Skip to main content

Verifiable Presentations (VPs)

Verifiable Presentations (VPs) provide a secure and flexible way to share Verifiable Credentials (VCs) with a verifier, ensuring that the data’s integrity and authorship are maintained.

What are Verifiable Presentations?

Verifiable Presentations (VPs) are machine-readable digital containers that package one or more Verifiable Credentials (VCs). They ensure that the information within is verifiable by cryptographic proofs, allowing the verifier to trust the origin and integrity of the presented data.

According to the W3C Verifiable Credentials Data Model a verifiable presentation is:

A tamper-evident presentation of information encoded in such a way that authorship of the data can be trusted after a process of cryptographic verification. Certain types of verifiable presentations might contain data that is synthesized from, but does not contain, the original verifiable credentials (for example, zero-knowledge proofs).

Key features of Verifiable Presentations

  • Secure sharing: VPs enable secure sharing of credentials between holders and verifiers, ensuring that only the necessary information is disclosed.
  • Selective disclosure: Holders can choose which parts of their credentials to share, protecting their privacy by revealing only the required information.
  • Cryptographic proofs: Uses cryptographic signatures to prove the authenticity and integrity of the presented credentials, verifying that they have not been tampered with.
  • Interoperability: Compatible with various digital identity systems and protocols, enabling seamless interactions across different platforms.

Example of a Verifiable Presentation structure

Below is a simplified illustration of a Verifiable Presentation's structure:

Verifiable Presentation Structure

How Verifiable Presentations work

  1. Credential packaging: The holder selects one or more Verifiable Credentials (VCs) stored in their Digital wallet to include in the presentation.

  2. Selective disclosure: The holder decides which specific data or claims within the VCs to disclose, based on the verifier's request. This allows for minimal exposure of personal information.

  3. Proof Creation: The VP is digitally signed by the holder, creating a cryptographic proof that verifies the authorship and integrity of the credentials within the presentation.

  4. Presentation to Verifier: The holder submits the VP to the verifier, who uses the cryptographic proofs to validate the data's authenticity and integrity.

Benefits of using Verifiable Presentations

  • Enhanced Privacy: Allows users to share only necessary information, minimizing data exposure and protecting personal privacy.
  • Increased Trust: Provides cryptographic evidence of the data's integrity and authenticity, ensuring reliable and trusted digital interactions.
  • Flexibility: Supports multiple credentials in a single presentation, making it versatile for various use cases.
  • Streamlined Verification: Simplifies the verification process for organizations by providing a standardized and interoperable way to validate credentials.

Further reading