Verifiable Credentials
Background
Governments interact with the individuals in their country for various purposes, such as offering jobs, subsidies, benefits, contracts and more. Similarly, private entities such as banks, businesses, and educational institutions also interact with individuals to assess eligibility and validity for various programs.
The foundation for any of these processes is to establish the attributes of the individual by verifying documents to determine their eligibility for services or benefits.
In the current scenario, both sectors (public and private) invest considerable amounts of effort in verifying the authenticity of the individual’s data, with no guarantee of success. Mistakes can be costly, with large sums of money and opportunities not reaching the intended people. They can also be dangerous, with unverified individuals gaining unauthorized access to sensitive systems and processes.
Digitally verifiable credentials, a simple, marginal improvement to existing systems, built using a Digital Public Infrastructure approach can solve this problem at scale.
Read more on CDPI's VCs knowledge base
What are verifiable credentials?
Any issuing authority (whether they are issuing national identity, school certifications, income certificates, recommendation letters, driving licences, tax identity, etc) can make their certificates tamper-proof while retaining full autonomy over them.
Paper Certificates can contain a digitally signed online or offline QR code that connects the paper-based document to an official server and fetches the original certificate for verification. Digital copies of the certificates can be digitally signed to add an extra layer of security, guaranteeing authenticity.
In this method, no centralisation is required. It allows various departments to retain control over their certificates, and prevents single storage databases that inadvertently become the target of cyberattacks and data leakages.
How does it work?
The application programming interfaces (APIs) of different issuing authorities are opened to enable a real-time data fetch between systems. Data is fetched (but not stored) based on API calls made from one system to another to validate a specific piece of data based on the individual’s consent. Any data-issuing authority and any data-consuming authority can connect to the same network by linking their APIs and completing their own verification according to national guidelines.
Data should only be verified with the individual’s consent. As with all DPI, the individual must be at the center of the infrastructure.
An individual can specify the data he wants verified, the party he wants to share it with, and for how long. The consent is granular, purpose-specific (e.g., for a loan or benefit), simple to understand, and revocable.
There can be three broad modes of data sharing:
Consent and data are shared at the same time through the same platform: In this model, the interface itself (wallets or e-lockers) obtains user consent through its platform and shares the data immediately. For example, DigiLocker in India
a) Wallets: In digital wallets, users can provide their consent to fetch their digitally signed documents from various entities. These documents are securely stored on the user’s dashboard and shared as needed. This empowers individuals by giving them control over all their verified credentials.
b) e-Lockers: In this model, the documents are not stored on any dashboard. Instead, when the user provides consent, these documents can be fetched from the provider and displayed to the user or the data consumer he provides his consent to. These e-Lockers are managed by one or more entities in the country and allow federation of verifiable credentials.
Consent and data are shared separately and managed through different entities: In this model, the consent is managed through a third-party intermediary known as a consent manager. These entities obtain user consent as per the consent artefact specified and communicate this to data providers, who then separately share the data with data consumers. Examples include, the Account Aggregator ecosystem in India.
Consent is managed through the data provider: In this model, data is shared between two entities such as two government departments, without the individual being directly involved (though ultimately for the individual’s benefit). Consent is provided by the data provider itself at the time of sharing the data.
There are many examples of this DPI:
Singpass in Singapore is now working to issue credentials fetched by the Singpass ID.
The EU has recently published digital wallet specifications.
Argentina has verifiable credentials as does India.
The Open Wallet Foundation strongly drives the portable identity and credentials agenda.
Some US states also accept ISO standard mDL (mobile drivers license) credentials (e.g. California).
Benefits:
Opening APIs also allows for multiple market players to build direct and indirect products over it. For example, various user-facing applications can be developed, focusing on different target groups, languages, purposes etc., that allow people to seamlessly provide consent (according to a consent artefact specified) to have their data fetched and shared with third parties.
Verifiable credentials empower both individuals and institutions: they enable people to own their data and allow institutions to focus on delivering efficient last-mile services based on that data.
It is only when we can reliably identify each individual that we can effectively build for each individual.
Summary of the DPI approach to verifiable credentials:
a) Using open specification/standard APIs allow interoperability between data-issuing authorities and any data-consuming authorities
b) Embed online/offline machine-readable and digitally signed QR codes on all physical documents
c) Digitally sign all documents issued online, this can be done by a department on behalf of multiple agencies, by departments or private entities.
d) Allow verifiable credentials to be available through eLockers or Wallets.
a) Specify a consent artefact that articulates to the individual what data they are consenting to share, for what purpose, with whom, for how long, and methods to revoke consent
b) Self-Regulatory Organizations (SROs) of market players can be set up to monitor user-facing applications dealing with consent. All applications must be data-blind (they cannot access any data, the data-fetch happens behind the scenes, and they are simply for user experience)
a) Allow for multiple applications to be built that cater to different sections of society based on region, language, purpose, etc.
Additional Resources on Verifiable Credentials:
W3C standards on VCs
Sunbird RC's wiki on VCs
DIVOC (a credentialling infra that has issued 20 m+ documents):
Verifiable credentials 101 deck
Last updated
Was this helpful?