Skip to main content

Verifiable Credentials (VCs)

Verifiable Credentials (VCs) are a foundational element of the Self-Sovereign Identity (SSI) ecosystem. They are digital, machine-readable documents that contain a set of claims made by an issuer, which are cryptographically verifiable to ensure their authenticity and integrity.

What Are Verifiable Credentials?

Verifiable Credentials (VCs) are digital assertions made by an issuer about a subject, such as a person, organization, or device. These credentials are:

  • Tamper-Evident: Designed to show any alterations or tampering, ensuring the data remains trustworthy.
  • Cryptographically Verifiable: Uses cryptographic proofs to verify the origin and integrity of the credential.

According to the W3C Verifiable Credentials Data Model:

A credential is a set of one or more claims made by the same entity. Credentials might also include an identifier and metadata to describe properties of the credential, such as the issuer, the validity date and time period, a representative image, verification material, status information, and so on. A verifiable credential is a set of tamper-evident claims and metadata that cryptographically prove who issued it.

Key components of a Verifiable Credential

A typical Verifiable Credential includes the following components:

  • Claims: Statements about a subject (e.g., name, age, qualification) that the issuer asserts to be true.
  • Issuer Information: Details about the entity that issued the credential, including its Decentralized Identifier (DID).
  • Proof: Cryptographic proofs, such as digital signatures, that verify the authenticity and integrity of the credential.
  • Metadata: Additional data like expiration date, terms of use, and revocation status.

Below is a simple representation of a Verifiable Credential structure:

Verifiable Credential Structure

Verifiable Credential lifecycle overview

The lifecycle of a Verifiable Credential involves several key stages:

  1. Issuance: The issuer creates a credential containing specific claims and provides it to the holder, who manages and controls it in their Digital wallet.

  2. Presentation: The holder presents their credential to a verifier, such as an employer or service provider, who needs to validate the claims.

  3. Verification: The verifier checks the authenticity and integrity of the credential and its claims using cryptographic proofs and the issuer's public key.

  1. Expiry: The credential may have an expiration date after which it is no longer valid and cannot be used for verification purposes.

The following image visually represents the Verifiable Credential lifecycle:

Verifiable Credential Lifecycle

Benefits of Verifiable Credentials

  • Increased Trust: Provides cryptographic proof of the credential's authenticity, reducing fraud and ensuring trust between parties.
  • Enhanced Privacy: Allows for selective disclosure, where only necessary claims are shared, protecting user privacy.
  • Interoperability: Supports multiple digital identity systems and protocols, enabling seamless interactions across different platforms.
  • Efficiency: Streamlines verification processes by eliminating the need for paper-based documents and manual checks.

Further reading