Re: Question on complex VP

Hello!

Thank you for all the responses. I've shared it with my team members.

In line with the same or similar use case, we're assuming using challenge-response protocol (which I think is also in line withhttps://w3c-ccg.github.io/vp-request-spec/ document) but currently thinking of the implementation for multiple verifiers/holders or a 1:many situation.

Thanks always for letting us pick your brains. Anything that could help us clarify or help us have a better understanding is always appreciated.

Best,
Stefannie
________________________________
From: Daniel Hardman <daniel.hardman@gmail.com>
Sent: Wednesday, January 17, 2024 1:02 AM
To: Michael Prorock <mprorock@mesur.io>
Cc: ステファニー タン(SBIホールディングス) <tstefan@sbigroup.co.jp>; public-credentials@w3.org <public-credentials@w3.org>
Subject: Re: Question on complex VP

Just adding some detail to Kalin's response.

ACDCs can have "edges" (in the computer science sense where the term is used with Directed Acyclic Graphs). Basically, an ACDC points back to other credentials that justify it, in a chain (the first "C" in ACDC stands for "Chained"). Verification of an ACDC that's a leaf node in an evidence DAG involves an extremely optimized re-proof of the chain behind it, including proof of non-revocation. This has some very useful characteristics in supply chain use cases.

On Tue, Jan 16, 2024 at 3:32 PM Michael Prorock <mprorock@mesur.io<mailto:mprorock@mesur.io>> wrote:
Stefannie,
You may want to take a look at the Trace Interop which deals with some of these questions: https://w3id.org/traceability/interoperability
and the corresponding vocabulary: https://w3id.org/traceability


Amongst other things, there is the notion of a Traceable Presentation that lets you assign a workflow ID and and type specifically so that individual credentials can be correlated.  This permits credentials to be presented as they are created in an asynchronous manner and still correlated after verification.

Mike Prorock
CTO, Founder
https://mesur.io/




On Tue, Jan 16, 2024 at 1:34 AM ステファニー タン(SBIホールディングス) <tstefan@sbigroup.co.jp<mailto:tstefan@sbigroup.co.jp>> wrote:
Hi, all

This might seem like a silly question, so I hope you would indulge me.

In the context of using VCs in a traceability context (for example, supply chain). As the product moves along the supply chain and verifiable credentials are also issued by each actor (to represent certifications of inspection, etc. and might differ depending on the product), I imagine that the VP at the end would be difficult to verify since the contents become very long and complex to inspect.

In such a case, I am looking for real-life use cases or examples on how this complexity is handled. I assumed that it might be through an interface of some sort…

Any thoughts or comments are very much appreciated. Thank you in advance.

Best,
Stefannie

Received on Thursday, 25 January 2024 09:24:43 UTC