From the user side, something like:
Submit at time T a small fixed size (hash) piece of data X you want notarized.
Get back something you can present to others to prove X existed at time T.
(In practice the data likely involves signatures and I'm glosing over matters of how you use them at this layer.)
Now, suppose we want to make a system like this scale without needing a gigantic shared ledger.
The "get back something" above is potentially doing some heavy lifting. You can make the user responsible for carrying a fairly large number of entries as part of their proof, up to a next waypoint where the notary gets one or more other lower-traffic notaries (ones it's probably paying) to notarize its state.
Why is a machine-evaluable identity system interesting to begin with?
For me, it goes back to my thread on the end of Twitter, what is being lost, and what we eventually need to build in its place.
Particularly, the value Twitter had as a unified public social graph of curated trust-as-source-of-information relationships.
The same kind of trust-as-source-of-information has come up in #reprobuilds and software provenance fields.
@dalias
I wrote my master thesis on Reproducible Builds and transparency logs.
There are several papers published on this that I can find if it's of interest :)
@dalias
The formative paper from the Reproducible Builds community is from Benjamin Hof; https://arxiv.org/abs/1711.07278
My paper takes the same ideas and applies this to Reproducible Builds and rebuilders with in-toto attestations;
https://bora.uib.no/bora-xmlui/handle/1956/20411
A few of the ideas from my thesis end up in the Transparency Log implementation that underpins sigstore, described in a recently published paper:
https://dl.acm.org/doi/10.1145/3548606.3560596
A large user base relies on software updates provided through package managers. This provides a unique lever for improving the security of the software update process. We propose a transparency system for software updates and implement it for a widely deployed Linux package manager, namely APT. Our system is capable of detecting targeted backdoors without producing overhead for maintainers. In addition, in our system, the availability of source code is ensured, the binding between source and binary code is verified using reproducible builds, and the maintainer responsible for distributing a specific package can be identified. We describe a novel "hidden version" attack against current software transparency systems and propose as well as integrate a suitable defense. To address equivocation attacks by the transparency log server, we introduce tree root cross logging, where the log's Merkle tree root is submitted into a separately operated log server. This significantly relaxes the inter-operator cooperation requirements compared to other systems. Our implementation is evaluated by replaying over 3000 updates of the Debian operating system over the course of two years, demonstrating its viability and identifying numerous irregularities.