Verifiable credentials are digital equivalents of physical credentials that we use in our daily lives. Just as you might use a driver's license to prove your ability to operate a vehicle or a university diploma to demonstrate your educational qualifications, verifiable credentials provide a standardized way to express these claims digitally.
The key difference is that verifiable credentials are:
A verifiable credential combines claims (statements about a subject), proof (cryptographic assurance from an issuer), and metadata (information about the credential itself) into a cohesive digital document that can be verified independently.
The verifiable credentials ecosystem consists of three primary roles:
This three-party model creates a flexible trust framework where:
The beauty of this system is that verifiers can trust claims without directly connecting to the original issuer. The cryptographic proofs attached to the credential provide the necessary trust, creating a "triangle of trust" between all participants.
A verifiable credential consists of several essential components:
Claims are statements about a subject, such as:
Claims are the fundamental building blocks of credentials, expressing attributes, qualifications, or characteristics of the subject.
Metadata provides information about the credential itself, including:
This metadata helps verifiers determine if a credential is valid, current, and appropriate for their verification needs.
Proofs provide cryptographic assurance about:
These proofs allow verification without contacting the issuer, enabling offline verification and enhancing privacy.
A verifiable presentation is a derived object that packages verifiable credentials for presentation to a verifier. Presentations allow holders to:
Presentations add a layer of flexibility and privacy, letting holders control exactly what information they share with verifiers.
Verifiable credentials offer several important benefits:
Unlike paper credentials that might require manual verification or contacting the issuer, verifiable credentials contain cryptographic proofs that can be mathematically verified. This makes validation faster, more reliable, and often possible without contacting the original issuer.
The verifiable credentials model supports advanced privacy features such as:
Holders store their credentials in digital wallets under their control. This gives users ownership over their data and the ability to use credentials across different contexts and platforms.
The standardized data format makes credentials machine-readable, enabling automated verification processes and integration with different systems.
W3C standards support multiple approaches for securing verifiable credentials:
The Data Integrity approach embeds proofs directly within the credential, using cryptographic suites for different security needs:
Credentials can also be secured using JWTs (JSON Web Tokens) with:
Verifiable credentials work with several complementary technologies and concepts:
Schemas define the structure and constraints for specific credential types, ensuring consistency and interoperability.
Status mechanisms allow issuers to revoke or suspend credentials without modifying the original credential.
Issuers are entities that create and sign credentials, establishing the foundation of trust in the ecosystem.
Various cryptographic approaches can be used to secure credentials and provide different privacy features.
The subject is the entity that a credential makes claims about, typically identified by a DID.
Credentials can have defined validity periods, establishing when they are considered valid.
Presentations allow holders to share proofs derived from their credentials in privacy-preserving ways.
The W3C has published several specifications that define the verifiable credentials ecosystem:
These specifications provide a comprehensive framework for implementing interoperable verifiable credentials systems.