Upgrade to Pro — share decks privately, control downloads, hide ads and more …

The Evolution of Digital Trust

The Evolution of Digital Trust

2025/10/16-17に駐日フランス大使館で開催されたFrench-Japanese Internet Governance Conference 2025で発表した資料です。

Avatar for Naohiro Fujie

Naohiro Fujie

October 17, 2025
Tweet

More Decks by Naohiro Fujie

Other Decks in Technology

Transcript

  1. The Evolution of Digital Trust Navigating the balance between trust

    and verification in an AI-driven world October 16th, 2025 Naohiro Fujie Chair, OpenID Foundation Japan
  2. Self-introduction Over 20 years of experience in the digital identity

    space, including consulting, architecture design, and project management experience for global digital identity platforms for various customers. In 2018, I joined the OpenID Foundation Japan as a board member and established the KYC working group. In 2020, I was appointed WG Co-Chair of the eKYC and Identity Assurance working group at the OpenID Foundation. In 2021, I was appointed chairman of the OpenID Foundation Japan. Roles and activities Chairman at the OpenID Foundation Japan Working Group co-chair at the OpenID Foundation, eKYC & IDA WG Liaison officer between the OIDF and the Japanese Government Member of various councils in the Japan Government Research director at ITOCHU Techno Solutions(CTC) Researcher at the Keio Research Institute at SFC Visiting Faculty at the University of Osaka graduate school Naohiro Fujie Copyright © 2025, Naohiro Fujie, All Rights Reserved 2
  3. What is Trust? The Definition Trust is the degree to

    which we expect others to behave as anticipated without verifying the facts Digital Context In online transactions, we must trust both the counterparty and the data being exchanged Copyright © 2025, Naohiro Fujie, All Rights Reserved
  4. Copyright © 2025, Naohiro Fujie, All Rights Reserved Traditional Approach:

    Offline Contracts The Old Way Organizations traditionally reduced risk by establishing individual offline contracts for each transaction and relationship. While this approach provided security through direct agreements, it presented significant challenges for scaling operations.
  5. Copyright © 2025, Naohiro Fujie, All Rights Reserved Industry Solution:

    Trust Frameworks Industries began developing comprehensive trust frameworks to establish trust at scale. These frameworks provide standardized rules and governance that allow participants to trust each other within a defined ecosystem. Standardized Rules Common policies and procedures Governance Oversight and compliance Ecosystem Trust Comprehensive trust within boundaries
  6. Copyright © 2025, Naohiro Fujie, All Rights Reserved Trust Framework

    Traditional model of Trust Framework / Open Identity Exchange (2010) Source: TheOpenIdentityTrustFramework(OITF)Model / Open Identity Exchange, 2010 • Policymakers(ex. Government): • Deciding the technical, operational, and legal requirements for exchanges of identity information that fall under their authority • Select Trust Framework Providers to implement these requirements • Trust Framework Provider(TFP): • Formulates a trust framework based on policies and acts as an intermediary in building trust relationships between IdPs and RPs • Assessors: • Certified by TFP that audits whether IdPs and RPs are operating in accordance with the trust framework • Identity Service Providers(IdPs): • Hold, manage, and provide user identities • Relying Parties(RPs, ex. Gov’s Web Sites): • Accepts the IdP authentication results and receives identity information
  7. Copyright © 2025, Naohiro Fujie, All Rights Reserved The NHI

    Challenge AI agents and IoT devices are creating transaction volumes that exceed the capacity of traditional trust frameworks AI Agents Autonomous systems making decisions and transactions IoT Devices Billions of connected devices exchanging data Scale Problem Massive volume of interactions requiring trust Non-Human Identities (NHI) are fundamentally changing the trust landscape, creating challenges that traditional frameworks weren't designed to handle.
  8. Copyright © 2025, Naohiro Fujie, All Rights Reserved Trust and

    Verify The key is balancing trust with verification. Not all interactions require the same level of assurance, but the ability to verify must always exist.
  9. Copyright © 2025, Naohiro Fujie, All Rights Reserved A Dual

    Approach to Digital Trust Inside Trust Frameworks Continue to Trust: For participants within established trust frameworks who meet baseline requirements, traditional trust mechanisms remain effective and efficient. Outside Trust Frameworks Require Verification: For devices, AI agents, and entities outside framework boundaries, verifiable credentials and proof become essential for secure interactions. This balanced approach maintains efficiency while ensuring security across all types of digital interactions.
  10. Copyright © 2025, Naohiro Fujie, All Rights Reserved Standards for

    Verifiable Trust Organizations like the OpenID Foundation are developing global standards to enable verifiable digital interactions at scale. 01 Digital Credentials Standardized formats for verifiable claims and identity attributes 02 Exchange Protocols Secure methods for sharing and verifying credentials between parties 03 Government Collaboration Partnership with national governments to implement standards in real-world systems 04 Social Implementation Deployment in production environments serving citizens and businesses
  11. Copyright © 2025, Naohiro Fujie, All Rights Reserved Japan's Proof

    of Concept Transportation Pilot Program In collaboration with Japan's Digital Agency, pilot programs are underway in the transportation sector. Use Case: Students can present their university enrollment credentials along with national ID to receive discounted fares—all through verifiable digital credentials. These practical implementations demonstrate how standardized verification can work seamlessly in everyday transactions.
  12. Copyright © 2025, Naohiro Fujie, All Rights Reserved Digital Identity,

    Trust for Agentic AI Agent Payments Protocol (AP2) is an open protocol for the emerging Agent Economy. It's designed to enable secure, reliable, and interoperable agent commerce for developers, merchants, and the payments industry. All of mandates are based on W3C Verifiable Credentials format and can be verified with digital signature. It outlines the resources already available for securing today’s agents and presents a strategic agenda to address the foundational authentication, authorization, and identity problems pivotal for tomorrow’s widespread autonomous systems.
  13. Copyright © 2025, Naohiro Fujie, All Rights Reserved Cross-border interoperability

    challenges Comprehensive initiatives, including Trust Framework mapping, use-case studies such as cross-border education, opening bank accounts, etc. Global initiative supported by governments and SDOs. New initiative focuses on Asia Pacific region interoperability. Planning to consider a small number of use-cases such as education, travel, etc.
  14. Sovereignty and Interoperable Digital Identity in DLDCs 14 Copyright ©

    2025, Naohiro Fujie, All Rights Reserved Discussion materials https://openid.net/wp- content/uploads/2025/07/W orkshop-6_2506_Sovreignty- and-Interoperability-of- Digital-Identity-in- DLDCs_Hodges_0900-v2.pdf Event report https://openid.net/wp- content/uploads/2025/07/29 0-Sovereignty-and- Interoperable-Digital- Identity-in- DLDCs_Rapporteur-notes- _IGF-062525.pdf Blog post https://www.openid.or.jp/blo g/2025/07/20250701- balancing-sovereignty-and- interoperability.html
  15. Joint session with AfICTA and SIDI Hub. AfICTA: African ICT

    Alliance Focusing on digital identity. The digital identity is baseline of inclusion and development. Interoperable digital identity and sovereignty are the key success factor of progress of AfCFTA, African Continental Free Trade Area. Overview of the workshop session 15 Copyright © 2025, Naohiro Fujie, All Rights Reserved
  16. Implement regional interoperability pilot To accelerate cross-border digital ID integration

    in Africa, we propose launching regional interoperability pilots between countries with advanced systems, such as Nigeria and Cameroon, and Benin and Ghana. Policy and technical standards alignment Governments must formulate domestic policies that respect national sovereignty while utilizing international standards, and investment in cryptographic infrastructure is also crucial to maintain the integrity, privacy, and authenticity of digital credentials. A public-private and societal approach Strong public-private cooperation is essential. The government should raise awareness through educational campaigns and promote digital IDs as valuable tools in citizens' daily lives. Call for actions 16
  17. Maps National ID Trust Framework across countries SIDI Hub/Trust Framework

    mapping 17 Copyright © 2025, Naohiro Fujie, All Rights Reserved 212 212 Overview of DNA of Digit al ID UK - Digital Identity and Attributes Trust Framework (DIATF) EU - eIDAS2 US - NIST Version 4 draft Canada - DIACC Pan Canadian Trust Framework Sweden - Bank ID Thailand - ETDA Trust Framework Singapore - Singpass 213 213 Trust Frameworks share common “Charact erist ics” Charact erist ics may have many more “values”... Japan - DS-500
  18. Copyright © 2025, Naohiro Fujie, All Rights Reserved A Global

    Vision for Secure Internet As countries develop their own trust and verification systems, the key to success lies in interoperability—ensuring these systems can work together across borders. National Implementation Cross-Border Interoperability Global Scale Trust Safer Internet The future promises a globally scaled, trustworthy, and secure internet—built on the foundation of interoperable standards and verifiable trust.