The decentralized identity market in 2026 is simultaneously the most technically promising and the most commercially fragmented segment of the privacy technology landscape. The premise is elegant: replace centralized identity providers (Google, Facebook, government databases) with cryptographic credentials controlled by the individual, verified without intermediaries, and disclosed selectively using zero-knowledge proofs. The execution is a thicket of competing standards, overlapping protocols, and over 200 funded companies pursuing slightly different visions of what “decentralized identity” means in practice.

This market map catalogs every significant player in the decentralized identity ecosystem as of early 2026, organized by functional layer. The map is not comprehensive of every project that has issued a token or published a whitepaper. It covers companies and protocols with meaningful traction: funded teams, shipped products, active users, or institutional adoption. The objective is to provide a clear picture of who is building what, how the pieces fit together, and where the market is consolidating.

Market Size and Funding

The decentralized identity market reached an estimated $2.8 billion in total venture and grant funding through early 2026. This figure includes traditional venture capital, crypto-native investment (token sales, protocol treasuries, ecosystem grants), and government grants (primarily from the EU’s Digital Identity Wallet program and the US Department of Homeland Security’s Silicon Valley Innovation Program).

Annual funding has been volatile, tracking the broader crypto market cycle:

  • 2021: $1.1 billion (peak of crypto bull market, heavy token-based funding)
  • 2022: $680 million (crypto winter onset, traditional VC filled gaps)
  • 2023: $420 million (trough, with government grants becoming more significant)
  • 2024: $580 million (recovery, enterprise adoption driving renewed VC interest)
  • 2025: $820 million (strong growth, EU Digital Identity Wallet program catalyzing investment)

The funding recovery in 2024-2025 reflects a shift from speculative token-based projects to enterprise and government use cases. The EU’s eIDAS 2.0 regulation, which mandates that all EU member states offer citizens a digital identity wallet by 2026, has created a guaranteed market that has attracted institutional capital. The privacy tech funding tracker shows decentralized identity as one of the fastest-growing subcategories within the broader privacy technology sector.

Layer 1: Identifier Standards and Protocols

The foundation of decentralized identity is the identifier layer – the standards that define how identities are created, resolved, and verified without centralized registries.

W3C Decentralized Identifiers (DIDs)

The W3C DID specification (became a W3C Recommendation in July 2022) defines a standard format for decentralized identifiers – URIs that can be resolved to DID Documents containing public keys and service endpoints, without requiring a centralized registry. Over 100 DID methods have been registered, though a much smaller number have meaningful adoption.

Key DID methods by adoption:

did:web – The pragmatist’s DID method. Resolves through standard HTTPS, using the entity’s web domain as the trust anchor. Widely adopted in enterprise contexts because it requires no blockchain infrastructure and leverages existing DNS and TLS infrastructure. The trade-off: it depends on centralized web hosting and DNS, diluting the decentralization promise.

did:ion (Microsoft/DIF) – Built on the Bitcoin blockchain using the Sidetree protocol. Microsoft’s Identity Overlay Network (ION) anchors DID operations to the Bitcoin blockchain without requiring transaction fees for DID creation or updates. The enterprise credibility of Microsoft’s involvement has driven adoption in government and financial services pilots.

did:ethr (uPort/Veramo) – Ethereum-based DIDs, widely used in the Ethereum ecosystem and compatible with the EVM chain family. The did:ethr method is the most natural fit for applications that already use Ethereum for authentication via SIWE (Sign-In with Ethereum).

did:key – The simplest DID method: the identifier is derived directly from a public key. No blockchain, no resolution infrastructure. Useful for ephemeral interactions where persistence is not required.

did:cheqd – Built on the Cheqd network, a Cosmos SDK blockchain specifically designed for decentralized identity, with built-in payment rails for verifiable credential issuance and verification.

Verifiable Credentials (VCs)

The W3C Verifiable Credentials Data Model (v2.0, 2024) defines how credentials (diplomas, licenses, certifications, age proofs) are issued, held, and verified in a decentralized manner. A VC is a cryptographically signed claim by an issuer about a subject, which can be verified by any relying party without contacting the issuer.

The VC ecosystem has matured substantially since 2023, with three competing proof formats creating interoperability challenges:

JSON-LD with LD Proofs – The original W3C approach, using linked data signatures. Favored by government-backed projects (EU Digital Identity Wallet) and standards-aligned implementers. The downside: JSON-LD processing is computationally expensive and the linked data dependency adds complexity.

JWT-based VCs – Verifiable Credentials encoded as JSON Web Tokens, using standard JWT signing. Simpler to implement, compatible with existing web infrastructure, and adopted by many enterprise implementations. Less flexible for selective disclosure than ZKP-based approaches.

ZKP-based VCs (AnonCreds) – Credentials using zero-knowledge proofs that allow selective disclosure (prove you are over 18 without revealing your birthdate) and unlinkability (multiple presentations of the same credential cannot be correlated). Originally developed for Hyperledger Indy/Aries, with newer implementations using BBS+ signatures. The most privacy-preserving approach but also the most technically complex.

Layer 2: Infrastructure Providers

The infrastructure layer provides the platforms, networks, and toolkits that enable decentralized identity applications.

Funded Infrastructure Companies

Spruce Systems (New York, $34 million raised): Building Sign-In with Ethereum (SIWE) infrastructure and the SpruceID identity toolkit. SIWE has become the standard for wallet-based authentication on Web3 applications, with over 12,000 applications implementing it by 2025. Spruce’s toolkit also includes Treehouse, a data storage and credential management system, and DIDKit, an open-source library for working with DIDs and VCs.

Dock.io (fully remote, $20 million raised): A verifiable credentials platform targeting enterprise and government use cases. Dock operates its own blockchain for credential anchoring and provides APIs for credential issuance, verification, and revocation. Notable deployments include workforce credentialing with the US government and education credentialing in Asia-Pacific.

Cheqd (London, $13 million raised): Building payment infrastructure for verifiable credentials – enabling issuers to charge for credential verification and holders to monetize their credentials. The Cheqd network runs on Cosmos SDK and has processed over 2 million credential operations.

Trinsic (Provo, Utah, $11 million raised): Provides a platform-as-a-service for verifiable credentials, abstracting the complexity of DID methods, proof formats, and credential schemas behind APIs. Trinsic supports multiple DID methods and proof formats, positioning as the “Stripe for identity” – a layer that makes decentralized identity accessible to developers without deep cryptographic expertise.

Veramo (originally ConsenSys spinoff, open source): A JavaScript framework for building DID-based identity applications. Veramo supports multiple DID methods and VC formats, and has become the default toolkit for Ethereum-ecosystem identity projects.

Ceramic Network (New York, $30 million raised): A decentralized data network for composable data, often used as the data storage layer for decentralized identity applications. Ceramic’s ComposeDB allows applications to store and query identity-related data (profiles, credentials, social graphs) without centralized databases.

Government-Backed Infrastructure

EU Digital Identity Wallet (EUDI Wallet): The largest government-driven decentralized identity initiative globally. Under eIDAS 2.0, all 27 EU member states must offer citizens a digital identity wallet by 2026. The Architecture and Reference Framework (ARF) specifies a wallet architecture using ISO/IEC 18013-5 (mobile driving license) and W3C Verifiable Credentials. Large-Scale Pilots (LSPs) involving over 250 organizations across the EU are testing interoperability, with projected wallet distribution to 80% of EU citizens by 2028.

The EUDI Wallet is not itself a decentralized identity system in the Web3 sense – it relies on government-issued credentials and government-operated trust registries. But it adopts the verifiable credentials model, selective disclosure (using ZKP-based proofs in later iterations), and user-controlled wallets, creating the infrastructure for a hybrid model where government-issued credentials and privately-issued credentials coexist in the same wallet.

US Department of Homeland Security (DHS): DHS’s Silicon Valley Innovation Program (SVIP) has funded over 20 decentralized identity projects, including Spruce, Dock, Transmute, and Digital Bazaar. The focus is on cross-border credential verification – immigration documents, trade compliance certificates, and supply chain attestations – where decentralized verification eliminates the need for slow, expensive, and fraud-prone paper-based processes.

Layer 3: Wallet Providers

The wallet is the user-facing component of decentralized identity – the application where individuals store, manage, and present their credentials and identifiers.

Crypto-Native Wallets Adding Identity

MetaMask (ConsenSys, $400 million+ in parent funding): The dominant Ethereum wallet (30 million+ monthly active users) has gradually added identity features, including SIWE support and basic credential display. MetaMask’s institutional version (MetaMask Institutional) supports identity verification workflows for regulated entities.

Coinbase Wallet (Coinbase, publicly traded): Integrated decentralized identity features through Coinbase’s investment in the Base layer-2 network and support for ENS and Basename identifiers. Coinbase Verifications – on-chain attestations of KYC completion – bridge traditional identity verification and decentralized identity.

Phantom (Solana ecosystem, $118 million raised): Primarily a Solana wallet, Phantom has added support for Solana-based identity primitives and credential display.

Purpose-Built Identity Wallets

Talao (Paris, $5 million raised): An identity-focused wallet implementing the EUDI Wallet specification. Talao is a participant in the EU Large-Scale Pilots and positions as a reference implementation for the European digital identity wallet.

walt.id (Vienna, $6 million raised): Provides open-source identity infrastructure including a wallet implementation, credential issuance platform, and verification tools. Walt.id is used by multiple EU Digital Identity pilot projects and supports the full spectrum of DID methods and VC formats.

Animo Solutions (Netherlands): Building open-source identity wallet infrastructure on Hyperledger Aries/AnonCreds, with a focus on privacy-preserving credential presentation using zero-knowledge proofs.

Layer 4: Application and Vertical Solutions

The application layer is where decentralized identity meets specific use cases.

Authentication and Sign-In

Sign-In with Ethereum (SIWE): The standard for wallet-based authentication on Web3 applications. SIWE replaces email/password authentication with a cryptographic signature from the user’s Ethereum wallet. Adopted by over 12,000 applications, SIWE provides the authentication primitive for privacy-preserving sign-in without KYC requirements.

Privy (New York, $23 million raised): An authentication SDK that bridges wallet-based and traditional authentication, allowing applications to offer SIWE alongside email and social login. Privy’s embedded wallet creates a wallet for users who do not have one, reducing the onboarding friction that limits wallet-based authentication adoption.

Dynamic (San Francisco, $20 million raised): Similar to Privy – a multi-chain authentication platform that abstracts wallet complexity and supports both Web3-native and traditional authentication flows.

Reputation and Attestation

Gitcoin Passport (Gitcoin, $55 million+ in parent funding): A reputation aggregator that allows users to collect “stamps” from identity providers (ENS, BrightID, Twitter/X, Proof of Humanity) and present a composite reputation score without revealing underlying identity. Used primarily for Sybil resistance in Web3 governance and grant distribution.

Ethereum Attestation Service (EAS) (open source): A protocol for making and verifying on-chain attestations – statements about an entity’s attributes, history, or qualifications. EAS is gaining traction as a building block for reputation systems, credential verification, and trust scoring in decentralized applications.

Soulbound Tokens (SBTs): Non-transferable tokens representing credentials, achievements, or attestations. The concept, proposed by Vitalik Buterin in 2022, has been implemented by multiple projects but adoption has been limited by the absence of standardization and the privacy limitations of on-chain credentials (publicly visible by default). Soulbound token privacy remains an active area of development, with ZKP-based approaches emerging to address the visibility problem.

KYC and Compliance

Worldcoin/World ID (Tools for Humanity, $250 million raised): The most controversial decentralized identity project. World ID uses iris biometrics (captured by the Orb device) to create a unique human credential, aiming to provide proof of humanity for AI-era applications. The biometric approach has drawn intense criticism from privacy advocates and regulators, with CNIL (France), BfDI (Germany), and ICO (UK) all launching investigations.

Polygon ID (Polygon Labs): A zero-knowledge-proof-based identity framework built on Polygon, enabling users to prove attributes without revealing underlying data. Polygon ID’s ZK circuits allow credential verification on-chain without disclosing the credential contents, addressing the privacy limitation of transparent on-chain attestations.

Fractal ID (Berlin, $10 million raised): A DeFi-focused identity verification provider that performs traditional KYC and issues verifiable credentials that users can present to DeFi protocols. Fractal bridges the compliance requirements of regulated DeFi with the privacy expectations of decentralized finance.

Layer 5: Privacy Protocols

The privacy layer addresses the fundamental tension in decentralized identity: verifiable credentials on public blockchains are transparent by default, but identity requires selective disclosure and unlinkability.

Iden3/PolygonID (Barcelona/Polygon Labs): Developed the circom ZK circuit framework that powers Polygon ID’s privacy-preserving identity verification. Iden3’s approach allows credential holders to generate ZK proofs that verify specific attributes without revealing the full credential.

Semaphore (Privacy & Scaling Explorations, Ethereum Foundation-funded): A ZK protocol for anonymous signaling – proving membership in a group without revealing which member you are. Semaphore enables anonymous voting, anonymous reputation, and anonymous authentication, all critical primitives for privacy-preserving identity applications.

Zupass (0xPARC/Privacy & Scaling Explorations): A proof-carrying data system used for ticket verification and anonymous credential presentation. Originally developed for Zuzalu (a pop-up city experiment in Montenegro), Zupass demonstrates how ZK-based credentials can provide verification without identification in real-world settings.

Rarimo ($10 million raised): A cross-chain identity protocol that enables credential portability across blockchain networks. Rarimo’s ZK-based passport verification allows users to prove citizenship or age from a government-issued e-passport without revealing any other passport data.

Standard Convergence

The proliferation of DID methods (100+), VC formats (3 major, several minor), and wallet implementations has created an interoperability crisis that the market is beginning to resolve. The DIF (Decentralized Identity Foundation) and W3C are driving convergence through profile specifications that narrow the option space for implementers.

The most significant convergence vector is the EUDI Wallet program, which will force standardization by specifying exact credential formats, DID methods, and presentation protocols for the European digital identity wallet. Whatever the EUDI Wallet specifies will become the de facto standard for the largest digital identity market on earth.

Enterprise Adoption

Enterprise adoption of decentralized identity has shifted from pilots to production deployments in specific verticals. Supply chain credentialing (Transmute, Trinsic), workforce credentialing (Dock, LearningMachine), and financial services compliance (Fractal ID, Polygon ID) have each demonstrated production-scale implementations.

The enterprise adoption pattern follows a predictable curve: financial services and government lead (driven by compliance requirements), followed by healthcare and education (driven by credential portability needs), followed by consumer applications (driven by accumulated infrastructure and user familiarity).

The Privacy-Compliance Tension

The decentralized identity market is being pulled simultaneously toward maximum privacy (ZK-based selective disclosure, unlinkability, pseudonymity) and maximum compliance (KYC requirements, anti-money laundering, sanctions screening). The tension is not new – the identity trilemma has been discussed since the early days of self-sovereign identity. But the commercial pressure to resolve it is intensifying as both privacy-focused (DeFi, anonymous authentication) and compliance-focused (regulated financial services, government ID) use cases demand production-grade solutions.

The companies that bridge this tension – providing privacy where regulation permits and compliance where regulation requires, using the same underlying infrastructure – will capture the largest market opportunity. Polygon ID, Fractal ID, and Dock are positioning for this bridging role.

The Stealth Cloud Perspective

The decentralized identity market map reveals an ecosystem that is technically mature in its primitives, commercially fragmented in its implementations, and convergent in its trajectory. The standards exist. The cryptography works. The wallets are shipping. What remains is the integration work – connecting these components into seamless experiences that replace centralized identity with something genuinely better, not merely more ideologically pure.

Stealth Cloud’s GhostPass authentication is built on the infrastructure this market map documents. Sign-In with Ethereum provides the authentication primitive. Wallet-based identity eliminates the password and email dependency that centralized identity requires. The zero-KYC architecture ensures that users authenticate without providing personally identifiable information – proving they control a wallet, not proving who they are.

The market map shows that the components for a fully decentralized, privacy-preserving identity layer exist today. They are fragmented across dozens of companies and protocols, interoperability is imperfect, and consumer adoption trails enterprise adoption by several years. But the direction is clear: identity is moving from centralized databases to individual wallets, from all-or-nothing disclosure to selective proof, and from institutional trust to cryptographic verification.

Stealth Cloud is not building an identity protocol. We are building an AI privacy platform that consumes the identity infrastructure this ecosystem produces. The decentralized identity market provides the authentication layer. We provide the zero-knowledge AI interaction layer that sits on top of it. Together, they create something that neither layer provides alone: AI assistance that knows nothing about who you are, verified by cryptographic proof that you are authorized to use it. That is the convergence point where decentralized identity meets zero-persistence computing, and it is where Stealth Cloud operates.