The Triangle of Trust forms the core relationship model that enables verifiable credentials to function effectively in digital identity systems. This trust framework creates a secure, reliable ecosystem for digital credential exchange by defining clear roles and responsibilities for each participant.
In today's increasingly digital world, establishing trusted relationships without traditional paper credentials presents significant challenges. The Triangle of Trust addresses these challenges by providing a standardized approach to credential verification that maintains security, privacy, and user control.
The Triangle of Trust consists of three primary entities:
The Issuer creates and signs verifiable credentials, establishing their authenticity and provenance.
Role and Responsibilities:
Examples of issuers include government agencies, educational institutions, employers, certification bodies, and other authoritative sources.
The Holder receives, stores, and controls credentials, presenting them to verifiers when needed.
Role and Responsibilities:
The holder is typically an individual, but could also be an organization or even an IoT device.
The Verifier requests and validates credentials presented by holders.
Role and Responsibilities:
Examples of verifiers include service providers, employers, government agencies, educational institutions, and online platforms.
The verification process represents the critical trust establishment mechanism within the Triangle of Trust. This process involves several key steps:
Credential Request: The verifier requests specific credentials or proofs from the holder based on their verification requirements.
Presentation Creation: The holder, with consent, generates a verifiable presentation containing the requested credential information.
Presentation Submission: The holder sends the verifiable presentation to the verifier through a secure channel.
Signature Verification: The verifier validates the cryptographic signatures on both the presentation (holder's signature) and the contained credentials (issuer's signatures).
Issuer Validation: The verifier confirms the issuer's identity by checking their decentralized identifier (DID) against a trusted registry.
Credential Status Check: The verifier checks if the credential is still valid and has not been revoked using status services or verification registries.
Policy Enforcement: The verifier applies domain-specific verification policies to evaluate the credential content.
Trust Decision: Based on all verification results, the verifier makes a trust decision about whether to accept the credential and grant access to the holder.
Vidos focuses on providing robust, configurable services specifically designed for the Verifier role in the Triangle of Trust.
Vidos offers several specialized services that work together to support comprehensive verification:
The Authorizer service manages access control policies for verification processes, determining:
The Resolver locates and retrieves essential verification resources:
The Verifier service performs the cryptographic validation of credentials:
The Validator evaluates credential content against domain-specific rules:
Vidos services integrate into the Triangle of Trust by providing the technical infrastructure needed by verifiers to establish trust relationships with issuers and holders:
Trust Anchor Establishment: Vidos services connect to trusted registries to confirm issuer identities.
Credential Format Support: Vidos verifier supports multiple credential formats (JSON-LD, JWT, mDocs), enabling interoperability across the ecosystem.
Configurable Trust Rules: Vidos validator enables verifiers to define custom rules for what constitutes a trusted credential.
Audit and Compliance: Vidos services provide detailed verification logs to support compliance requirements.
Privacy Enhancement: Vidos supports selective disclosure and zero-knowledge proof verification methods to enhance holder privacy.
When implementing verification services within the Triangle of Trust, several important considerations should be addressed:
The Triangle of Trust provides the foundational model for secure, privacy-preserving credential exchange in digital identity systems. By clearly defining the roles and responsibilities of issuers, holders, and verifiers, this model enables trustworthy digital interactions without requiring centralized authorities.
Vidos services strengthen the verifier role within this triangle by providing specialized, configurable verification capabilities that adapt to diverse use cases while maintaining security and interoperability. By leveraging these services, verifiers can establish robust trust relationships with credential issuers and holders, enabling a wide range of secure digital identity applications.