”

zero-knowledge proof

Verifier

accepts: P(X) holds

01

Completeness

If the statement is true, an honest prover can always convince an honest verifier.

02

Soundness

If the statement is false, no cheating prover can convince an honest verifier (except with negligible probability).

03

Zero-Knowledge

The verifier learns nothing beyond the fact that the statement is true.

Privacy-Preserving Authorization

Zero-Knowledge Proofs - prove without revealing

Without ZK Proofs

The exchange sees the full credential:
trader identity, exact 10k EUR limit,
allowed instruments, all delegation details

Trading strategy and budget exposed to the exchange

With ZK Proofs

The trader commits to the policy.
The agent produces a ZK proof that
the order satisfies the committed policy.

Exchange verifies authorization without seeing the policy

The exchange only learns: “This order is authorized and within the permitted scope.”

How It Works

Policy-Hiding KYA

1

Commit

The trader encodes the policy as a vector V and commits to it: c = commit(V).

V = {max_amount: 10k, instruments: equities, hours: 09-17}
2

Sign

The trader signs the commitment c together with the agent's public key and an expiration date.

Sign(c, pk_agent, expiry)
3

Prove

The agent produces a ZK proof that the requested trade satisfies V (without revealing V).

Prove: trade.amount <= V.max_amount
4

Verify

The exchange verifies both the signature and the proof, without ever learning V.

Verify(signature, proof) -> allow | deny

Trust without centralization

Central Registry

Single point of failure

Concentration of power

Interoperability barriers

Gatekeeping

vs

DID-Based Model

Cryptographically verifiable identity

No phone-home required

Cross-provider interoperability

Anyone can verify anyone

Governance & Accountability

KYA as foundational infrastructure for AI governance

Regulatory Compliance

EU AI Act Article 50 requires AI transparency. MiCA demands agent accountability in finance. KYA provides the verifiable evidence.

Liability Assignment

Delegation chains aligned with eIDAS 2.0 electronic attestations make "who authorized what" forensically answerable.

Consent Infrastructure

Issuing a delegation VC is machine-readable, specific, revocable consent.

Cross-Border Interop

Built on W3C DID Core and eIDAS 2.0 VC infrastructure. A credential issued anywhere is verifiable everywhere.

Where We're Going

The Agentic Future

Protocols like MCP and A2A connect agents to tools and to each other. KYA adds the missing layer: verifiable identity, delegation, and privacy-preserving authorization.

Global Agent Identity

Agents carry portable, cryptographic identities across platforms, providers, and jurisdictions. No walled gardens.

Agent-to-Agent Commerce

Agents transact directly with each other, verifying delegation chains in milliseconds without human intervention.

Privacy by Default

Zero-knowledge proofs ensure compliance verification never requires exposing strategy, intent, or sensitive data.

Accountable Autonomy

Every autonomous action traces back through a verifiable delegation chain to a responsible human or organization.

Partisia

Build the trustworthy
agentic web with us

Enterprises

Deploying agentic AI and need verifiable authorization trails

Regulators

Building accountability frameworks for autonomous AI systems

Developers

Building MCP-connected services that need to verify agent identity

Researchers

Working on ZK credential schemes, delegation verification, and privacy-preserving policy

Partisia
Decentralized Identity

Q&A

Know Your AI: Identity and Trust for AI Agents

Mark Medum Bundgaard

Chief Product Officer, Partisia

Søren Eller Thomsen

Senior Cryptographic Engineer, Partisia

partisia.com