KILT - Protocol: People, organizations and machines have identities. Kilt can be used by them for authentication, authorization and information sharing.

Possible Usecases

People, organizations and machines have identities. Kilt can be used by them for authentication, authorization and information sharing. The use cases range from logging into a website to voting on the best restaurant in your town. See a list of possible use cases, we already thought of. Understand the chances and possibilities in writing applications on Kilt. Find out if you want to start a business case based on Kilt.

KILT - Protocol: Learn all about KILT's features.

Getting started

Learn about the Kilt principles, about Claims, Attestations and Verifications. Find out about Kilt Tokens, DAGs and Curated Permissioned Lists. See if Kilt fits your use case, find out if there are already projects you can join or use. Or set up your own project with Kilt.

KIL - Protocol: The Light-Paper outlines the principles of Kilt and explains different use cases. It also describes the Economy around the Kilt Token and shows the possible benefits and incentive mechanisms for organisations. It does not go into technological detail.

Read the Lightpaper

Our Light-Paper targets senior management. It should help you decide if your organization wants to use the Kilt protocol for streamlining internal processes or for establishing new business. The Light-Paper outlines the principles of Kilt and explains different use cases. It also describes the Economy around the Kilt Token and shows the possible benefits and incentive mechanisms for organisations which build business on top of Kilt. Compared to the White-Paper, the Light-Paper does not go into technological detail.