Understanding Verifiable Presentations

Introduction

Verifiable presentations provide a privacy-enhancing mechanism within the verifiable credentials ecosystem. They allow credential holders to selectively disclose information from their verifiable credentials when interacting with verifiers. This capability is fundamental for maintaining privacy while still preserving trust in digital interactions.

In the digital identity ecosystem, three primary roles exist:

  • Issuers create and sign verifiable credentials
  • Holders receive and store credentials
  • Verifiers request and validate presentations

Verifiable presentations sit at a crucial intersection between holders and verifiers, giving holders control over how and what information they share.

Core Concepts

Definition and Purpose

A verifiable presentation is a tamper-evident, privacy-respecting data structure created by a credential holder. Its primary purpose is to bundle and present one or more verifiable credentials (or subsets of those credentials) to a verifier in a secure, verifiable format.

Unlike credentials (which are issued by authoritative sources), presentations are created and controlled by the holder. They enable holders to:

  • Present only the necessary information for a given situation
  • Combine information from multiple credentials
  • Present different aspects of their identity (personas) as appropriate
  • Include additional contextual information

Relationship to Verifiable Credentials

While verifiable credentials and verifiable presentations share similar security properties (both are tamper-evident and cryptographically verifiable), they serve different functions:

Verifiable CredentialsVerifiable Presentations
Issued by authoritiesCreated by holders
Long-livedTypically short-lived
Attest to claims about subjectsPackage credentials for verification
Signed by issuersSigned by holders
Stored by holdersTransmitted to verifiers

A holder can receive multiple verifiable credentials from different issuers and combine relevant parts into a single verifiable presentation to satisfy a verifier's requirements.

Privacy and Selective Disclosure

Privacy is a fundamental design consideration of verifiable presentations. They enable selective disclosure through:

  1. Credential selection: Choosing which credentials to include in a presentation
  2. Property filtering: Including only specific properties from credentials
  3. Derived predicates: Proving facts about credential data without revealing the data itself
  4. Zero-knowledge proofs: Demonstrating possession of valid credentials without revealing their contents

These capabilities allow holders to maintain different personas (professional, personal, etc.) and share only what's necessary for each interaction.

Structure of a Verifiable Presentation

A verifiable presentation consists of:

  1. Presentation metadata: Information about the presentation itself, such as type and context
  2. Verifiable credentials: One or more credentials (or portions thereof)
  3. Proof(s): Cryptographic material that verifies the presentation's authenticity and integrity

In JSON-LD format, a verifiable presentation might look like this:

{
    "@context": ["https://www.w3.org/ns/credentials/v2"],
    "type": ["VerifiablePresentation"],
    "verifiableCredential": [
        {
            // One or more verifiable credentials
        }
    ],
    "proof": {
        // Cryptographic proof(s)
    }
}

The presentation is represented as multiple information graphs:

  • The verifiable presentation graph (containing presentation metadata)
  • The verifiable credential graph for each included credential
  • Proof graphs for each credential
  • A presentation proof graph

How Verifiable Presentations Work

Creation Process

When a holder creates a verifiable presentation:

  1. The holder selects which verifiable credentials to include
  2. They may filter credentials to include only relevant claims
  3. The holder assembles the presentation with appropriate metadata
  4. They cryptographically sign the presentation using their verification method
  5. The signed presentation is transmitted to the verifier

This process preserves the cryptographic properties of the original credentials while adding the holder's proof of control.

Use Cases and Scenarios

Privacy-Enhancing Use Cases

Verifiable presentations enable numerous privacy-enhancing scenarios:

  • Age verification: Proving you're over 18 without revealing your exact birth date
  • Credential combination: Presenting educational qualifications and professional certifications from different issuers in a single presentation
  • Attribute verification: Confirming address details without sharing other personal information
  • Minimal disclosure: Proving eligibility without oversharing personal data

Different Personas

People maintain different "personas" in various contexts. Verifiable presentations support this by allowing holders to:

  • Present professional credentials to employers
  • Share medical information with healthcare providers
  • Verify identity to government services
  • Prove qualifications to educational institutions

Each persona can be represented by different combinations of credentials, with only relevant information disclosed in each context.

Real-World Applications

Verifiable presentations apply to numerous real-world scenarios:

  • Digital identity systems: National ID cards, driver's licenses
  • Healthcare: Sharing medical records with privacy controls
  • Education: Presenting degrees and certifications to employers
  • Finance: Proving eligibility for financial services
  • Access control: Verifying permissions for physical or digital resources

Benefits and Limitations

Privacy Benefits

Verifiable presentations offer significant privacy advantages:

  • Data minimization: Share only what's necessary
  • Consent-based sharing: Holder controls what information is disclosed
  • Unlinkability: Present information without enabling correlation across contexts
  • Selective disclosure: Reveal specific attributes without exposing entire credentials

Security Considerations

While verifiable presentations enhance privacy, implementers should consider:

  • Correlation risks: Identifiers across presentations could enable tracking
  • Signature correlation: Some proof types might enable linking presentations
  • Metadata leakage: Timestamps and other metadata might reveal patterns
  • Verification method security: Holder keys require proper protection

Implementation Challenges

Organizations implementing verifiable presentations should be aware of:

  • Interoperability: Ensuring different systems can process presentations
  • Cryptographic agility: Supporting multiple security mechanisms
  • User experience: Making complex privacy controls accessible to users
  • Performance: Managing computational requirements for zero-knowledge proofs

Conclusion

Verifiable presentations represent a crucial advancement in digital identity, balancing security requirements with privacy needs. By giving credential holders control over how their information is shared, they enable trusted digital interactions without sacrificing personal privacy.

As organizations implement verifiable credential ecosystems, understanding the role and capabilities of verifiable presentations is essential for creating systems that respect user privacy while maintaining the integrity and verifiability of digital claims.