The Verifiable Credentials 2.0 family of specifications is now a W3C Recommendation


The Verifiable Credentials Working Group has published seven W3C Recommendations today, namely:

  • Verifiable Credentials Data Model v2.0: Credentials are a part of our daily lives; driver's licenses are used to assert that we are capable of operating a motor vehicle, university degrees can be used to assert our level of education, and government-issued passports enable us to travel between countries. This specification provides a mechanism to express these sorts of credentials on the Web in a way that is cryptographically secure, privacy respecting, and machine-verifiable.
  • Verifiable Credential Data Integrity 1.0: This specification describes mechanisms for ensuring the authenticity and integrity of Verifiable Credentials and similar types of constrained digital documents using cryptography, especially through the use of digital signatures and related mathematical proofs.
  • Data Integrity EdDSA Cryptosuites v1.0: This specification describes a Data Integrity cryptographic suite for use when creating or verifying a digital signature using the twisted Edwards Curve Digital Signature Algorithm (EdDSA) and Curve25519 (ed25519).
  • Data Integrity ECDSA Cryptosuites v1.0: This specification describes a Data Integrity Cryptosuite for use when generating a digital signature using the Elliptic Curve Digital Signature Algorithm (ECDSA).
  • Securing Verifiable Credentials using JOSE and COSE: This specification defines how to secure credentials and presentations conforming to the Verifiable Credential data model with JSON Object Signing and Encryption (JOSE), Selective Disclosure for JWTs, and CBOR Object Signing and Encryption (COSE) [RFC9052]. This enables the Verifiable Credential data model to be implemented with standards for signing and encryption that are widely adopted.
  • Controlled Identifiers v1.0: A controlled identifier document contains cryptographic material and lists service endpoints for the purposes of verifying cryptographic proofs from, and interacting with, the controller of an identifier.
  • Bitstring Status List v1.0: This specification describes a privacy-preserving, space-efficient, and high-performance mechanism for publishing status information such as suspension or revocation of Verifiable Credentials through use of bitstrings.

See also the W3C Press Release on this publication.