From 1f574ef97578d999bae5735faa0ec11f70d084f7 Mon Sep 17 00:00:00 2001
From: wyc
+In this example, the issuer has bound the verifiable credential to
+the holder (Pat) using the
+
Implementers that are interested in understanding more about the
Subjects of verifiable credentials are identified using the
-
@@ -4035,10 +4067,10 @@
-Verifiable credentials might contain long-lived identifiers that could
-be used to correlate individuals. These types of identifiers include
-subject identifiers, email addresses, government-issued identifiers,
-organization-issued identifiers, addresses, healthcare vitals,
+Verifiable credentials might contain long-lived identifiers that could be
+used to correlate individuals. These types of identifiers include
+subject and holder identifiers, email addresses, government-issued
+identifiers, organization-issued identifiers, addresses, healthcare vitals,
verifiable credential-specific JSON-LD contexts, and many other sorts of
long-lived identifiers.
Verifiable credentials that are bearer credentials are made
-possible by not specifying the subject identifier, expressed using the
-
+
+3. W3C CCG is notified of PRs that will be merged in the next 14 days if there
+are no objections.
+4. When it's determined a new reccomendation should go out, the W3C Verifiable
+Credentials Working Group members meet, review all the PRs that have been
+merged, and make a formal recommendation if agreement is reached.
+
+### Roadmap for 2021
+- 1 editorial update (v1.1?)
+- 1 substantive update (v1.2?)
+- VC Test Suite Refactoring
+- Start planning VC v2 Work, request a rechartering 3-6 months before end of
+ year to keep VC WG functioning.
+
+### Focus areas
+- [v1] Fixing a specific bug
+- [v1] Update examples in the spec to make them modern
+- [v2] VC `@context` needs updating, possibly with security vocab modularized
+ into smaller components instead of all included into a large context file.
From da7b669cbf7b718f12426bdaad7b7494607b420f Mon Sep 17 00:00:00 2001
From: Stephen Curran Ecosystem Overview
A role an entity might perform by possessing one or more
verifiable credentials and generating verifiable presentations
from them. Example holders include students, employees, and customers.
+Issuers can bind a verifiable credential to the holder to which it is issued,
+and the holder can prove that binding using the proof
property of a
+verifiable presentation.
Use Cases and Requirements
verifiable presentation.
Concrete Lifecycle Example
}
}
-
+ credentialSubject.id
property (rather than using the
+holder.id
property). The second proof
property in the
+verifiable presentation (with proofPurpose
of
+"authentication"
) is used by Pat to prove their relationship to the
+credentialSubject.id and thus, that they are the intended holder.
+ proof
mechanism used above can learn more in
@@ -1946,9 +1961,13 @@ Presentations
proof
property ensures that
-the presentation is verifiable. For details related to the use of
-this property, see Section .
+If present, the value of the proof
property ensures that the
+presentation is verifiable. Where the issuer has bound the
+verifiable credential being presented to a specific holder, the
+proof
property
+contains verifiable data to prove the indicated holder is
+presenting the proof. For details related to the use of this property, see
+Section .
Lifecycle Details
any other actions involving a credential.
Trust Model
entities.
Zero-Knowledge Proofs
Identifier-Based Correlation
credential.credentialSubject.id
field. The identifiers used to
-identify a subject create a greater risk of correlation when the
-identifiers are long-lived or used across more than one web domain.
+credential.credentialSubject.id
field. Holders of
+verifiable credentials are identified using the
+credential.holder.id
field. The identifiers used to identify a
+subject and/or holder create a greater risk of correlation when
+the identifiers are long-lived or used across more than one web domain.
Signature-Based Correlation
Long-Lived Identifier-Based Correlation
Bearer Credentials
id
property, which is nested in the
-credentialSubject
property. For example, the following
+possible by not specifying either the subjectCredential.id
or
+holder.id
identifiers. For example, the following
verifiable credential is a bearer credential:
Usage Patterns
subject across multiple presentations or verifiers. Even
when different credentials are presented, if the subject
identifier is the same, verifiers (and those with access to
-verifier logs) could infer that the holder of the
-credential is the same person.
+verifier logs) could infer that the subject of the
+credential is the same person. Likewise for holder identifiers.
Usage Patterns
Validation
-In the verifiable credentials presented by a holder, the value
-associated with the id
property for each
-credentialSubject
is expected to identify a subject to the
-verifier. If the holder is also the subject, then
-the verifier could authenticate the holder if they have
-public key metadata related to the holder. The verifier could then
-authenticate the holder using a signature generated by the holder
-contained in the verifiable presentation. The id
-property is optional. Verifiers could use other properties
-in a verifiable credential to uniquely identify a subject.
+An issuer may indicate that a verifiable credential has been
+issued to a specific holder using the holder
+property. Alternatively, when the holder is the subject,
+the credentialSubject.id
property could be used for the same
+purpose, ideally paired with the nonTransferable
property.
+When such verifiable credentials are used to produce a verifiable
+presentation, the
+verifier may authenticate the holder (or holder subject)
+using a holder-generated signature in the proof
property of
+the verifiable presentation.
+
+Where there is no issuer-designated holder the verifiable
+credential can be transferred to other holders, and no holder
+authentication is necessary by the verifier.
@@ -5049,6 +5084,20 @@
+In the verifiable credentials presented by a holder, the value
+associated with the id
property for each
+credentialSubject
is expected to identify a subject to the
+verifier. The id
property is optional. Verifiers
+could use other properties in a verifiable credential to uniquely
+identify a subject.
+
Verifiable credentials that are bearer credentials are made
-possible by not specifying either the subjectCredential.id
or
+possible by not specifying either the credentialSubject.id
or
holder.id
identifiers. For example, the following
verifiable credential is a bearer credential:
proof
property of
+using a holder-generated signature in the proof
property of
the verifiable presentation.
Where there is no issuer-designated holder the verifiable