@@ -259,10 +259,11 @@ <h2>Introduction</h2>
259
259
An ecosystem where [=verifiable credentials=] and
260
260
[=verifiable presentations=] are expected to be useful
261
261
</ li >
262
- < li >
263
- The use cases and requirements that informed this specification.
264
- </ li >
265
262
</ ul >
263
+ < p >
264
+ The use cases and requirements that informed this specification can be found
265
+ in [[[VC-USE-CASES]]] [[?VC-USE-CASES]].
266
+ </ p >
266
267
267
268
< section class ="informative ">
268
269
< h3 > What is a Verifiable Credential?</ h3 >
@@ -427,166 +428,6 @@ <h3>Ecosystem Overview</h3>
427
428
</ p >
428
429
</ section >
429
430
430
- < section class ="informative ">
431
- < h3 > Use Cases and Requirements</ h3 >
432
-
433
- < p >
434
- The Verifiable Credentials Use Cases document [[VC-USE-CASES]] outlines a number
435
- of key topics that readers might find useful, including:
436
- </ p >
437
-
438
- < ul >
439
- < li >
440
- A more thorough explanation of the
441
- < a href ="https://www.w3.org/TR/vc-use-cases/#user-roles "> roles</ a >
442
- introduced above
443
- </ li >
444
- < li >
445
- The
446
- < a href ="https://www.w3.org/TR/vc-use-cases/#user-needs "> needs</ a >
447
- identified in market verticals, such as education, finance, healthcare, retail,
448
- professional licensing, and government
449
- </ li >
450
- < li >
451
- Common
452
- < a href ="https://www.w3.org/TR/vc-use-cases/#user-tasks "> tasks</ a >
453
- performed by the roles in the ecosystem, as well as their associated
454
- requirements
455
- </ li >
456
- < li >
457
- Common
458
- < a href ="https://www.w3.org/TR/vc-use-cases/#user-sequences "> sequences
459
- and flows</ a > identified by the Working Group.
460
- </ li >
461
- </ ul >
462
-
463
- < p >
464
- As a result of documenting and analyzing the use cases document, the following
465
- desirable ecosystem characteristics were identified for this specification:
466
- </ p >
467
- <!-- requirement list start -->
468
- < ul >
469
- < li >
470
- [=Verifiable credentials=] represent statements made by an [=issuer=] in
471
- a tamper-evident and privacy-respecting manner.
472
- </ li >
473
- < li >
474
- [=Holders=] can assemble collections of [=verifiable credentials=] from
475
- different [=issuers=] into a single artifact, a [=verifiable presentation=].
476
- </ li >
477
- < li >
478
- [=Issuers=] can issue [=verifiable credentials=] about any [=subject=].
479
- </ li >
480
- < li >
481
- Acting as [=issuer=], [=holder=], or [=verifier=] requires neither
482
- registration nor approval by any authority, as the trust involved is bilateral
483
- between parties.
484
- </ li >
485
- < li >
486
- [=Verifiable presentations=] allow any [=verifier=] to [=verify=] the
487
- authenticity of [=verifiable credentials=] from any [=issuer=].
488
- </ li >
489
- < li >
490
- [=Holders=] can receive [=verifiable credentials=] from anyone.
491
- </ li >
492
- < li >
493
- [=Holders=] can interact with any [=issuer=] and any [=verifier=]
494
- through any user agent.
495
- </ li >
496
- < li >
497
- [=Holders=] can share [=verifiable presentations=], which can then be
498
- [=verified=] without revealing the identity of the [=verifier=] to the
499
- [=issuer=].
500
- </ li >
501
- < li >
502
- [=Holders=] can store [=verifiable credentials=] in any location, without
503
- affecting their [=verifiability=] and without the [=issuer=] knowing
504
- anything about where they are stored or when they are accessed.
505
- </ li >
506
- < li >
507
- [=Holders=] can present [=verifiable presentations=] to any
508
- [=verifier=] without affecting authenticity of the claims and without
509
- revealing that action to the [=issuer=].
510
- </ li >
511
- < li >
512
- A [=verifier=] can [=verify=] [=verifiable presentations=] from any
513
- [=holder=], containing proofs of [=claims=] from any [=issuer=].
514
- </ li >
515
- < li >
516
- [=Verification=] should not depend on direct interactions between
517
- [=issuers=] and [=verifiers=].
518
- </ li >
519
- < li >
520
- [=Verification=] should not reveal the identity of the [=verifier=] to
521
- any [=issuer=].
522
- </ li >
523
- < li >
524
- The specification must provide a means for [=issuers=] to issue
525
- [=verifiable credentials=] that support selective disclosure, without
526
- requiring all conformant software to support that feature.
527
- </ li >
528
- < li >
529
- [=Issuers=] can issue [=verifiable credentials=] that support
530
- selective disclosure.
531
- </ li >
532
- < li >
533
- If a single [=verifiable credential=] supports selective disclosure, then
534
- [=holders=] can present proofs of [=claims=] without revealing the entire
535
- [=verifiable credential=].
536
- </ li >
537
- < li >
538
- [=Verifiable presentations=] can either disclose the attributes of a
539
- [=verifiable credential=], or satisfy [=derived predicates=] requested by
540
- the [=verifier=]. [=Derived predicates=] are Boolean conditions, such as
541
- greater than, less than, equal to, is in set, and so on.
542
- </ li >
543
- < li >
544
- [=Issuers=] can issue revocable [=verifiable credentials=].
545
- </ li >
546
- < li >
547
- The processes of cryptographically protecting and verifying
548
- [=verifiable credentials=] and [=verifiable presentations=] have to be
549
- deterministic, bi-directional, and lossless. Any
550
- [=verifiable credential=] or [=verifiable presentation=] has to be
551
- transformable to the JSON-LD data model defined in this document via a
552
- deterministic process so that its verification can be processed in an
553
- interoperable fashion.
554
- </ li >
555
- < li >
556
- [=Verifiable credentials=] and [=verifiable presentations=] have to be
557
- serializable in one or more machine-readable data formats. The process of
558
- serialization and/or de-serialization has to be deterministic, bi-directional,
559
- and lossless. Any serialization of a [=verifiable credential=] or
560
- [=verifiable presentation=] needs to be transformable to the generic data
561
- model defined in this document in a deterministic process such that the
562
- resulting [=verifiable credential=] can be processed in an interoperable
563
- fashion. The serialized form also needs to be able to be generated from the data
564
- model without loss of data or content.
565
- </ li >
566
- < li >
567
- The data model and serialization must be extendable with minimal coordination.
568
- </ li >
569
- < li >
570
- Revocation by the [=issuer=] should not reveal any identifying information
571
- about the [=subject=], the [=holder=], the specific
572
- [=verifiable credential=], or the [=verifier=].
573
- </ li >
574
- < li >
575
- [=Issuers=] can disclose the revocation reason.
576
- </ li >
577
- < li >
578
- [=Issuers=] revoking [=verifiable credentials=] should distinguish between
579
- revocation for cryptographic integrity (for example, the signing key is
580
- compromised) versus revocation for a status change (for example, the driver's
581
- license is suspended).
582
- </ li >
583
- < li >
584
- [=Issuers=] can provide a service for refreshing a
585
- [=verifiable credential=].
586
- </ li >
587
- </ ul >
588
- </ section >
589
-
590
431
< section id ="conformance " class ="normative ">
591
432
< p >
592
433
A < dfn > conforming document</ dfn > is a
0 commit comments