Welcome to the technical specification on Verifiable Credential (VC), which aims to provide clear guidance on its core concepts, related attacks, countermeasures, and considerations for designing these specific structures. As we delve into VC, we'll touch upon some aspects of Decentralized Identifiers (DIDs). So, we recommend you have a basic grasp of the zk DID that we currently utilize before proceeding.
Verifiable Credentials (VCs) are a part of the W3C (World Wide Web Consortium) standards, aiming to create a standardized, secure, and privacy-respecting way to express and verify digital credentials.
At the heart of the VC architecture are three key components:
Here's how the process works: The attester creates a credential, signs it using a cryptographic key, and then issues it to the holder. When needed, the holder presents the credential to a verifier. The verifier checks the signature on the credential against the attester's public key in the verifiable data registry, ensuring the credential's validity.
This system enables secure and reliable verification of digital credentials, supporting various applications such as identity verification and qualification checks.
Understanding the Differences: VCs vs. NFTs on the Blockchain